Content uploaded by Mohammad Khaled Al-Shboul
Author content
All content in this area was uploaded by Mohammad Khaled Al-Shboul on Aug 02, 2021
Content may be subject to copyright.
Ahmed Al-Masri
Kevin Curran Editors
Advances in Science, Technology & Innovation
IEREK Interdisciplinary Series for Sustainable Development
Proceedings of the 1st American University in the Emirates
International Research Conference—Dubai, UAE 2017
Smart Technologies
and Innovation for
a Sustainable Future
Advances in Science, Technology & Innovation
IEREK Interdisciplinary Series for Sustainable
Development
Series editor
Mourad Amer
Editorial Board Members
Hassan Abdalla
Md. Abdul Mannan
Chaham Alalouch
Sahar Attia
Sofia Natalia Boemi
Hocine Bougdah
Emmanuel Bozonnet
Luciano De Bonis
Dean Hawkes
Stella Kostopoulou
Yasser Mahgoub
Saleh Mesbah Elkaffas
Nabil Mohareb
Jennifer Nightingale
Iman O. Gawad
Mieke Oostra
Gloria Pignatta
Anna Laura Pisello
Biswajeet Pradhan
Federica Rosso
Advances in Science, Technology & Innovation (ASTI) is a series of peer-reviewed books
based on the best studies on emerging research that redefines existing disciplinary boundaries
in science, technology and innovation (STI) in order to develop integrated concepts for
sustainable development. The series is mainly based on the best research papers from various
IEREK and other international conferences, and is intended to promote the creation and
development of viable solutions for a sustainable future and a positive societal transformation
with the help of integrated and innovative science-based approaches. Offering interdisciplinary
coverage, the series presents innovative approaches and highlights how they can best support
both the economic and sustainable development for the welfare of all societies. In particular,
the series includes conceptual and empirical contributions from different interrelated fields of
science, technology and innovation that focus on providing practical solutions to ensure food,
water and energy security. It also presents new case studies offering concrete examples of how
to resolve sustainable urbanization and environmental issues. The series is addressed to
professionals in research and teaching, consultancies and industry, and government and
international organizations. Published in collaboration with IEREK, the ASTI series will
acquaint readers with essential new studies in STI for sustainable development.
More information about this series at http://www.springer.com/series/15883
Ahmed Al-Masri •Kevin Curran
Editors
Smart Technologies
and Innovation
for a Sustainable Future
Proceedings of the 1st American University
in the Emirates International Research
Conference—Dubai, UAE 2017
123
Editors
Ahmed Al-Masri
College of Education
American University in the Emirates
Dubai, United Arab Emirates
Kevin Curran
Computer Science Research Institute, Magee Campus
University of Ulster
Londonderry, Northern Ireland, UK
ISSN 2522-8714 ISSN 2522-8722 (electronic)
Advances in Science, Technology & Innovation
IEREK Interdisciplinary Series for Sustainable Development
ISBN 978-3-030-01658-6 ISBN 978-3-030-01659-3 (eBook)
https://doi.org/10.1007/978-3-030-01659-3
Library of Congress Control Number: 2018957662
©Springer Nature Switzerland AG 2019
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is
concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction
on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic
adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not
imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and
regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed
to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty,
express or implied, with respect to the material contained herein or for any errors or omissions that may have been
made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional
affiliations.
This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface
The 1st American University in the Emirates International Research Conference (AUEIRC)
held on November 15–16, 2017, has become one of the major events of the year in the field of
creative business and social innovation. AUEIRC 2017 was organized under the patronage of
His Excellency Sultan bin Saeed Al Mansouri, Cabinet Member and Minister of Economy of
UAE and chaired by Prof. Muthanna Abdul Razzaq. This conference aims to provide a vibrant
platform for academicians, researchers, scientists, and industrial practitioners from all over the
world to meet, exchange ideas and network, and discuss the challenges and opportunities for
businesses in the contemporary world. The proceedings will be published in the Advances in
Science, Technology & Innovation series of Springer.
The general aim of AUEIRC 2017 is to promote international collaboration in education and
research in all fields of creative business and innovation that can scale for the benefitof
communities. The International Scientific Committee comprises over 80 international experts in
various fields as per the themes of the conference. The conference keynote speakers include
Suzanne Trager Ortega, President of the Council of Graduate Schools (USA), Prof. Galal Hassan
Galal-Edeen (University of London, UK), and Prof. Ali Emrouznejad (Aston University, UK).
The scope of AUEIRC 2017 includes a broad range of topics on six areas namely Creative
Business and Social Innovation, Education and Social Innovation, Media for Smart Cities,
Creative Industries and Social Innovation, Governance and Legislation, and Smart Tech-
nologies and Innovation. The panels are divided based on tracks, and all papers are presented
in 24 sessions. Each session has a chairperson, while each paper has a discussant. A dou-
ble-blind peer-review process enabled 106 papers to be accepted for publication (in two edited
volumes) in Springer. On behalf of the AUEIRC 2017 Standing Committee, we would like to
thank all the referees, track chairs, discussants, and paper authors.
AUEIRC’17 has been planned to enable postgraduate students from the American University
in the Emirates and other academic institutions to participate in the conference and share their
research experience with an international community of academics and industry experts. The
best paper (in terms of quality and practicality) presented at the conference was awarded
US$1000. The recipient of the Best Paper Award was the paper titled “Optimizing Turbo Codes
for Secret Key Generation in Vehicular Ad Hoc Networks.”This paper’s authors/co-authors are
Dr. Dhouha Kbaier Ben Ismail (University of Bedfordshire), Dr. Petros Karadimas (University
of Glasgow), Dr. Gregory Epiphaniou (University of Bedfordshire), and Dr. Haider Al-Khateeb
(University of Bedfordshire).
On behalf of the AUEIRC’17 Standing Committee, we would like to thank everyone who
made the conference a reality. In particular, we would like to thank Prof. Muthanna (Con-
ference Chairperson), who contributed all resources at his disposal to ensure the high standard
of the conference. We also thank our Provost Prof. Abhilasha Singh for her contributions to
guarantee that the conference is on track. We likewise extend our gratitude to the entire AUE
Board of Trustees, who were present on campus during the conference, for their support. We
also thank the members of the conference steering committee for their hard work, dedication,
and continuous support throughout the preparation and implementation of the conference’s
activities. Moreover, we are grateful to the event management, IT, auxiliary services, media,
v
security, PR, and protocol teams. We likewise extend our thanks to all faculty and staff
members from different committees for their support in organizing the conference and
ensuring its success.
Overall, we express our heartfelt thanks to the keynote speakers, who managed their busy
schedules and graciously agreed to deliver inspiring messages. We believe that AUEIRC’17
was a high-quality event with remarkable success, although you must judge this matter for
yourselves. We are optimistic that you will enjoy reading the collection of papers included in
this book.
Dubai, United Arab Emirates Dr. Ahmed Al-Masri
Londonderry, Northern Ireland, UK Prof. Kevin Curran
vi Preface
Conference Steering Committee Members
Mahir Albanna
Arafat Al Naim
Konrad Gunesch
Anthony Ijeh
Golam Mustafa
Zaire Ruanto
Asma Salman
Assem Tharwat
vii
Contents
A Case Study of Pakistani News Channels: Media Education
and Journalists’Training .............................................. 1
Asad Ullah Khalid
A Cooperative Classification System for Credit Scoring ..................... 11
Dalila Boughaci and Abdullah A. K. Alkhawaldeh
A Critical Evaluation of the Effects of Advertisements Targeted
to Children.......................................................... 21
Tarik Emre Yildirim and Asli Milla
A Gulf College Case Study: Technology Enhanced Students’Learning
Geared with Mobile Devices ............................................ 29
Rowena Ocier Sibayan, Alrence S. Halibas, and Kenneth Ocier Sibayan
A Review Study on the Accuracy of Conversion Between IFPUG FPA
and COSMIC Function Points .......................................... 35
Abedallah Zaid Abualkishik
Analyzing the Role of Human Computer Interaction Principles
for E-Learning Solution Design ......................................... 41
Zahra Al Mahdi, Vikas Rao Naidu, and Preethy Kurian
Automatic Detection of Students Learning Style in Learning
Management System .................................................. 45
T. Sheeba and Reshmy Krishnan
Big Data Security and Privacy Concerns: A Review ........................ 55
Akbar Khanan, Salwani Abdullah, Abdul Hakim H. M. Mohamed, Amjad Mehmood,
and Khairul Akram Zainol Ariffin
China’s Relations with Arab Gulf States.................................. 63
Golam Mostafa
Citizen-Centric Approach in Delivery of Smart Government Services .......... 73
Ayman Ahmad Obedait, Mohamed Youssef, and Nikolina Ljepava
Cloud Concept for Implementing Multimedia Based Learning
in Higher Education .................................................. 81
Vikas Rao Naidu, Anjum Zameer Bhat, and Baldev Singh
Diplomacy in the Internet Age—Challenges and Opportunities for the UAE ..... 85
Melissa M. Cyrill and Aftab Kamal Pasha
Enterprise Product Management in the Digital World ....................... 95
Zornitsa Nikolova and Roumiana Antonova
ERP Security, Audit and Process Improvement ............................ 103
Roumiana Antonova and Georgi Georgiev
ix
Evaluating the Strength of Middle Eastern Monarchies and Republics ......... 111
Khulood Jamal
Exploring the Opportunities and Challenges of Open Source Software
and Its Economic Impact on the Cybersecurity Market ...................... 115
Ismail Alsharif and Adel Khelifi
Feasibility Analysis of Blockchain for Donation-Based Crowdfunding
of Ethical Projects .................................................... 129
Nida Khan and Rachid Ouaich
Foreign Policy of the United Arab Emirates (UAE): Continuity
and Change ......................................................... 141
Mariam Alzaabi
Framing Natural Disaster, Terrorist Attack and Civil Unrest Crises
by Egyptian Journalist and Citizen Bloggers .............................. 149
Naheda Makhadmeh and Geri Zeldes
Humanities Scholar Information-Seeking Behavior: Quantitative Approach ..... 177
Mohammad Khaled Al Shboul, Othman A. Obeidat, and Natarajan Sundar
Hybrid Alliances: Efficiency, Business Continuity and Future Foresight
in a World of Challenges .............................................. 187
Marios Panagiotis Efthymiopoulos
Impact of Corporate E-Learning Systems in Enhancing the Team
Performance in Virtual Software Teams .................................. 195
Rajalakshmi Subramaniam and Senthilkumar Nakkeeran
IoT Based Water Usage Monitoring System Using LabVIEW................. 205
P. Arun Mozhi Devan, K. Pooventhan, C. Mukesh Kumar, and R. Midhun Kumar
Learning Analytics: Developing a Data-Centric Teaching-Research Skill........ 213
Alrence S. Halibas, Bobby Sathyaseelan, and Muhammad Shahzad
Measuring Ciphertext Randmoness Using Die Hard Randomness Index ........ 221
Mohammed M. Alani
Medical Grade QoS Improvement Using IEEE802.11e WLAN Protocol ........ 229
Luae’A. Al-Tarawneh
Memristor-Based Tunable Analog Filter for Physiological Signal Acquisition
for Electrooculography ................................................ 237
Juhi Faridi and Mohd. Samar Ansari
Migration from the Arab Spring Countries to Europe:
Causes and Consequences.............................................. 243
Mohammed T. Bani Salameh
Multi-channel Buffer Enabled Technique for Video Streaming
in IEEE 802.15.4 ..................................................... 255
Razi Iqbal
Multimedia Applications in Education.................................... 263
Smilen Antonov Savov, Rumiana Antonova, and Kamen Spassov
Non-invasive Extremist Identification and Asset Maintenance................. 273
Vladimir Tomaševićand Stanko Bulajić
Open Platform for Network Functions Virtualization in the Digital Era ........ 279
Stela Ruseva, Rumyana Antonova, and Nikola Naidenov
x Contents
Optimizing Turbo Codes for Secret Key Generation in Vehicular
Ad Hoc Networks .................................................... 287
Dhouha Kbaier Ben Ismail, Petros Karadimas, Gregory Epiphaniou,
and Haider Al-Khateeb
PROBSOL: A Web-Based Application to Develop Problem-Solving Skills
in Introductory Programming .......................................... 295
Sohail I. Malik, Roy Mathew, and Maytham M. Hammood
Process Mining of Event Logs from Horde Helpdesk ........................ 303
Radim Dolak and Josef Botlik
Public Library Services to Children in the United Arab Emirates—A Study..... 311
Natarajan Sundar, N. Radhakrishnan, and Mohammad Khaled Issa Al-Shboul
Security and Privacy in Smart Cities: Issues and Current Solutions............ 317
Talal Ashraf Butt and Muhammad Afzaal
Smart City Framework Development: Challenges and Solutions............... 325
Ahmed N. AL-Masri, Anthony Ijeh, and Manal Nasir
Smart City Transportation Services, Customer Satisfaction and Impact
on the Quality of Life ................................................. 333
Aleksandar Aleksic, Nikolina Ljepava, and Marija Ristic
Smart Classrooms .................................................... 339
Zoltan Horvath and Donludee Jaisut
Social Media and Disaster Management in India: Scope and Limitations ....... 349
Dhanashree Giri and Aman Vats
Strengthening Your Social Media Marketing with Live Streaming Video ....... 357
Matthew A. Gilbert
The Complexity of Governing Smart Cities—An Integrated Approach ......... 367
Geetha A. Rubasundram
The Impact of Smart Technology on Advertising: A Case Study
of Pepsi-Egypt ....................................................... 379
Bassant Eyada and Mai El Nawawy
The Onion Router: Is the Onion Network Suitable for Cloud Technologies...... 389
Galia Novakova Nedeltcheva, Elior Vila, and Marina Marinova
The Role of e-Governance in IoT Semantic Interoperability .................. 399
Lyubomir Blagoev and Kamen Spassov
The Role of the Roads and Transport Authority (RTA) in the Transformation
of Dubai into a Smart City ............................................. 403
Hatem Ahmed Adela
The Social Significance of Corporate Security ............................. 413
Dusko Tomic and Eldar Saljic
The Value of Intelligent Cybersecurity Strategies for Dubai Smart City ........ 421
Khulood Ali Jumah AlJarman AlZaabi
User and Item Preference Learning for Hybrid Recommendation Systems ...... 447
Kaavya Prakash, Fayiz Asad, and Siddhaling Urolagin
Using a Simulation Game to Teach the Concept of ERP ..................... 457
Jennifer Nightingale
Contents xi
A Case Study of Pakistani News Channels:
Media Education and Journalists’Training
Asad Ullah Khalid
Abstract
Journalism has witnessed revolutionary transformation in
Pakistan, since the turn of the millennium. The nation that
was exposed to only one government controlled news
channel and then suddenly was put in the whirlwind of
unfiltered flashing news channels, as it stepped in the 21st
century. With the launch of two private news channels,
the practice of journalism appeared as a war for ratings
rather than a medium of information. In the seventeen
years of the millennium, multiple news channels have
mushroomed in Pakistan but the quality of news still
suffers. Freedom and neutrality of the media, particularly
media outlets which broadcast national and international
news, are critical to the growth of any society. This paper
carries out an in-depth study to analyze the reasons for
declining quality of news on Pakistani news media. The
study begins with examining the relevance and suitability
of educational background of the journalists. The jour-
nalists on screen and in the field do not go through the
appropriate training required to be eligible for news
media. The Pakistan Electronic Media Regulatory
Authority (PEMRA) is identified as one of the main
factors for this drawback. PEMRA has been observed to
be ineffective so far. This paper analyses the factors
leading to its unfortunate performance. The inappropriate
congeniality between media persons and political figures
also raises debate that media gets under political
influence. This paper analyses the links between the
afore-mentioned factors in light of the crisis faced by
private news media in Pakistan. It analyzes the quality of
news churned by these media giants by conducting
interviews of leading journalists and media persons.
Keywords
Pakistan PEMRA Journalism Private news channels
1 Introduction
The social nature of this world is perpetual and it always
remains in the state of change. In such a state, a society can
remain cohesive and integrated only through the means of
communications. The level of national cohesion and inte-
gration is directly proportional to the quality of communi-
cation means in that nation and media unarguably is the
single most important mean of communication which keeps
society informed and integrated despite the existence of
countless divides on linguistic, ethnic, racial and sectarian
levels. A responsible and well-trained media empowers the
individuals in society through informing them about the
events. In a religious and political pluralistic society, like
Pakistan, the most important task of media is to make every
faction of the society cognizant about various
socio-economic issues and their different interpretations
which lead to a peaceful synthesis on those issues helping
out charting a national strategy. For the government alone
this task is beyond impossible in an era where information of
all sorts and sources flows unchecked through various
mediums including completely uncontrolled social media.
With this growing role of media, government and
nation-state are required to act as more transparent and
unbiased regulators with a closer look at issues pertaining to
quality of journalism and issues which usually lead to
journalistic biases.
Electronic media is the most robust form of media today.
But its scope is often misunderstood. A Large part of Pak-
istani society considers TV news channels as the only
incarnation of electronic media. It would be prudent to
define the concept and scope of electronic media at this
juncture of discussion. “Electronic media are those com-
munication mediums which are based on electronic or
electromechanical means of production and most often dis-
tinguished from print media”[1]. Most commonly known
sources of electronic media include radio, television, audio
and video records and online live streaming services.
A. U. Khalid (&)
American University in the Emirates, Dubai, UAE
e-mail: asad.khalid@aue.ae
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_1
1
Notwithstanding the growing internet culture, TV chan-
nels remain the main sources of information and entertain-
ment in Pakistan. Expansion of cable network services
throughout the country during the last decade or so has
rendered News Channels a primary source of information for
those who are literate but do not have access to print media.
And then there are some intrinsic limitations attached to
print media. It cannot compete with the live electronic media
and real-time analysis available through it. Print media has
limited coverage and scope. One newspaper is usually
published from multiple cities raising various local issues
while addressing few national level issues. On the other
hand, electronic media has no such limitations. Due to these
reasons, television news channels in Pakistan have emerged
as the only truly affordable and accessible means of news
and their implications. News Channels have now become an
influential stakeholder in the Pakistani polity.
Due to the limited scope of this paper, the discussion will
focus primarily on the issues related to the quality and
authenticity of private news channels as, in Pakistani society,
these channels are the largest and most influential stake-
holders in public opinion making. TV remains the biggest
and fastest growing news medium followed by Radio and
internet news portals [2].
2 Literature Review
Review of the existing body of literature is covering the
history and the transformations media has gone through
since the establishment of Pakistan. This is to develop an
understanding whether the quality of media content has
suffered or improved in its long journey from a single state
controlled channel to a list of comparatively free multiple
media channels.
2.1 Evolution/Metamorphosis of Pakistan’s
Media Industry
“This is Radio Pakistan”, these were the words which were
uttered by ZahoorAazar in English, and Mustafa Ali Ham-
dani in Urdu on the historic day of 14th August 1947. This
was the birth of electronic media of Pakistan. Just like many
developing and even developed countries, Radio became the
major source of news and entertainment programs. It was
established with the official name of Pakistan Broadcasting
Service. 1973 constitution provided new guiding principles
and objectives “to publish, circulate, distribute and regulate
(reliable and trusted) news and information in any part of the
world in any manner that may be deemed fit”[3]. The role of
Radio Pakistan is also important in national electronic media
evolution as its infrastructure and human resource provided
the basis of the TV industry in the country.
2.2 Genesis of TV Channels in Pakistan
Pakistan first Television channel was a state-owned terres-
trial TV service named as “Pakistan Television”or PTV. It
was established in existing Radio Pakistan’s building in
Lahore in 1964 with transmission began on 26th November
same year. This state-owned channel was originally a private
venture which commenced around 1961 by few individuals.
The government of Pakistan took control over it and estab-
lished PTV as a joint venture as Nipon Electric Company
(NEC) [4]. In 1967, as a major business step, PTV was listed
in the stock market as a joint venture between the govern-
ment of Pakistan and private business entities. In 1984, the
government of Pakistan introduced Companies Ordinance
1984 to govern the companies working throughout the
country. Eventually, PTV was also converted into a corpo-
ration after the promulgation of this ordinance.
Despite major challenges, both technical and financial,
PTV proved a great source of infotainment for Pakistani
society. It highlighted many social issues but complete
control over PTV by the government of Pakistan dictated its
editorial policies for decades. Nevertheless, following gov-
erning principles and goals for Pakistan’sfirst TV channel
were laid out:
•Education and insight.
•Enhancement of knowledge and information.
•Healthy entertainment service.
•Preferment of national identity and enhancing national
integration.
•Dissemination of news in a just, impartial, realistic
manner free from dishonesty by insinuation and exclu-
sion [5].
Last two objectives remained largely elusive as PTV as a
news medium only presented the state’s point of view on
every critical juncture of our national history. For example,
during the wars of 1965, 1971 and Kargil conflict with India,
PTV presented the state of Pakistan’s view effectively but
seldom entertained any critical views regarding these con-
flicts. Similarly, PTV would cover the debate on Pakistan’s
political and financial progress over the years from only one
vantage point and that’s of government’s most of the times if
not always. There used to be a gap between PTV’s coverage
of national issues and ones covered by print media of the
country. This would leave a big question mark on the
authenticity of these stories and analyses PTV would air.
The need of critical evaluation from a private and objective
2 A. U. Khalid
vantage point was almost palpable as media in the world
over and in the region was moving towards more openness
in analysis and debate on various issues.
By 1990s, Semi-private and private TV channels began to
emerge on the infotainment horizon. NTM (National Tele-
vision Marketing) was first such endeavor undertaken by a
private company Interflow. Channel-3 (later became ATV)
was a semi-private venture between PTV and private entities
and became the first non-PTV channel to be aired on the
terrestrial network.
2.3 Media Boom
TV and News channel landscape changed completely within
next two decades when the government allowed first full
private news channel as a result of deregulation of electronic
media in 2000. In 2002, an independent and fully autono-
mous regulatory body by the name Pakistan Electronic
Media Regulatory Authority (PEMRA) was established as a
regulator of privately owned electronic mass media.
PEMRA is official license issuing federal authority which
authorizes channels and set up their infrastructure and starts
broadcasting.
Since then, a rapid development of news channels, mostly
owned by print media houses (Jang, Duniya, Express etc.)
Today, there are nearly 90 Satellite TV Channels in Pakistan
with around one third being a news channel. There are more
than 2000 cable operators which are the main source of
transmission of satellite broadcasts from these news chan-
nels to the local viewers. Many large new channels are being
operated from abroad.
Apart from these Pakistani private news channels, there
are more than 25 foreign channels are accessible as they
have landing rights. These include biggest names of inter-
national news like BBC, CNN, Sky, RT, Star etc. Billions of
dollars have been invested in Pakistani news channels and
thousands of jobs were created for journalists, correspon-
dents, news editors, copywriters, graphic designers and
much more. According to one estimate, the indirect
employment is more than 6.5 million.
It was believed that this rapid growth of mass electronic
media in Pakistan would play a constructive role in national
cohesion and integration by making available more knowl-
edge and up to date information which official news chan-
nels like PTV would ignore.
Pakistan’s private media took birth in post 9/11 envi-
ronment when the entire region began to drift into a strategic
flux. Due to close proximity with Afghanistan where ISAF
forces led by the US would hunt Al-Qaeda and Taliban
fighters, Pakistan over the years earned “reputed status of
being the eye of the global security storm”[6] once Pakistan
decided to become part of the international coalition against
global terrorism. It became an insurmountable challenge for
electronic media to cover the war on terror in FATA and
large restive parts of KPK province. What role Pakistani
electronic media played in such restive security milieu for
national cohesion and integration by shaping public opinion?
How these events affected Pakistani electronic media and did
Pakistani media challenge the protracted nature of Afghan
conflict—hence did it challenge a narrative US media nur-
tured on the behalf of the US establishment? These are all
critical questions which are still relevant because the war in
Pakistan is far from over despite solid military gains during
the last 16 years. But before looking for answers to these
questions, it would be prudent to understand the significance
of a free and natural media in the context of the societal,
regional and global scenario.
2.4 Significance of Free and Neutral Media
“States can be developed and built by deliberate human
actions. Nations evolve almost always through a kaleido-
scopic, spontaneous, multi-layered natural process, not
subject to human will alone, except in some rare cases. The
distinction is necessary at the outset as we proceed to
examine how man-made factors such as media and others
can influence the process of national as well as state
development”[7].
In any democratic society, the foremost responsibility of
any media is to protect and present facts to its audience.
Objective reporting is meant to portray issues and events in a
neutral and unbiased manner, regardless of the writer’s
opinion or personal beliefs [8]. State own media can also act
as custodian of fact but in the peculiar case of Pakistan
especially and elsewhere generally, it always remains sus-
ceptible to pressures of all kinds from power echelons of
ruling elite. On the other hand, the real strength of privately
owned electronic media lies in its ability to withstand any
imposed censorship by government departments.
Electronic media’s significance adds value to any
democracy as it acts as a bridge between the democratic
regime and masses and its ability to transmit important
developments instantaneously plays a key role in dispelling
conspiracies and propaganda. This aspect of electronic
media (both TV and internet) is critical for fragile democ-
racies like Pakistan. Numerous studies have established that
a society remains deprived of progress and prosperity if it
constantly remains in the state of uncertainty about the
prospects of peace, stability, security, good governance and
impartial implementation of constitutional rights. Electronic
media through its vast and effective outreach can ensure that
society avoids this sort of deprivation and uncertainty. The
electronic media may pinpoint social surroundings that repel
transformation and become a reason of social fragmentation.
A Case Study of Pakistani News Channels: Media Education …3
Media all over the world established its significance in the
areas pertaining to public affairs and national development
regardless of the specific type of governance and geography
of that state. In the context of national building and culti-
vation of national cohesion, media is a significant force. It
motivates national unity and identity, and not always
because of the fact that it is owned by the state or controlled
by the government like PTV but to express its own vision
and agenda. In politics, Media has been playing an important
role in ushering democratic cultures in erstwhile since 2010
when the phenomenon of “Arab Spring”hit many of the
authoritarian regimes in the Middle East and North Africa.
Interestingly, only one Arab news channel Al-Jazeera
became the spearhead of media coverage of this phe-
nomenon and it’s remained uncensored as its editorial con-
trol was located in Qatar.
Apart from strengthening democracy, the role of elec-
tronic media is significant in keeping the society on the
correct intellectual and ideological trajectory. It is more
critical in a world where information flow has become
omnidirectional and it has become an impossible task for
any state to completely censor the content. Social media
revolution of the 21st century has reshaped the entire con-
cept of electronic media. In such a complex society, elec-
tronic media news channels are expected to provide only
authentic and factual reporting about issues related to com-
mon people like routine work, art, education, entertainment,
healthcare, tourism, fashion and anything else that we have
to do on daily basis.
Media’s significance in economic decision making has
also increased during the recent past. Media has made every
faction of society more aware about the requirements of
infrastructural development so that socio-economic uplift
can trickle down to individual level. It has become possible
as rapid technical evolution in communication devices has
enabled each individual to access the news content relevant
to his area of work. Time barrier of transmission used to be a
big hurdle in universal access of broadcasted news bulletin
in the past. It is no longer an issue when the live and
recorded news streams can be accessed by everyone at the
most convenient time. Apart from that, electronic media is
acting as powerful free market advocate. This stirs a lot of
economic activities as electronic media disseminates a large
amount of marketing and advertising content. By taking this
role, media acts as an extension of free market economy.
In the field of education, media has emerged as the engine
behind the germination of new ideas. News about every
major breakthrough travels around the world breaking the
barriers of language and cultures. Media has introduced the
idea of cross pollination of cultures which has played a
significant role in the advancement of sociology, psychol-
ogy, social studies and many more domains of knowledge.
Now young masses around the world are more aware of
different cultures and their value systems. In nutshell, the
effective strength of mass media can be summarized as:
“attracting and directing public interest; persuasion in mat-
ters of opinion and belief; influencing behavior; structuring
definitions and realities; conferring status and legitimacy and
informing quickly and extensively”[9].
2.5 Electronic Media in Pakistan
Pakistani society witnessed a rapid and unprecedented
development and expansion of media TV Channels after
2002. Now, it has established itself as “fourth pillar of the
State”or simply as “the fourth estate”as was once recog-
nized by the nineteenth-century British politician Lord
Macaulay who coined this term “in recognition of the sig-
nificance the mass media plays both as a social institution
and a political forum for debate”[10]. It has assigned itself a
role of government critic and this is nothing different from
what electronic media practice elsewhere in the world. But,
in the peculiar political culture of Pakistan where
civil-military imbalance has remained a stumbling block for
democratic culture, this remains a trickery endeavor.
Former US Secretary of State, Hillary Clinton, in 2009,
described Pakistani media as increasingly, “freewheeling…
free, [and] quite influential”[11].
It is an undeniable fact that today electronic media has the
capability to form opinions and attitudes of masses either in
favor or against a particular topic or idea. From national
cohesion standpoint, this ability of electronic media can
generate a positive outcome for the state only if this power
of electronic media is channeled properly by the regulator
and everyone in the media industry is also equipped with
right kind of journalism training and knowledge especially
about journalistic ethics in conflict zones. There is no doubt
that if applied positively, its contribution in achieving
national integration, socio-economic uplift and in building a
cohesive, tolerant and forward-looking society cannot be
overemphasized [12]. But this is theoretical aspects of
journalism and its practical implementation is only possible
in a media environment where each stakeholder like media
houses, journalists and regulator are well aware of their roles
and responsibilities.
2.6 Role and Responsibilities of Media
Persons/Journalists
“The power of the journalist is great, but he is entitled nei-
ther to respect nor admiration because of that power unless it
is used aright. He can do and often does, great good. He can
do and often does, great mischief…Offenses against taste
and morals, which are bad enough in a private citizen, are
4 A. U. Khalid
infinitely worse if made into instruments for debauching the
community through a newspaper”[13].
This statement by former US president Theodore Roo-
sevelt succinctly summarizes the roles and responsibilities of
a journalist and provides guidelines for the community of
journalists. This statement contains in it the primary role (or
more appropriately responsibility) of a journalist which was
described as a gatekeeping role by J Singer in these words,
“journalistic ethics, as they are codified and articulated by
both individual practitioners and journalism organizations or
institutions, can be seen as stemming from this perspective
of the journalist as gatekeeper”[14].
Interestingly, journalists in the gatekeeping role in the
context of the flow of information have responsibilities to the
both sides of the gate. Journalists are responsible for the
propagation of information to the masses but at the same
time, they are also responsible for deciding what masses
must avoid due to reasons associated with quality and
authenticity of that particular information.
Journalists also have an obligation to present all sides of
any reported story. This falls in the category of the ethical
responsibility of journalist which is a fundamental demand
of objectivity. Journalists must avoid going with popular
opinion on sensitive subjects because that leads to sensa-
tionalism and jingoism. Following popular views, without
any empirical evidence, often hinders the need of doing
proper research through reading existing material and his-
torical records. Moral integrity of any journalist determines
who good gatekeeper he is in this age of information where
information flows on social media more quickly without
being authenticated or verified.
Journalists are also assumed to put public interest
supreme over the interest of their organization or personal
agendas. This critical role is the most challenging one in the
contemporary world. In this respect, there is a need to
redefine the role of the journalist as a gatekeeper in infor-
mation flow. In today’s interconnected world, providing
information to masses alone is not enough. It is also a
responsibility of modern age journalist to make “people
understand, interpret, and use information, rather than
merely giving them access to it”[15,16].
3 Methodology
In-depth interviews of leading media professionals and
journalists are conducted to get to know their opinion about
the practical steps taken by both the official regulator and the
journalistic community in the country to ensure quality of
media content.
Interpretation and Analysis of Interview Data
Following are the themes developed after qualitatively ana-
lyzing the data collected by the in-depth interviews of
journalists.
Role of Electronic Media Persons and Situation in
Pakistan
Electronic media in Pakistan has suffered from the quality
crisis on more than one occasion and at times it has become
the cause of harm for national cohesion. This media
predicament is not the outcome of the failure of single
stakeholder. There has been a general lack of understanding
about the role and responsibilities of media persons, man-
agement, regulatory and individual journalists. This lack of
understanding is not limited to media persons alone. A Large
faction of public also considers the media a solution provider
for their socioeconomic qualms. This misplaced expectation
provides a wrong sense of responsibilities. This failure of
media naturally raises the need to investigate the core rea-
sons and issues behind media’s inability to present an
informed and educated opinion about various issues per-
taining to Pakistani masses.
Factors Affecting/Impacting Media Persons’Performance
Journalist community in Pakistani electronic media has
failed in playing the roles which has been discussed in the
previous section as Pakistani media today lacks in quality
and substance of its news stories and reports. As mentioned
in one of Media Watch columns, “The lack of substance in
the Pakistani commentariat does not need any elaboration
because TV pundits would reveal that they spend almost no
time on research, following instead the ‘park and bark’
model of punditry”[17]. This is why this community often
fails to correctly indicate the future directions of the current
events. To a large extent, journalist community of Pakistan is
to be blamed for this predicament but certainly, they are not
the only culprit here. This section highlights some key fac-
tors which can be described as the cause of lack of substance
and quality in Pakistani electronic media.
Policy Failure
The most important challenge for Pakistani news media
channels is the absence of any code of conduct for coverage
and reporting. This absence of a code of conduct is the
outcome of the inability of successive Pakistani governments
in forming a national electronic media policy. There is a
A Case Study of Pakistani News Channels: Media Education …5
need for the formation of a wide-ranging and inclusive
electronic media policy so that this media can play a con-
structive role in national cohesion and integration,
strengthening the democratic values and providing masses
with access to facts with more transparency. All these policy
objectives must act as broader contours of this media policy
which will eventually be able to set the intellectual direction
of national debate on the electronic media.
Business Interests Versus National Interests
A more recent phenomenon driving media houses is the role
of advertisers Media houses also failed to nurture a culture of
quality journalism. As electronic media has become an
industry in the country, the biggest driver behind its devel-
opment is the urge of making more money just like any other
business in the world. This pursues of monetary benefits
often push media narrative which contradicts with national
interests. The state is criticized more for the failures of ruling
elite or government. Institutions are demonized by media
instead of individuals who breached the law.
It is noticed worthy fact that except one media house, in
Pakistan, all of the rests are family-owned business ventures.
Almost total control lies with few individuals with the power
to overrule any professional advice. This total control
enthralls these influential individuals to push ‘personal’
agendas into the information mainstream for some monitory
gains.
It has been established in a commission’s report that
today “advertisers virtually dictate prime time content pref-
erences by using a narrow, relatively non-representative,
heavily urban and consumption oriented rating system to
pressurize channels into the cut-throat competition and to a
lowering of standards of content”[18]. This commission was
constituted by Supreme Court of Pakistan.
Sensationalism Versus Facts
A natural outcome of the first factor is the trend of reporting
controversial, sensational and negative news in breaking
news manner and that too without discussing the root causes
of those events. Pakistani electronic media has assigned
itself the role of interpreting good or bad for society. Failure
of the regulator is obvious in this predicament. This is per-
haps the biggest challenge media is faced with in playing its
due role in the socio-political development of the society.
Lack of Journalistic Training
Pakistan’s electronic media often confuse government with
the state in its coverage, criticism, and analysis. Government
due to owning all the political and administrative authority
can be criticized on bad governance but the state must not be
criticized. The need of keeping national interest supreme
over the media houses’own interests is an important one.
Lack of proper training of journalists and anchorpersons is
highlighted during the debate on different national issues on
regular basis. The state is often criticized with zeal for the
government failure to perform. This trend has painted a
bleak picture of Pakistan as a nation state and national
harmony among vital institutions like parliament and armed
forces. In the debate of civil-military relations and history of
military’s role in national polity often leads to criticism of
the armed forces. Another disturbing aspect of this lack of
proper journalists’training is a distortion of facts and
inability of avoiding favoritisms, predispositions and unde-
sirable perceptions. Last but not the least due to lack of
proper training, media often becomes a source of social and
political fragmentation of viewers as it tries to sensationalize
them by offering choices of opinion instead of the unified
presentation of content about sensitive national issues.
According to Media Commission Report 2013 released
by Supreme Court of Pakistan, the State-owned Pakistan
Broadcasting Corporation, larger media houses, as well as
smaller/private media organisations attempt to sustain a
‘profitable’business; they often do not put a lot of effort and
money into building the capacity of their employees.
Training and professional development programmes are few
and even they are often avoided by the over-worked
employees themselves.
Absence of Code of Conduct
The biggest problem with PEMRA is its power of making
laws regarding electronic media on its own just by issuing
notices and press releases. This is against the spirit of the
constitution. Only elected legislators have the right to make
or amend any new laws. The government must restructure
the PEMRA with in comprehensive and unambiguous
manner. Vaguely defined clauses like “reasonable restric-
tions imposed by law”[19] must be eliminated from this
ordinance. Principally, Executive in the country must act
under the authority of legislation and constitution. The
biggest failure of PEMRA is its inability to introduce any
electronic media code of conduct. Political appointment at
the top post is another problem with PEMRA.
According to the Media Commission Report 2013, pub-
lished by the Supreme Court of Pakistan, 67.5% persons
who received training, undertook it with NGOs, followed by
37.5% with their employers. More women undertook their
training with NGOs and the IFJ, as compared to men.
But more men took their training with their employers and
with unions, compared to women respondents, the Report
states.
6 A. U. Khalid
Class-Based Representation
Among the various challenges faced by media is the social
evil of class based fragmentation of society. Electronic
media is to provide news and programming to post-colonial
and post-millennial Pakistan, where the enormous disparity
in education and wealth among its nearly 200 million citi-
zens manifests itself as severe barriers in accessing objective
journalism [6]. As a result of this, today, a large segment of
society read Urdu newspapers which publish relatively more
conservative views while covering certain societal issues.
Meanwhile, English press is read by ruling elite and often
offer a more secular view. This is a perilous situation from
the social point of view as it deepens the social divide and by
providing two different kinds of content to two different
classes, it is creating an intellectual fault line as well which
ultimately would pose a challenge to efforts for national
cohesion and integration.
Mushroom Growth of Media Channels
The uncontrolled and mushroom growth of media channels
in Pakistan has contributed towards abating quality and lack
of substance of news stories. “The increase in the number of
mass media outlets in Pakistan over the last decade has never
managed to provide answers to the general public’s concerns
that they only serve particular political or commercial
interests. Though the Pakistani mass media have become
more accessible to the citizenry and have also invested more
time and resources into enlightening the public on issues of
human rights, good governance, democracy, and
nation-building”[20].
Lack of Training of Media Persons and Journalists
It is evident from the historical context of the discussion so
far that the quality of journalism in Pakistan suffered greatly
from policies of reining control over media by the successive
governments. Failure in providing an adequate level of basic
training to journalists and other media persons has also
complicated the situation. The impact of these failures was
apparent as soon as private electronic media channels were
allotted the license to put their news feeds on air. The risk of
poor quality was admitted by the senior journalists and their
official bodies. “Press clubs’representatives from across
Pakistan agreed that the rush for breaking news combined
with the unprofessional attitude of editors, newsroom staff,
and media houses leave journalists working in the field
vulnerable and at risk”[21].
Despite this clumsy beginning, today, a number of NGOs
and semi-private organizations are working for journalism
training in Pakistan. The most prominent is the “Media
House”which was established in Pakistan with the purpose
to build the capacity of the working journalists in Khyber
Pakhtunkhwa (KP) and the Tribal Areas in particular,
Balochistan and the rest of Pakistan in general [22]. The
organization was established with conflict transformation
and resolution as major goals particularly issues pertaining
to Pakistan-Afghanistan bilateral relations. Most recent
ventures of Media House include the development of uni-
versity curriculum of Media studies and journalism,
enhancing the professional capacity of existing journalists
with a specific focus in the areas of Conflict Reporting.
Conflict-sensitive Journalism is an area of special focus
along with physical and digital safety in conflict reporting;
psychological risks; ethical standards in crisis reporting. The
role of journalism as a mean to achieve the national cohesion
and integration through the strengthening of local govern-
ment system is also among envisioned goals. Effective,
authentic and unbiased media coverage has been considered
as a most efficient way to meet these ends [22]. The NGO
has published a number of journalism manuals and guide-
lines on all above-mentioned topics.
Despite these sincere efforts by NGOs and some media
houses, the issue of poor or no training of young journalists
would remain unresolved unless government came up with a
robust media policy that can provide professional guidelines
for the electronic media.
4 Conclusions
The foregone analysis has established that electronic media
has a critical role in national cohesion and integration by
improving public understanding of the masses. This analysis
also defined the significance of electronic media in a
democratic society. Finally, this discussion tried to answer
the fundamental question if currently Pakistani electronic
media is playing that role in Pakistani polity. It was found
that right now though Pakistani media has made masses
more knowledgeable about the events in Pakistan and region
but more than often media has suffered in presenting the
correct perspective of these developments. Hence there is a
lot of room for improvements.
The paper presented a historical perspective and it was
highlighted that electronic media in Pakistan remained under
the strict control of government and masses were bound to
listen and witness official narrative about any issue. Electronic
media in Pakistan witnessed a rapid expansion and growth at
dawn of 21st century when licenses for private news channels
were first awarded. PEMRA has established a regulator and
official media watchdog under the PEMRA Ordinance 2002.
A Case Study of Pakistani News Channels: Media Education …7
Significance of electronic media was studied in this paper
and it was found that electronic media has a multi-
dimensional impact on any society and in countries like
Pakistanits role becomes more significant. It was learned that
being the most effective and fastest growing medium of
communication, electronic media has the ability to form
positive or negative opinion making and attitude building.
The strength of electronic media lies in its ability to cover
important issues pertaining to the socio-political and
socio-economic development and steer the collective con-
science towards the right direction.
Next, the paper debated if Pakistani electronic media is
playing this important role in the country which unfortu-
nately is not the case. Investigating and highlighting the
issues with electronic media which cause degradation of the
quality of electronic media in Pakistan was the next logical
step. It was found that like in many other developing
democracies, electronic media in Pakistan also suffers from
restraints like vested interests of media house owners,
nepotism, poor management, political motives and lack of
properly trained human resources in media houses. Specific
issues faced by Pakistani electronic media due to these
restraints were highlighted.
Lack of objectivity in respective editorial policies and lack
of understanding of the correct context of events were sighted
the two most important issues Pakistani electronic media is
faced with. The culture of ratings has also affected Pakistani
media’s credibility in a negative way. Non-professional
approach by untrained journalists contributes towards the
propagation of unverified and scandalous news stories.
While investigating the root causes, it was established
that PEMRA has failed to act as an impartial and truly
independent media regulator. But a most strenuous issue is
the absence of any national media policy. The paper rec-
ommendations put it at topmost priority among other steps
which needs to be taken to made Pakistani electronic media
a vibrant force acting as custodian of fact, providing learned
opinions and analysis on current affairs, highlight gover-
nance issues, presenting Pakistan’s narrative on extremism
and terrorism and most importantly guiding the masses in
the right direction.
5 Recommendations and Way Forward
•Formation of National Electronic Media Policy: The
problem of lack of national narrative on key issues like
terrorism and extremism can be catered effectively
through such well-defined national debate. Furthermore,
such a policy would eventually lead to strengthening the
state institutions and restoring public confidence in
national institutions like parliament, judiciary, and armed
forces. A confident electronic media is a fundamental
requirement for a vibrant social structure. Pakistani
electronic media is missing its contribution to the
national effort because of this policy failure. This defi-
ciency must be addressed on war footings.
•Restructuring PEMRA: Current media predicament
demands a review of PEMRA Ordinance 2002 by the
parliament to make it more in line with Article 19 and 14
of the constitution of Pakistan. Most importantly,
PEMRA must work under a supervisory over watch of
legislators in a committee with a mandate to intervene
whenever PEMRA transgress its jurisdictions.
•Providing Journalistic Education and Training
The government along with the cooperation of electronic
media should ensure the provision of adequate education
of journalism and training for buddingjournos in Pak-
istani media industry. Political mediocrity within the
national electronic media can be overcome only through
well-trained journalists and media persons. There is a big
vacuum in professional training in all the spheres of
journalism i.e. reporting, copy writing, investigative
journalism, editing, presentation etc.
•Curbing Mushroom Growth of News Channels
One of the major reasons of poor quality of news content in
Pakistani electronic media is the uncontrolled mushroom
growth of news channels. The rule of supply and demand
was ignored initially by PEMRA and licenses for news
channels were issued without accessing the requirements
or putting in place measures to ensure that every new
license seeker has met certain criteria of trained human
resource including journalists, news editors, reporters,
correspondents etc. Consequently, the TV screens were
filled with sub-standard content and misplaced analysis on
vital issues. Channels indulged into a war of ratings
without improving internal structures, editorial policies,
and human resources development. This further compli-
cated the quality of news issues. In order to address this
issue, Pakistani government must ensure to declare a cri-
terion for media houses seeking new licenses. The growth
of electronic media must not go unrestrained.
•Ensuring Wellbeing of Journalists/Media Persons
Media laws in Pakistan must be implemented in letter
and spirit to ensure that all the workers in electronic
media channels are getting their salaries and other dues
and rights properly. There have been issues of poor
financial management on the part of higher management
in many channels due to which journalists and workers
there suffer from delayed salary payment and deduction
in other dues which are promised by these channels at the
time of signing the contract with specific individuals.
8 A. U. Khalid
References
1. Sharma, R.: Electronic Media: Issues and Innovations. Regal
Publications, New Delhi (2007)
2. Naseer, S.: The state of electronic media in Pakistan. Presentation
by Media Logic. http://www.umt.edu.pk/icobm/data/Presentation/
The%20State%20of%20Electronic%20Media%20in%20Pakistan.
pptx
3. E-Government: The PBC Act of 1973. Electronic Government of
Pakistan. Directorate for Public Relations and International Press
Release, PBC Law Ordnance
4. Pakistan Television Official Website: www.ptv.gov.pk, Last
accessed 15 Nov 2017
5. Ali, Z.: Role of electronic media in changing value system in
Pakistan. Int. Asian Res. J. 1(1) (2016)
6. Khan, W.: The evolution of our media. The Express Tribune,
https://tribune.com.pk/story/6910/the-evolution-of-our-media,16
Apr 2010
7. Jabbar, J.: Role of media in national development in the 21st
century. Criterion Q. 2(2) (2013). http://www.criterion-quarterly.
com/role-of-media-in-national-development-in-the-21st-century/
8. Clark, R.: The Pyramid of journalism competence: what journalists
need to know. Poynter. http://www.poynter.org/2014/the-pyramid-
of-journalism-competence-what-journalists-need-to-know/251048/,
2014/5/12
9. Graeme, B.: Media and Society: Critical Perspectives, p. 25. Open,
Berkshire (2005)
10. Khokhar, A.: Freedom and Reform: The Political Power of Mass
Media. Institute of Strategic Studies Islamabad, http://www.issi.org.
pk/wp-content/uploads/2014/06/1299566802_38042370.pdf (2014)
11. Eleazar, S., Khan, A.: Pakistan’s media unraveled. Himal South
Asian, http://himalmag.com/pakistans-media-unraveled/, 26 Dec
2016
12. Khan, A.: Electronic media in Pakistan. Paper submitted to
National Management College, Lahore, Pakistan, 2010. Treasure
Chest Blog, https://zjeddy.wordpress.com/2010/07/28/electronic-
media-in-pakistan-by-azam-khan (2010)
13. Roosevelt, T.: The Man in the Arena. Speech, Paris (1910)
14. Singer, J.: The journalist in the network: a shifting rationale for
the gatekeeping role and objectivity norms. Tripodos 23,61–76
(2008)
15. Schudson, M.: The Power of News. Harvard University Press,
Cambridge (1982)
16. Kovach, B., Rosenstiel, T.: The Elements of Journalism: What
News People Should Know and the Public Should Expect. Crown
Publishers, New York (2001)
17. Media watch: Shots in the dark. Pakistan Today, https://www.
pakistantoday.com.pk/2017/05/20/media-watch-shots-in-the-dark/,
20 May 2017
18. Iqbal, N.: Commission suggests review of media laws. Dawn,
https://www.dawn.com/news/1028857, 14 July 2013
19. Ministry of Information: Broadcasting, GoP, PEMRA Ordinance
2002. Government of Pakistan, Last accessed 21 May 2017
20. McQuail, D.: Mass Communication Theory. Thousand Oaks,
London (2000)
21. PPF: Rush for ‘Breaking News’putting journalists at risk: press
clubs’reps. Pakistan Press Foundation, http://www.pakistan
pressfoundation.org/rush-for-breaking-news-putting-journalists-at-
risk-press-clubs-reps/. 23 Dec 2016
22. About US Page, Media House, http://mediahouse.com.pk/about-
us/, Last accessed 21 May 2017
A Case Study of Pakistani News Channels: Media Education …9
A Cooperative Classification System
for Credit Scoring
Dalila Boughaci and Abdullah A. K. Alkhawaldeh
Abstract
Credit scoring (CS) is an important process in both
banking and finance. CS is a score measure that helps
lenders and creditors to see how good the borrower is. It
indicates how likely the borrower is to pay back the owed
debt, based on its past borrowing behavior. For instance,
this score can be used to avoid risk and provide an
objective analysis of the applicant’s creditworthiness
which reduces credit risk. Also CS allows the automation
of the lending process which leads to increase the speed
and consistency of the borrower’s application. In this
paper, we propose to use agents’technology to develop a
cooperative classification system for credit scoring.
Empirical studies are conducted on five well-known
financial datasets. We distribute the complex classifica-
tion problem on a set of intelligent and cooperative agents
where each agent evaluates a given machine learning
algorithm on the considered dataset. The use of agents in
the classification process provides a high degree of
flexibility and allows for a faster time scale of data
analysis.
Keywords
Credit scoring Credit risk Machine learning
Cooperative agents Intelligent agents Financial
datasets
1 Introduction
Credit scoring (CS) is a crucial problem for banks and
financial institutions especially after crisis 2006. The finan-
cial institutions have to find good techniques to select
counterparties. A credit score is then an evaluation that helps
lenders and creditors to see how good the borrower is and
indicates how likely the borrower is to pay back the owed
debt, based on its past borrowing behavior [1].
Several studies in finance and banking have shown the
importance of CS. For in-stance, the credit score is one of
the most powerful predictor of risk [1]. It provides an
objective analysis and helps in the decision making whether
grant credit to client or not. CS helps in managing loan
portfolios and in reducing the cost of the credit evaluation.
The credit evaluation is the process that evaluates the cus-
tomer’s credit-worthy based on some related variables and
decides whether accepting or rejecting the customer’s
credit [2].
This importance of CS has led to the development of
various techniques for building models for CS. Almost of
them are based on statistical and machine learning tech-
niques [3,4]. Among the statistical methods studied for CS,
we give as examples: the linear regression [4], the discrim-
inant analysis and the logistic regression based methods
which are one of the most broadly established statistical
techniques used to classify clients as “good”or “bad”[5].
Also, the decision trees [6], the classification and regression
trees (CART) [7], the neural networks [8], the support vector
machines (SVM) [9,10] and the Bayesian networks
(BN) [11] have been studied for CS. Some sophisticated
models based on computational intelligence are also studied
for developing credit scoring models. Among them, we give
for examples, the genetic programming [12], the k-Nearest
Neighbor (k-NN) classifier [13], the evolution strategies [14]
and the ensemble classifiers [15].
In this paper, we propose to use the agent’s technology to
develop a cooperative classification system. Our choice is
D. Boughaci (&)
Computer Science Department, LRIA-FEI- USTHB,
Algiers, Algeria
e-mail: dboughaci@usthb.dz
A. A. K. Alkhawaldeh
Department of Accounting, Faculty of Economics
and Administrative Sciences, The Hashemite University,
Zarqa, Jordan
e-mail: alkwaldhh@yahoo.com
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_2
11
justified by the advantages of the cooperative work offered
by agents where the classification system can benefit from
them.
An agent is a program or an autonomous entity, reactive
and able to communicate with others entities or systems. The
agent’s technology has been used with a great success in
different domains in particular in electronic Commerce,
telecommunications and computer security [16,17].
This work proposes an agent based system for CS. It uses
a range of machine learning algorithms. We consider six
classifiers which are: Random Forest [18], Bayes Network
[11], Logistic classifier [19], OneR [20], Logit Boost [21]
and AdaBoost [22]. We perform credit scoring task on some
well-known financial datasets from UCI (University of
California at Irvine) [23]. We use also the huge “Give Me
some credit”dataset from Kaggle web site [24].
The rest of the paper is organized as follows: Sect. 2
presents the proposed classification system based on agents.
Some preliminary results are given in Sect. 3. Section 4
concludes and gives some future works.
2 Proposed System
The overall proposed system is depicted in Fig. 1where a
set of agents are used to handle the classification task. The
agents work in parallel and in a cooperative manner by using
several machine learning techniques.
We used two kinds of agents: agent’s classifiers that
evaluate the machine learning technique on the considered
dataset. The coordinator agent distributes the work among
the agents participating in the classification task. Then it
receives the different classification results from the classifiers
agents and selects the best one.
The technique used by each classier agent is mostly to run
an algorithm on some training data to get a model. Then, we
apply this model on new or test data to find the appropriate
class. In our case, the example data are partitioned into
training and testing examples, approximately in the propor-
tion of 70–30%, respectively. Credit scoring models are
constructed on the training example data by using the con-
sidered machine learning algorithms and validated on the
testing data.
2.1 The Classifiers Agents
We propose to use six types of classifier agents. The
machine learning techniques considered in this study and
that may be used by the set of agents are as follows:
Random Forest (RF): which is a forest decision tree
classifier based on a multitude of decision trees where each
tree gives a classification [18]. The RF agent chooses the
classification having the most votes over all the trees in the
forest.
Bayes Net (BN): which is a statistical model based on
combination of directed acyclic graph of nodes and link, and
a set of conditional probability table [11]. The BN agent uses
the probabilistic graphical model that represents a set of
random variables and their conditional dependencies via a
directed acyclic graph.
AdaBoost (AdaB): is an adaptive boosting machine
learning algorithm for increasing the performance of weak
learning algorithms [22]. It uses a set of learning algorithms.
Fig. 1 The proposed cooperative
classification system
12 D. Boughaci and A. A. K. Alkhawaldeh
The output of the other learning algorithms is combined into
a weighted sum that represents the final output of the
boosted classifier. The AdaB agent uses a combination of a
set of classifiers produced by the learning algorithm over a
number of distributions of the training data.
Logistic regression (LR): is a regression model used to
estimate the probability of a qualitative response based on
one or more predictor or independent variables [19]. The LR
Agent evaluates the LR on the considered dataset.
OneR: is a classifier based rules [20]. The Agent OneR
uses a decision tree that learns a one-level decision tree for
generating a set of rules that test one particular attribute.
Logit Boost (LB): is a boosting machine learning algo-
rithm [21] obtained by considering AdaBoost as a general-
ized additive model and applying the cost functional of
logistic regression. The LB Agent applies a boosting algo-
rithm that combines AdaBoost machine learning algorithm
with a logistic regression.
2.2 Some Variants of the Proposed System
Collaboration between agents is a key concept in a
multi-agent system. Collaborative agents work together and
interact between them in order to jointly solve tasks and
maximize their utility.
In a classification problem, there are some tasks that can
be handled in parallel such as: the variables selection, the
learning and the evaluation tasks. In order to coordinate their
activities, agents must communicate, learn from other agents
and share among them the most accurate models.
In the following, we give two variants of the proposed
system. First when we use agents in the variables selection.
Second, when we use agents to do the learning or the clas-
sification tasks in parallel.
Collaborative variable selection based on agents. The
variable selection is a preprocessing that can be launched
before the data classification. It is used for selecting a set of
relevant variables for the data classification task. It permits
to remove irrelevant variables and keeps only the significant
ones which may enhance the performance.
Various variables selection methods have been devel-
oped. Among them, we cite the wrapper methods [25], the
filtering methods [26] and the principal component analysis
(PCA) [27]. The filtering methods remove the undesirable
variables before launching the classification task. The
wrapper methods use a machine learning algorithm where
the aim is to select the best variables with high classification
accuracy.
We note that the wrapper methods are time consuming
compared to filtering methods because they run iteratively
the machine learning for selecting variables. PCA is a sta-
tistical technique for feature construction. It can be used to
transform an n-dimensional space into a lower-dimensional
subspace, without losing much information [27]. It is a good
mechanism for reducing the dimensionality of the data. Such
reduction is achieved by transforming the number of inter-
related variables to a new set of variables called the principal
components (PCs), which are uncorrelated.
To explain the role of variable selection, we give an
example of variables that represented a real financial dataset.
We take as an example the German credit dataset available
on UCI. The data consists of a set of 1000 applicants that can
be divided into two main classes: worthy class that consist of
700 applicants and unworthy class of 300 applicants. Each
applicant is characterized by 20 variables called also features
or attributes. Among the 20 variables, there are 7 numerical
and 13 categorical called also qualitative attributes.
The description of the different variables of the German
dataset is given as follows:
•Attribute 1 (checking status): is qualitative. It is the status
of existing checking account.
•Attribute 2 (duration): is numerical. It is the duration in
month.
•Attribute 3 (credit history): is qualitative. It is the credit
history.
•Attribute 4 (purpose): is qualitative. It indicates the
purpose that can be the following possibilities: a new car,
a used car, furniture/equipment, radio/television,
domestic appliances, repairs, education, vacation - does
not exist?, retraining, business, others.
•Attribute 5 (credit amount): is numerical. It is the credit
amount.
•Attribute 6 (savings status): is qualitative. It is the sav-
ings account/bonds.
•Attribute 7 (employment): is qualitative. It is the present
employment since.
•Attribute 8 (installment commitment): is numerical. It
gives the installment rate in percentage of disposable
income.
•Attribute 9 (personal status): is qualitative. It is the
personal status and sex.
•Attribute 10 (other parties): is qualitative. It represents
the other debtors/guarantors.
•Attribute 11 (residence since): is numerical. It gives the
present residence.
•Attribute 12 (property magnitude): is qualitative. It is the
property.
•Attribute 13 (age): is numerical. It gives the Age in years.
•Attribute 14 (other payment plans): is qualitative. It gives
the other installment plans.
A Cooperative Classification System for Credit Scoring 13
•Attribute 15 (housing): is qualitative. It represents the
housing.
•Attribute 16 (existing credits): is numerical. It gives the
number of existing credits at this bank.
•Attribute 17 (job): is qualitative. It gives the job.
•Attribute 18 (num dependents): is numerical. It is the
number of people being liable to provide maintenance
for.
•Attribute 19 (own telephone): is qualitative. It represents
the telephone.
•Attribute 20 (foreign worker): is qualitative. It gives the
foreign worker.
The aim of the variables selection method is to select only
a subset of variables from all variables of the considered data
to be classified. This subset is called significant or relevant
variables. Only these selected variables are considered for
the classification task. This can reduce the data dimension-
ality, maximize the accuracy rate and reduce timing.
Figure 2gives a variant of cooperative classification
system where the variables selection is done in parallel by
using agents. Each agent applies a given method for vari-
ables selection. The latter is performed on the financial
dataset to select the set of relevant variables. The best set of
variables with the best accuracy is sent to the next step of
data classification task.
Collaboration learning and classification based on
agents. The classification and the learning tasks can be done
in parallel by using a set of agents. In Fig. 3, we give a
variant of a cooperative classification system based on
agents for CS. As shown on Fig. 3, the initial example data
are partitioned in subsets of data. The latter are distributed
on a set of agents in order to do the learning task in parallel.
The collaborative agents work on different examples and
generate a model to be used in the evaluation task.
Further, the evaluation task can also be done in parallel
by using different agents. Each one applies its model on new
or test data to find the appropriate class. Credit scoring
models are then validated on the testing data or new appli-
cants. Figure 4gives an example of a collaborative classi-
fication system. We use a set of agents where each agent
classifies the applicant into a class. We obtain a set of
Fig. 2 Collaborative variable
selection based on agents
14 D. Boughaci and A. A. K. Alkhawaldeh
possible classes for this applicant. The resulting one is the
majority class.
3 Experiments
The code source is written in Java. We use Jade (Java Agent
DEvelopment Framework: Jade Site) [28] platform to exe-
cute our agents. We use some supervised machine learning
algorithms from weka (Waikato Environment for Knowl-
edge Analysis) [29]. An extensive experiment is done on the
five real financial datasets to evaluate the proposed system
depicted in Fig. 1. The other variants will be implemented in
future works.
All experiments were run on an Intel Core(TM) i5-2217U
CPU@1.70 GHz with 6 GB of RAM using Java program-
ming language under Windows 8 64 bits, processor 64.
3.1 Datasets Description
We perform credit scoring task on five financial datasets:
German, Australian, Polish, Japanese datasets available on
UCI and the huge “Give Me some credit”from Kaggle. The
description of the five credit datasets is given in Table 1.
The Australian dataset consists of 690 instances of loan
applicants. There are two classes: class “Good”(worthy, 307
instances) and class “Bad”(unworthy, 383 instances). The
number of variables is equals to 14. There are 6 numerical
variables and 8 categorical variables.
The German credit dataset consists of 1000 instances.
There are two classes: class “Good”(worthy 700 instances) and
class “Bad”(unworthy, 300 instances). The original dataset of
“german.data”contains categorical/symbolic attributes. The
number of variables is equals to 20 where 7 are numerical and
13 categorical variables called also qualitative variables.
Fig. 3 Collaboration learning
and classification based on agents
Fig. 4 Classification of a given
applicant
A Cooperative Classification System for Credit Scoring 15
The Japanese dataset consists of 690 instances of loan
applicants. There are two classes: class “Good”(worthy, 307
instances) and class “Bad”(unworthy, 383 instances). The
number of variables is equals to 15.
The Polish dataset consists of 5910 instances of loan
applicants. There are two classes: class “Good”(worthy, 410
instances) and class “Bad”(unworthy, 5500 instances). The
number of variables is equals to 64.
The “Give Me Some Credit”is a huge credit dataset
obtained from the competition titled “Give Me some credit”
in kaggle.com. The dataset contains about 150,000 instances
constructed from the credit history of 150,000 borrowers.
Each instance is formed of 10 independent variables. There
are two classes: class “Good”(worthy, 139,974 instances)
and class “Bad”(unworthy, 10,026 instances).
3.2 Performance Measures
We use a combination of several measures to evaluate the
predictive performance of credit scoring model. Table 2
gives the confusion matrix where True Positives (TP) indi-
cates the number of positive examples, labeled as such.
False Positives (FP): is the number of negative examples,
labeled as positive. True Negatives (TN): is the number of
negative examples, labeled as such. False Negatives (FN):
is the number of positive examples, labeled as negative
[30].
The best model is selected based on the validation results
using the performance indicators given as follows:
–Precision = TP/(TP + FP)
–Recall = TP/(TP + FN)
–Accuracy (ACC) = (TP + TN)/(TP + FN + TN + FP)
–PRC curves plot precision versus recall.
–ROC plots the value of the Recall against that of the FP
Rate at each FP Rate considered.
We note that the area under the ROC Curve (AUC) or
ROC Area: is a common evaluation metric for binary clas-
sification problems. The principal benefit of the AUC is that
it is more robust than Accuracy in imbalanced class case
because AUC is independent of the fraction of the test
population which is class 0 or class 1.
3.3 Numerical Results
Tables 3,4,5,6and 7give the numerical results found with
the six agents of the system depicted in Fig. 1. The overall
system selects the best one in term of ROC measure because
ROC is more robust than Accuracy in credit scoring related
datasets.
Tables 3,4,5,6and 7compare the results achieved
based on precision, recall, ROC and PRC. From these
results, we can see that RF succeeds in finding good results
for Australian with a ROC% value equal to 97.7%, German
with a ROC% value equal to 95.9%, Japanese with a ROC%
value equal to 98.2% and Give me some credit datasets with
a ROC % value equal to 91.3%. But RF fails on the Polish
dataset. RF gives a ROC % value equal to only 50.0%.
However, the overall system denoted AGENTS improves
this gap and succeeds in finding good results on all the
considered datasets in reasonable time. The agents are
launched in parallel so they collaborate and do the classifi-
cation task more efficiently.
The AGENTS system gives often the best results found
by the set of the considered agents. It gives a ROC % value
equal to 97.7% for Australian dataset, a ROC % value equal
to 95.9% for German dataset, a ROC % value equal to
98.2% for Japanese dataset and a ROC % value equal to
91.3% for Give me some credit dataset. Further it gives a
ROC % value equal to 82.8% for Polish dataset. This
superiority is due to the cooperation aspect of agents which
leads to good results.
Table 1 Description of the
datasets used in the study Dataset #Loans #Good loans #Bad loans #Variables
Australian 690 307 383 14
German 1000 700 300 20
Japanese 690 307 383 15
Polish 5910 410 5500 64
“Give Me some credit”150,000 139,974 10,026 10
Table 2 Confusion matrix Predicted class (%)
Real class (%) Good loans (1) Bad loans (0)
Good loans (1) TP FN
Bad loans (0) FP TN
16 D. Boughaci and A. A. K. Alkhawaldeh
To show clearly the performance of the proposed system
on the five financial datasets, we draw the Figs. 5,6,7,8and
9. When compared both ROC and PRC for the five datasets,
we can say that the AGENTS system is able to find good
results in term of ROC and PRC point of view for all the
considered financial datasets. We can conclude that the
cooperation strategy used within agents improves the per-
formance and produces good results.
Table 3 Numerical results on
the Australian dataset Agent type Precision (%) Recall (%) PRC (%) ROC (%) Time CPU (s)
AGENT AdaBoot 86.6 85.5 91.3 92.9 1.288
AGENT BN 86.1 85.9 92.5 92.7 1.180
AGENT RF 94.1 94.1 97.4 97.7 2.067
AGENT Logistic 88.3 88.3 93.3 94.2 1.087
AGENT OneR 86.6 85.5 81.3 86.2 0.901
AGENT LB 86.8 86.8 93.3 93.8 1.223
Overall system (AGENTS) 94.1 94.1 97.4 97.7 2.067
Table 4 Numerical results on
the German dataset Agent type Precision (%) Recall (%) PRC (%) ROC (%) Time CPU (s)
AGENT AdaBoot 67.0 70.8 77.0 76.1 1.486
AGENT BN 75.5 76.1 81.4 80.9 1.079
AGENT RF 91.8 91.8 96.6 95.9 2.791
AGENT Logistic 76.2 77.1 83.1 82.1 2.083
AGENT OneR 68.9 71.7 61.5 56.3 1.393
AGENT LB 74.3 75.6 79.9 78.7 1.801
Overall system (AGENTS) 91.8 91.8 96.6 95.9 2.791
Table 5 Numerical results on
the Japanese dataset Agent type Precision (%) Recall (%) PRC (%) ROC (%) Time CPU (s)
AGENT AdaBoot 86.5 86.5 92.0 93.2 1.164
AGENT BN 86.7 86.7 92.3 92.5 1.076
AGENT RF 93.6 93.6 98.0 98.2 2.672
AGENT Logistic 87.6 87.5 92.7 93.8 1.653
AGENT OneR 86.6 85.5 86.2 81.3 0.899
AGENT LB 88.0 87.8 93.3 94.1 1.189
Overall system (AGENTS) 93.6 93.6 98.0 98.2 2.672
Table 6 Numerical results on
the Polish dataset Agent type Precision (%) Recall (%) PRC (%) ROC (%) Time CPU (s)
AGENT AdaBoot 86.6 93.1 87.1 50.0 3.915
AGENT BN 92.3 87.7 93.3 82.8 4.151
AGENT RF 86.6 93.1 87.1 50.0 4.126
AGENT Logistic 86.6 93.1 89.2 52.4 6.064
AGENT OneR 86.6 93.1 87.1 50.0 3.655
AGENT LB 86.6 93.1 87.6 51.3 4.663
Overall system (AGENTS) 92.3 87.7 93.3 82.8 4.151
A Cooperative Classification System for Credit Scoring 17
Table 7 Numerical results on
the “Give Me some credit”
dataset
Agent type Precision (%) Recall (%) PRC (%) ROC (%) Time CPU (s)
AGENT AdaBoot 91.3 93.4 93.6 82.7 14. 95
AGENT BN 92.4 92.4 94.5 85.8 4.03
AGENT RF 95.4 95.8 96.8 91.3 73.73
AGENT Logistic 92.0 93.7 94.6 86.1 56.05
AGENT OneR 91.6 93.5 88.4 54.4 11.931
AGENT LB 91.9 93.6 94.1 84.6 15.702
Overall system (AGENTS) 95.4 95.8 96.8 91.3 73.732
Fig. 5 ROC % versus PRC % on
the Australian dataset
Fig. 6 ROC % versus PRC % on
the German dataset
Fig. 7 ROC % versus PRC % on
the Japanese dataset
18 D. Boughaci and A. A. K. Alkhawaldeh
4 Conclusion
This work was focused on machine learning techniques for
credit scoring. Most of the existing classifiers systems are
essentially based on only one unit that does the biggest part
classification and evaluation. To go beyond these limits, we
have proposed an agent-based system. The proposed system
uses autonomous for the data analysis and classification. We
presented some preliminary results and more improvements
are in progress. The use of agents in credit scoring can
provide many advantages. We are working on more tech-
niques for agents’cooperation and coordination to enhance
the performance. We plan also to do the evaluation step in
parallel to enhance the computational time. It would be
interesting to implement a deep learning agent’s based sys-
tem to handle big data.
References
1. Miller, M.: Research confirms value of credit scoring. Nat.
Underwriter 107(42), 30 (2003)
2. Mester. L.J.: What’s the point of credit scoring? Business Review
(September), pp. 3–16 (1977)
3. Sousaa, M.R., Gamaa, J., Brand˜ao, E.: A new dynamic modeling
framework for credit risk assessment. Expert Syst. Appl. 16, 2015
(2015)
4. Hand, D.J., Henley, W.E.: Statistical classification methods in
consumer credit scoring. J. Roy. Stat. Soc. Ser. A (Stat. Soc.) 160,
523–541 (1997)
5. Wiginton. J.C.: A note on the comparison of logit and discriminant
models of consumer credit behavior. J. Financ. Quantit. Anal. 15,
757–770 (1980)
6. Quinlan. J.R.: Simplifying decision trees. Int. J. Man-Mach. Stud.
27, 221–234 (Dec 1987)
7. Breiman, L., Friedman, J., Olshen, R., Stone, C.: Classification and
Regression Trees. Wadsworth, Belmont, CA (1984)
8. Desay, V., Crook, J.N., Overstreet, G.A.: A comparison of neural
networks and linear scoring models in the credit union environ-
ment. Eur. J. Oper. Res. 95,24–37 (1996)
9. Bellotti, T., Crook, J.: Support vector machines for credit scoring
and discovery of significant features. Expert Syst. Appl. 36, 3302–
3308 (2009)
10. Huerta, E.B., Duval, B., Hao, J.K.: A hybrid GA/SVM approach
for gene selection and classification of microarray data. In:
Rothlanf et al. (eds.) EvoWorkshops 2006, LNCS 3907, pp. 34–44
(2006)
11. Friedman, N., Geiger, D., Goldszmidt, M.: Bayesian network
classifiers. Mach. Learn. 29, 131–163 (1997)
12. Abdou, H.A.: Genetic programming for credit scoring: the case of
Egyptian public sector banks. Expert Syst. Appl. 36, 11402–11417
(2009)
13. Henley, W.E., Hand, D.J.: A k-nearest neighbour classifier for
assessing consumer credit risk. Statistician 45,77–95 (1996)
14. Li, J., Wei, L., Li, G., Xu, W.: An evolution strategy-based
multiple kernels multi-criteria programming approach: the case of
credit decision making. Decis. Support Syst. 51, 292–298 (2011)
15. Abelln, J., Mantas, C.J.: Improving experimental studies about
ensembles of classifiers for bankruptcy prediction and credit
scoring. Expert Syst. Appl. 41, 3825–3830 (2014)
Fig. 8 ROC % versus PRC % on
the Polish dataset
Fig. 9 ROC % versus PRC % on
the “Give Me some credit”
dataset
A Cooperative Classification System for Credit Scoring 19
16. Boughaci, D., Ider, K., Yahiaou, S.: Design and implementation of
a misused intrusion detection system using autonomous and
mobile agents. EATIS 12 (2007)
17. Boughaci, D., Drias, H., Bendib, A., Bouznit, Y., Benhamou, B.:
Distributed intrusion detection framework based on autonomous
and mobile agents. In: 2006 International Conference on Depend-
ability of Computer Systems DepCoSRELCOMEX 2006, 24–28
May 2006, Szklarska Poreba, Poland, pp: 248–255 (2006)
18. Ho, T.K.: Random decision forests. In: Proceedings of the 3rd
International Conference on Document Analysis and Recognition,
Montreal, QC, 14–16 Aug 1995, pp. 278–282 (1995)
19. Cox, D.R.: The regression analysis of binary sequences (with
discussion). J. Roy. Stat. Soc. B. 20, 215–242 (1958). (JSTOR)
20. Holte, R.C.: Very simple classification rules perform well on most
commonly used datasets. Mach. Learn. 11,63–91 (1993)
21. Friedman, J., Hastie, T., Tibshirani, R.: Additive logistic regres-
sion: a statistical view of boosting. Ann. Stat. 28(2), 337–407
(2000)
22. Freund, Y., Schapire, R.E.: A decision-theoretic generalization of
on-line learning and an application to boosting. J. Comput. Syst.
Sci. 55,1–19 (1997)
23. UCI (University of California at Irvine): https://archive.ics.uci.edu/
ml/datasets, Accessed Nov 2017
24. Kaggle website: https://www.kaggle.com/c/GiveMeSomeCredit,
Accessed Nov 2017
25. Kohavi, R., John, G.: Wrappers for feature subset selection. Artif.
Intell. Special issue on relevance, 273–324 (1996)
26. Caruana, R., Freitag, D.: Greedy attribute selection. In: Proceed-
ings of the Eleventh International Conference on Machine
Learning, (ICML 1994, New Brunswick, New Jersey), Morgan
Kauffmann, pp. 28–36 (1994)
27. Jolliffe, I.T.: Principal component analysis. Series: Springer Series
in Statistics, 2nd edn., Springer, NY, XXIX, 487, p. 28 illus.
ISBN: 978-0-387-95442-4 (2002)
28. Jade (Java Agent DEvelopment Framework): Jade Site: http://jade.
tilab.com/, Accessed Nov 2017
29. Waikato Environment for Knowledge Analysis (WEKA), Version 3.9.
The University of Waikato, Hamilton, New Zealand, Software available
at http://www.cs.waikato.ac.nz/ ml/weka/, Accessed Nov 2017
30. Powers, D.M.W.: Evaluation: from precision, recall and f-measure
to ROC, informedness, markedness & correlation. J. Mach. Learn.
Technol. 2(1), 37–63 (2011)
20 D. Boughaci and A. A. K. Alkhawaldeh
A Critical Evaluation of the Effects
of Advertisements Targeted to Children
Tarik Emre Yildirim and Asli Milla
Abstract
Social media usage is growing immensely in the Arab
world. In addition to this, digital advertising is becoming
the new way of doing business in this region. There is
little effective regulation or control over of digital
marketing, children are often exposed to powerful and
targeted online marketing via digital platforms that collect
personal data. Children are exposed to millions of
user-generated content (UGC) each and every day.
Specialists have concluded, per previous research, that
children until the age of sixteen spend the same amount of
time in front of the television as the time spent at school if
not more, making television parallel with school as a tool
of persuasion, education and social development. Adver-
tisement agencies create hashtag campaigns to engage the
users whilst create user. According to a recent survey,
nearly half of young Emiratis are addicted to the internet
and spend nearly 10 h a day on social and another media.
This research aims to analyse the effects of social media
campaigns on children.
Keywords
Social media advertisements Children advertisements
Advertisement effect on children
1 Introduction
Many scholars argue, media, in general, and advertising, in
particular, have a great impact on societies with serious
consequences in terms of rapidly affecting, even
transforming traditional life stages by blurring the line
between childhood and adulthood [1–7].
Children are a particularly vulnerable group in the use
and purchase of both digital and non- digital content. The
risk of exposure to intrusive online marketing has become a
pressing concern in European consumer policy [8]. How-
ever, when compared with conventional media there is less
effective regulation or control over of digital marketing,
children are often exposed to powerful and targeted online
marketing via digital platforms that collect personal data in
the Middle East region. Specialists have concluded that
children until the age of sixteen spend the same amount of
time in front of the television as the time spent at school if
not more, making television parallel with school as a tool of
persuasion, education and social development. The authors
aim at analysing the effects of advertisement campaigns on
children’s behaviour and development process.
In this research, authors analysed 3 different categories of
advertisements: TV advertisements, advergames and
embedded ads in social networking sites. In this single case
study, we analysed two samples out of the selected group of
online advertisements without testing their effect on chil-
dren. A detailed list of advertisements can be found in
Table 1. The authors’objective is to give a foundation for
the understanding of the psychology and the marketing of
the advertisements targeted to children.
2 Online and Offline Marketing
Communications to Children
Alongside media, some researchers have been questioning
the effect of targeting children by marketers both via online
and offline marketing communications. With the advance-
ment of technology and access to internet, the young con-
sumers became target of digital marketers. Cheyne et al.
found out that websites with greater interactivity, multimedia
content and personalized interaction, create greater traffic
and keep children on the sites for longer periods of time [9].
T. E. Yildirim (&)A. Milla
American University in the Emirates, Dubai, UAE
e-mail: tarik.yildirim@aue.ae
A. Milla
e-mail: asli.milla@aue.ae
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_3
21
2.1 TV Advertisements
Even if the advertised product is exposed to a dual audience
(meaning adult and child), the main target remains the adult
consumer for at least two reasons: his or her economic
resources, and the massive and growing presence of adults in
the total population. If advertising products are really aimed
directly at the intended buyer, this would be then, without
question, the adult—and not the child.
2.2 Advergaming
Infantilization is an ideology which describes under the
mask of children’s culture the process and the culture we
now inhabit is characterized by a set of habits, preferences,
and attitudes that encourage and legitimate childishness and
youthfulness in adulthood. The studies conducted by Dias
and Redondo showed that young consumers exposed to
advergames and other website interactions with a brand,
show a marked preference for branded sweets compared to
those in a non-branded advergame [10,11].
According to Moore and Rideout, an advergame involves
a user playing with branded items. They also mention that
these games typically involve the child for longer period of
time than TV ads. [12].
European Commission carried out a study in 2015 on
advergames and found out that children are exposed to a
number of problematic marketing practices in online games,
mobile applications and social media sites, which are not
always understood by the child consumer [8].
2.3 Embedded Advertising
A methodology to measure the exposure to this kind of
advertising hasn’t been agreed upon by researchers up to
now; answers to questions as “Is it a matter of simply
counting the number of exposures to an image of the brand’s
logo or product itself? How important is the length of
exposure? Is a dialogue included? Is the “story line or plot”
of the episode is driven by the product?”have not been
decided by researchers yet. It is also not easy to know how to
compare such exposure to a child’s or teen’s exposure to
Table 1 Advertisement sampling
List of the 20 advertisements from various countries in Middle East used in the research. These ads are classified according to narration of the
product:
Under infantalisation advertisements selected display adults performing like a child such as screaming and crying or going into a wonderland of
candy.
In adultification section selected ads display children performing adult duties or getting into adult concerns such as telling their parents what
kind of engine type car they should buy or giving financial advice to parents so that they can save money to buy a new bicycle.
Infantilization Adultification
Toyota HiLux: 2012
https://www.youtube.com/watch?time_continue=5&v=
GHcm8TBXZMo
McDonald’s Family Time Forever: 2011
https://www.youtube.com/watch?v=pKlRR5_5oP4
Snickers Video Game Ad: 2017
https://www.youtube.com/watch?time_continue=26&v=
F7cB6TrrpNU
Johnsons Baby Ritual (Maria’s beauty ritual): 2017
https://www.youtube.com/watch?v=wAzAXZKjlOU
Pepsi Meal Made Excited: 2016
https://www.youtube.com/watch?v=y8MJvsjxLKU
Johnsons Baby Ritual (In Arabic): 2017
https://www.youtube.com/watch?v=GT9caPbV8Qc
Dominos Pizza: 2017
https://www.youtube.com/watch?v=wYu7Oc6rrmU
Killanan Adam ve GürbüzÇocuk (Sceptic Men and Robust Kid):
2017
https://www.youtube.com/watch?v=q3e2q1oM6Oc
Ulker Strawberry Milk: 2016
https://www.youtube.com/watch?v=oniOl3LUgWs
Ülker Yupo Çokojelo: 2017
https://www.youtube.com/watch?v=7Ev-hE-4EsM
Etisalat, Data Bonanza: 2017
https://www.youtube.com/watch?v=Mff-0VXubJI
Iklan Raya Eid’ul Fitr TVC Gulf Bank Kuwait: 2016
https://www.youtube.com/watch?v=LcjWPzdkW5k
118 80 (phone directory): 2015
https://www.youtube.com/watch?v=lM3N4jcUqxQ
Koton Kids: Bu benim Tarzim (This is My Style)
https://www.youtube.com/watch?v=hQ6Re4LGr1M
Almarai Cheese, What Love Tastes Like: 2017
https://www.youtube.com/watch?v=d2XzI4heDxI
Danone Karaoke: 2017
https://www.youtube.com/watch?v=1iXci-jH_yg
Alarko Kombi (Alarko Heater): 2016
https://www.youtube.com/watch?v=rRkafHmRP7U
Toyota Hybrid: 2017
https://www.youtube.com/watch?v=AsAHND-w0Xw
ING Bank: 2012
https://www.youtube.com/watch?v=3pt4-9NCzBE
Media Markt, “I have a dream!”: 2016
https://www.youtube.com/watch?v=LnaOiceAoIE
22 T. E. Yildirim and A. Milla
discrete, longer-form/Standard/familiar advertising. The
previous research indicates that children have a difficult time
identifying “embedded”content as advertising, and under-
standing the intention to persuade them to buy that product
[13]. Currently, children and young people are vulnerable
towards such advertising and there are no precise measures
of the extend or effect of young people’s exposure to product
placements and other kinds of embedded advertising.
Another interesting observation is that product placements
seem to affect children but not to affect mothers. A closer
examination of the children’s top-ranked brands partially
explains why: companies place their products heavily on TV
shows that children mostly watch. Rather than mere expo-
sure, however, a more fundamental perhaps complementary
explanation is that children may be less able to detect per-
suasive intents of product placements, and thus more sus-
ceptible to product placement influences.
There were 2 phases of these experiments that was con-
ducted by European Commission. At the first experiment it
was found that embedded advertisements have a subliminal
effect on children. At the second experiment they found that
exposure to prompts to make in-app purchases has a sig-
nificant impact on children’s purchasing behaviour [8].
3 Data Collection: Analysis of Two Online
Ads
To present what is claimed in this paper the authors include
an analysis of two ads. These are two samples selected bulk
of ads, See Table 1, targeting adults by using either children
or children’s culture (kinderculture). The second group of
ads in the selection are those present children like tiny adults
acting like grownups presenting grownup experiences. For
this reason the first ad chosen is Snickers Wrestler Video-
game and the second is McDonald’s Family Time Forever.
For the analysis both Freudien (Psychoanalysis) and Jungien
(Analytical Psychology) will be used.
3.1 Snickers Wrestler Videogame: A Case
of Infantilization
In January 2017 Snickers Arabia introduced a video adver-
tisement titled as Snickers Wrestler Videogame on You-
Tube. The ad presents an over tempered bus driver because
he is hungry. The moment he grabs a snickers he gets back
to normal (Figs. 1and 2).
The hungry driver is portrayed as angry, aggressive and
noisy. In one scene he makes head banging listening to
heavy metal music and in another he screams as “the bus
driver sees everything!”. The teenage kind of action and
omnipotent mentality is observable. In addition to teen
acting when we see omnipotent mind set. The portrayed
character is having a deep regression to early childhood
period. The anal period of the child (ages 1–3) is a period
which child woks on being independent. This period is a
rebellious one. Still omnipotent mindset of the oral period is
there. Also a teenage kind of refusal attitude is accompanies.
The Snickers Wrestler Videogame advertisement char-
acter, Angry Bus Driver is and infantile figure. Displaying
qualities of a 2 or 3 year old child. Angry, noisy, uncom-
promising, claiming to be all mighty (omnipotence), cen-
tralizing infantile functions (such as eating or not eating. In
addition, although his face looks like a cave men in his
wrestler suit his body looks like an oversized baby. All these
indications tell us that we face with a baby/men.
A variety of advertising campaigns of adult-oriented
products today are designed with an infantile style [15].
Even if the advertised product is exposed to a dual audience,
the main target remains the adult consumer for at least two
reasons: his or her economic resources, and the massive and
growing presence of adults in the total population. If
advertising for adult products is really aimed directly at the
intended buyer, this would be then, without question, the
adult—and not the child [16]. The Snickers Wrestler
Videogame advertisement is a typical sample of this kind.
3.2 McDonald’s Family Time Forever: A Case
of Adultification
Here in McDonald’s Family Time Forever advertisement we
see children aged 3–4 to 8th year olds claiming their office
working parents that they need to pay attention to family
values. Their work oriented life makes the family suffer so
they need a “family time”. For this reason an army of kids
invade the office place and grab their fathers to have family
time in McDonald’s. The children are very clean and sharply
dressed. Cleanliness and tidiness conflicts with children’s
usual being so much that we could even say that these kids
are formally dressed for the business place. As if little tiny
adults gong into parents’kinder garden and grabbing them
from their ties or shutting their laptops. We witness that
parent role and child role is switched: kids lead parents to
McDonald’s to have family time (Figs. 3and 4)
The role of the adult and child is switched. As mentioned
by Eric Berne in his Transactional analysis theory the ego
state of adult is activated in these children. In accordance
with that ego state of child is activated in their parents. The
result is we see adult like kids guiding and advising their
fathers about the importance of “family time”as McDonalds
advertisement display. As mentioned above in adultification
children are out of the realm of childhood. Acting like adults
having adult ambitions with adult point of view. Interest-
ingly in McDonald’s Family Time Forever advertisement we
A Critical Evaluation of the Effects of Advertisements Targeted …23
Fig. 3 Kids in business place counseling parents: A father running after his business toy. McDonald’s Family Time Forever Ad, 2011 [17]
Fig. 4 Adults act as naughty kids grabbed to be punished: Another father pulled from his tie. McDonald’s Family Time Forever Ad, 2011 [17]
A Critical Evaluation of the Effects of Advertisements Targeted …25
don’t see a frame these kids are grabbing the parents to play
of have fun or even to go to McDonald’s. Such a section in
ad is not presented. We only see kids taming their parents
that they shouldn’t spend so much time with their business
toys. This absence of fun puts the greatest sign that what we
see is adultification.
Children and teenagers represent an important demo-
graphic to marketers. They are now “the epicenter of con-
sumer culture who command the attention, creativity and
spendings of advertisers; their tastes drive market trends and
their opinions shape brand strategies”[18]. This has led to
the circumstance that their culture has become virtually
indistinguishable from adult consumer culture as it was
influenced by it over the course of the last century [7,19].
The most crucial point is that advertisers are aware that
children influence the purchase of not just children’s prod-
ucts anymore, but everything in the household and
elsewhere.
4 Results and Conclusions
Children are increasingly targeted in advertisements because
they have their own purchasing power and influence their
parents’buying decisions [7,20,21]. Furthermore, it is often
argued that companies’main aim is to attract and reach
children in their early years in order to transform them in
later times to consumers of their own brands [15]. But the
most crucial point for this research is that advertisers are
aware that children influence the purchase of not just chil-
dren’s products anymore, but everything in the household
and elsewhere. The consequence is that, apparently, many
advertisements seem to become (more) childish and juvenile
in their character to attract children even if the advertised
product is intended for adults as, for example, life insurances
and automobiles [20]. It can be observed that different
marketing methods are used to capture the attention of
children with the result that a variety of advertising cam-
paigns of adult-oriented products today are designed with an
infantile style, for example, with mere exposure effects or
spoken characters that have been shown to positively influ-
ence children’s recognition [15].
5 Limitations and Further Research
This research focuses on the part of children’s psychology
being affected by the advertisements. However, as an
extension of advertisements targeted to minors (which
includes the teenagers also) there are many ads threating
adults as children. For this reason one step forward to this
research is the adultification and infantilization processes in
advertisements. The first one is making children adults
(adultification) uploading them the desires and ambitions of
adults and the latter one is reversing the maturity of an adult
back to the mentality of childhood by making adult purchases
and decisions in the mindset of a child. So if we only focus
about children being targeted by the ad industry and stop
there, than we will miss a great chunk of the phenomenon. In
the field of advertisement it is the idea of childhood is being
used as a new strategy, rather than children. Brands make use
of certain components from children’s culture that are now
instrumentalized for adult purposes to reconstruct childhood
features in order to engender and enforce infantilizing
mechanisms in numerous different ways in adult-targeted
advertisements—a phenomenon that was named in the pre-
sent research as Kinderculture. So it is not just children’s
mind being targeted also keeping adults as children and/or
causing nostalgia to extent of causing a regression in the
pschosexual and psychosocial developments of adults is also
largely being practiced.
References
1. Postman, N.: The Disappearance of Childhood. Vintage Books,
New York (1982)
2. Meyrowitz, J.: No Sense of Place: The Impact of Electronic Media
on Social Behavior. Oxford University Press, New York (1985)
3. Dorfman, A.: The infantilizing of culture. In: Lazere, D. (ed.)
American Media Mass Culture, pp. 145–157. University of
California Press, Berkley, Los Angeles (1987)
4. Bly, R.: The Sibling Society. Addison-Wesley Publishing Com-
pany, Boston (1996)
5. Epstein, J.: The Perpetual Adolescent. Wkly Stand. Retrieved from
http://www.weeklystandard.com/Content/Public/Articles/000/000/
003/825grtdi.asp (2003)
6. Mintz, S.: The social and cultural construction of American
childhood. In: Coleman, M., Ganong, L.H. (eds.) Handbook of
Contemporary Families: Considering the Past, Contemplating the
Future, pp. 36–54. Sage, London (2004)
7. Barber, B.: Consumed: How Markets Corrupt Children, Infantilize
Adults, and Swallow Citizens Whole. W. W. Norton & Company,
New York (2007)
8. Lupiáñez-Villanueva, F., Gaskell, G., Veltri, G.A., Theben, A.,
Folkvord, F., Bonatti, L., Codagnone, C.: Study on the impact of
marketing through social media, online games and mobile
applications on children’s behaviour (2016)
9. Cheyne, A.D., Dorfman, L., Bukofzer, E., Harris, J.L.: Marketing
sugary cereals to children in the digital age: a content analysis of 17
child-targeted websites. J. Health Commun. 18(5), 563–582 (2013)
10. Dias, M., Agante, L.: Can advergames boost children’s healthier
eating habits? a comparison between healthy and non-healthy
food. J. Consum. Behav. 10(3), 152–160 (2011)
11. Redondo, I.: The effectiveness of casual advergames on adoles-
cents’brand attitudes. Eur. J. Mark. 46(11/12), 1671–1688 (2012)
12. Moore, E.S., Rideout, V.J.: The online marketing of food to
children: is it just fun and games? J. Publ. Policy Mark. 26(2),
202–220 (2007)
13. Owen, L., Lewis, C., Auty, S., Buijzen, M.: Is children’s
understanding of nontraditional advertising comparable to their
understanding of television advertising? J. Publ. Policy Mark. 32
(2), 195–206 (2013)
26 T. E. Yildirim and A. Milla
14. Snickers Video Game Ad. Retrieved from https://www.youtube.
com/watch?time_continue=26&v=F7cB6TrrpNU
15. Keillor, B.D. (ed.): Marketing in the 21st Century:
Integrated marketing communication, vol. 4, Praeger, Westport
(2007)
16. Başbuğ, B.: Ewige jugend: mythos in einer alternden gesellschaft.
Der Trend Des “jungen Alterns’’ in Der Werbung. In: Schwender,
C., Hoffmann, D., Reißmann, W. (eds.), Screening Age –
Medienbilder, Stereotype, Altersdiskriminierung, pp. 97–113.
Munih, kopaed (2013)
17. McDonald’s Arabia Family time together. Retrieved from https://
201www.youtube.com/watch?v=pKlRR5_5oP4
18. Schor, J.B.: Born to Buy: The Commercialized Child and the New
Consumer Cult. Simon and Schuster, New York (2014)
19. De Zengotita, T.: Mediated: How the Media Shape the World
Around You. Bloomsbury, London (2005)
20. McNeal, J.U.: The Kids Market: Myths and Realities. Paramount
Books, New York
21. Bridges, E., Briesch, R.A.: The ‘nag factor’and children’s product
categories. Int. J. Advertising 25(2), 157–187 (2006)
A Critical Evaluation of the Effects of Advertisements Targeted …27
A Gulf College Case Study: Technology
Enhanced Students’Learning Geared
with Mobile Devices
Rowena Ocier Sibayan , Alrence S. Halibas ,
and Kenneth Ocier Sibayan
Abstract
Over the decades, the world has become increasingly
hyper-connected. The people and businesses can com-
municate with each other instantly where machines are
equally interconnected. Through the help of the internet
and its associated services, information is accessible and
immediate for every-one. In education, the utilization of
information and communication technologies helps
improve teaching pedagogy and enhanced students’
learning. The use of technology affects the quality of
education, and more specifically it can result in better
student performance and enhance the student learning
experience. Today, mobile devices are widely used for
communication, education, entertainment, research col-
laboration and social interaction. Research issues and
challenges related to technology-enhanced learning are
discussed for classroom learning at a distance, digital
libraries, online learning, and collections of various
online information, and e-collaboration. Nowadays, the
learning world has used mobile devices intensively for
various day-to-day activities. However, some technology
developers, teaching pedagogical experts and teachers are
still tied to the old world of desktop computers for
software and application development. The proposed
research aims to investigate the various methodologies,
framework and approaches adopted to demonstrate the
role of technology in enhancing the students’learning
experience in which enhancement is conceived and the
use of various technologies in empowering mobile
devices as an innovative tool to an effective learning
environment. The aim would be in developing a
framework (like teachers) to tailor their learning materials
and using different educational technologies in mobile
devices to substantiate claims about technology enhanced
learning. Qualitative and quantitative data analyses are
used to examine the relationships explored between the
aims of technology improved learning interventions. The
evidence presented, and the ways in which enhancement
is conceived and how large it has effects on the student’s
learning and teacher pedagogical approaches are
highlighted.
Keywords
Mobile Technology Education Learning
Enhancement
1 Introduction
Innovation is a major pillar of knowledge economy. Simi-
larly, innovation entails creation and exploitation of oppor-
tunities that will result in better services and the
development of new skills and competences. Education as
one of the building blocks in the innovation and
knowledge-based economy drives social change. The like-
wise, the learning institutions utilise technology to prepare
the students to think critically and develop innovative skills
to be globally competitive. The role of mobile devices in all
learning institutions is becoming progressively important to
support the use of these technologies for effective teaching
and learning that will transfer the needed workforce
knowledge and skills. There are some research issues and
challenges related to technology-enhanced learning studied
and discussed for classroom learning at a distance, online
learning, digital libraries, online resources, virtual laborato-
ries, e-collaboration, and virtual environments. Recognizing
the potential of small changes in technology, both positive
and negative will have tremendous effects on learning and
R. O. Sibayan (&)A. S. Halibas
Gulf College, Seeb, Sultanate of Oman
e-mail: rowena.sibayan@gulfcollege.edu.om
A. S. Halibas
e-mail: alrence@gulfcollege.edu.om
K. O. Sibayan
Trend Micro Inc., Manila, Philippines
e-mail: kensbyn@outlook.ph
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_4
29
teaching pedagogy of many learning institutions which are
discussed in this research.
The mobile learning technologies have progressively
evolved globally. It offers teachers-students more flexible
approach of learning. It also helps to improve the means of
communication, human daily activities and social interac-
tion. The increasing improvements in design, functionality,
reduced in size, improvements in storage capacity and the
reliability and ubiquity of the networks that supports mobile
technology devices are perceived by everyone as essential to
the behavior of people’s everyday activities [1]. In an edu-
cational context, ubiquitous connectivity and the portable
nature of mobile devices facilitate access to more collabo-
ration in learning experience which understands into greater
ownership of teaching-learning processes [2]. Furthermore,
another researchers [3] studied that potential advantages of
blended learning such as time flexibility and meeting indi-
vidual learning styles are enhanced with the use of mobile
technologies. Most mobile learning tools should be sup-
ported by the institution in which the educational websites
like VLE should sustained by the institution once the project
administrator resigns the institution [4].
It was suggested that any theory of mobile learning must
embrace the considerable learning that occurs outside the
classroom and is personally initiated and structured. It must
also account for the dynamic trends of learning [5]. A rele-
vant theory of learning must embrace the contemporary
practices and the development of learning. It was added in
one research [6] that technology-enhanced learning spanning
a range, starting with basic brain research and ending with
the study of complex systems. Most learning institutions are
facing challenges in identifying strategic priorities for
investment in mobile learning capabilities to maximize the
student’s educational outcomes, but to minimize institutional
costs.
1.1 Mobile Learning Theories
There are many definitions of e-learning, distance learning
and online learning [7]. With the advent of the internet and
intent-save use of technology, those definitions lead to the
process of learning as an output of the use of the internet.
Some researchers discussed that the use of internet based on
Information and Communication Technology in teaching,
learning processes can be responsible for promoting lack of
leadership [8]; increasing drop-out rates [9]. On the contrary,
other researchers justified that the internet can also be an
enabling tool for an easy communication, accessibility to
multiple online resources, especially when comparing with
the traditional teaching and learning strategies. A theory of
mobile learning is essential when thinking of the role of
mobility and communication in learning environments [5].
Like a blended environment, mobile learning helps
learners move in and out of engagement with technology and
learn across both space and time and move from topic to
topic. A key point in mobile learning theory is that it is the
learner that is mobile, not the technology [10]. As devices
are ubiquitous, learning can be linked with everyday life
activities. Control of mobile learning environments can be
distributed, and context is constructed by learners through
their interaction with devices and with each other. Educators
and learners acknowledge that mobile learning can both
complement and conflict with formal education and it raises
ethical issues both of privacy and ownership. However, a
researcher [11] believed that mobile learning interconnects
with e-learning and he considered learning to be facilitated
by a convergence of the internet, wireless networks, hand-
held devices connected to the internet and consider learning
to be distinctive characteristics of mobile learning and
e-learning.
It was reviewed in several literatures relating to mobile
learning and were identified that few studies have focused on
the development of specific frameworks to support the
design of mobile learning [12].
1.2 Teaching Pedagogical Considerations
Learning through mobile device requires extensive design
and pedagogical considerations. The traditional teaching
pedagogy theories are not suitable for mobile learning since
the main assumptions on teaching are in the classroom.
Some initiatives have already implemented for defining
distinctive today, technology emphasise the importance of
communication and collaboration in building of knowledge.
Furthermore, there are researchers who believe that tech-
nology can help students learn best when undertaking
authentic tasks within relevant and meaningful contexts [13].
It also emphasises the importance of enabling personalised
learning experiences, encouraging students to take owner-
ship of the learning process [14].
Distance learning has existed for the past decades. In this
era, modern technologies have allowed students and teachers
to connect directly, no matter where the locations are with
the use of internet and mobile devices. Mobile technology is
one of pedagogical tools that helps student learning and
teaching techniques that influence educators to use wireless
applications and social networks to improve learning out-
comes and provide innovative ways to increase access to
vast educational resources. Technology experts have devel-
oped different mobile applications to help educators and
learners at every level optimise the use of mobile learning
resources that would effectively enhance educational expe-
rience and improve the learning process regard-less of
physical location.
30 R. O. Sibayan et al.
Since the competitiveness in higher education is
increasing, many learning institutions look for different ways
of managing and providing quality in teaching delivery, but
to some extent, this innovative way of teaching needs to
evaluate the impact of delivery to promote a better under-
standing of quality of teaching and learning and the
enhancement of its quality. Many learning institutions in the
Sultanate of Oman and even all over the world have started
to explore the capabilities of mobile handheld technologies
for teaching range of understandings and skills across the
curriculum. It is known that the traditional classroom
learning has already well defined pedagogical principles
which include good practices such as encourages students
through faculty contact, improve cooperation among stu-
dents, develop active learning and respects diverse talents
and ways of learning. Unlike mobile learning, nowadays is
often directed by pedagogy which is extended with new
defined principles specifically for e-learning. E-learning
teaching methodology extends in creating institutional
environment that support and encourages inquiry and
e-collaboration, Hence, it was suggested [15] that the eval-
uation process must be structured that will align to the need
of different stakeholders and must comprise a set of criteria
for a clear assessment. It is important to understand the
following: (1) performance indicator, (2) stakeholders’
expectations, (3) and measure to what extent these expec-
tations are considered and achievable [16].
1.3 Quality in E-Learning
Quality learning is not only essential for meeting people’s
educational basic needs, but is also fundamental in fostering
the conditions for global peace and sustainable development.
Learners should acquire attitudes, values and skills as well as
information and learn need to be active, collaborative and
self-directed ways to flourish and contribute to the com-
munity. Therefore, teachers, learners and learning institu-
tions should adapt to new demands of using technology in a
manner that enhances the learning experience of learners.
In education, the term quality is a client-oriented concept
in which quality requirements are defined through a partic-
ipation process between clients and providers. Their teach-
ers, peers, communities, curriculum and learning resources
must help prepare students to recognize and to value the
importance of acquiring relevant skills and competencies for
21st century employment opportunities.
In the US, mobile devices as teaching tools are becoming
a more common part of the education system experience in
classrooms, from preschool through graduate studies. The
teachers are building that tech-savvy learning environment
in their lesson plans by embracing bring-your-own-device
policies and leading the push for mobile devices every stu-
dent [17].
In the Sultanate of Oman, mobile learning has started to
emerge as supporting tool in the education process. Many
students are using mobile devices which are more advanced
nowadays. These devices provide opportunities to access to
vast of information that will help them to enhance learning
performance. This research is intended to find out the
effectiveness of utilising mobile devices in the learning
process of Gulf College and to promote teachers-students’
collaboration in their education activities.
Even though, the utilisation of mobile devices is being
considered as an enhanced teaching tool to the existing
e-learning platform and the content of e-learning is trans-
ferred to mobile devices, for some pedagogical researchers
considered this a relatively new. An investigation on how the
efficient the integration of mobile devices into existing
activities has resulted in a two-way process to support the
learning based on studying activity theory [18]. The design
of the mobile learning and the learning needs of connected
people. Mobile technology is not like the e-learning and it is
not focused just to the mobile phones which are always
connected [19].
2 Research Methodology and Respondents
The researchers administered a survey questionnaire to
undergraduate students and lecturers, IT staff for the Aca-
demic Year 2016–2017 of Gulf College (GC). The respon-
dents’age-range was 18–50. The respondents consisted of
60 males and 43 females. The respondents were instructed in
the survey to offer information about their experiences in
collaborative learning and the impact of using mobile
devices in the learning process. A quantitative approach and
statistical data were used to analyse the collected data. In
addition to the questionnaire, the researchers compared the 2
Semesters for AY 2016–2017 module wise results for some
selected modules that require more usage of mobile devices.
The modules are Technical English for Computing
(TEC) which is 100% coursework that the students need to
do some research paper and portfolio planning and Intro-
ductory Business Concepts (IBC) which is 50% Exam and
50% coursework that requires research on the business plan
as a major concern.
The questionnaires were randomly distributed to the
respondents of the study. The instrument used for the study
was designed based on the objectives of the study. The
researchers applied a four-point Likert Scale (1 for strongly
disagree to 4 strongly agree) in the study. The questions
were easy to understand and the answers were divided into
four sections to make it clearer so that the researchers can get
A Gulf College Case Study: Technology Enhanced …31
respondents’opinions about the use of mobile devices for
academic activities and the result of enhanced learning is
achieved. Each participant was provided with a question-
naire and a brief background to the study.
3 Data Analysis and Findings
To determine if the students’performances in their educa-
tional activities enhanced by using mobile devices, 103
respondents were selected which involved 61 of
under-graduate students and 37 lecturers, and 5 IT staff. The
respondents were randomly chosen from different under-
graduate specialization offered by GC, three faculties of
studies.
Table 1shows that most of the mobile users are com-
puting sciences students and lecturers with 24.27 and
14.56% respectively as it also reflects on their specialization.
Most mobile users were followed by business students and
lecturers with 19.42 and 12.62%, respectively, then followed
by foundation studies students and lecturers with 15.53 and
8.74% accordingly while IT staff who are managing the
college virtual learning with 4.85% participation were also
included.
Nowadays, mobile devices such laptops, Smartphone, etc.
are being utilized by different users to support their daily
activities. For GC students and lecturers, mobile devices are
very useful in their academic requirements and being used
for the following reasons shown in Fig. 1. It reveals that
72% of the respondents accessed huge information through
their mobile devices followed by 64% of the respondents
utilized mobile devices for educational purposes such as
collaboration with peers through social media apps and 47%
of the respondents used mobile devices to access entertain-
ment while 17% for other purposes.
In addition, Fig. 2reveals that 71.84% of the respondents
preferred to use WhatsApp for e-collaborative work com-
pared from the popularity of Facebook with 30.66% and
YouTube with 44.66% followed by Instagram. Seventeen
and forty-eight percent LinkedIn user while Twitter is also
popular, for educational activities, only 7.76% users.
The study also reveals that it is helpful for the respon-
dents to use mobile devices to improve their performance in
the class. Students are confident that with the use of mobile
devices, specifically smart phones, they will not be left
behind and will be able to find the right information faster
whenever they need. The students said that “mobile devices
help them to do research and allows for immediate feedback
from their teachers and classmates”. They added that “they
don’t even need to carry around their lecture materials
because virtual learning environment can be accessed
through their mobile phones”. This means that students can
study anywhere, anytime and benefit with the use of mobile
technology as making things easier, better, and faster.
Every semester, GC module leader submits Module
Monitoring Report (MMR) to determine the performance of
the students and if the module learning outcomes are
achieved. Based on the TEC and IBC MMR documents
submitted to the Faculty of Computing Sciences, the
researchers did the comparison of the 2-semester results for
the following modules shown in Table 2. The table shows
that the marks of the students increased when the students
used their mobile devices in their classroom activities. This
means that their classroom performance was enhanced
because the passing rate of the module increased
tremendously.
Enforcing the utilization of mobile devices in the class-
room requires proper monitoring and policy so as not to be
abused while students are in the classroom. The IT staff
agreed that mobile devices should be utilized because of its
effectiveness and helpful both for the students and lecturers
and strongly agreed that website restriction should be
implemented. It is essential to target the classroom experi-
ences that fundamentally shape student learning and
emphasize the range of skills required for lifelong well-being
and societal cohesion with proper IT management to maxi-
mize the full potential of mobile device technologies. The
researchers decided to triangulate the findings of the study to
Table 1 Demographic profile of the respondents
Category Faculty of studies No. of respondents Percentage (%)
Students Foundation studies 16 15.53
Computing sciences 25 24.27
Business and management studies 20 19.42
Lecturers Foundation studies 9 8.74
Computing sciences 15 14.56
Business and management studies 13 12.62
Other IT staff 5 4.85
Total no. of respondents 103 100
32 R. O. Sibayan et al.
find some similarities and in some way, to validate each
opinion. The findings reveal that although the college has
included innovation within its vision and mission statement,
internal innovation should be strongly intensified.
4 Conclusion and Recommendations
The main purpose objective of this study has been to investi-
gate the effectiveness of using mobile device technologies in
educational activities, students’accessibility to GC VLE,
teaching methodology to tailor learning material using dif-
ferent educational technologies, and student’s academic
performance. It was found out the use of mobile devices as an
additional tool to provide students with an opportunity to
actively participate in the learning process by accessing online
discussion, searching additional educational learning materi-
als does motivate and encourage students to adopt a deep
learning approach that enhance their academic performance.
Some reviewed literature discussed that mobile devices have a
bad reputation in any learning institutions, but that is the
beginning to change. Instead, stakeholders should embrace
them because the study reveals that the students are more
engaged and motivated to learn when they use mobile phones.
With proper training and implementation to explore the full
potential of this high technology gadgets, teacher, learners and
other stakeholders will be able make paces to empower and
uplift students in their learning. This research will be a basis to
do an experimental research for AY 2017–2018.
References
1. Evans-Cowley, J.: Planning in the real-time city: the future of
mobile technology. J. Plan. Lit. (2011)
2. Graham, C.R., Woodfield, W., Harrison, J.B.: A framework for
institutional adoption and implementation of blended learning in
higher education. Internet High. Educ. (2013)
3. Ho, A., Lu, L., Thurmaier, K.: Testing the reluctant professor ’s
hypothesis: evaluating a blended-learning approach to distance
education. J. Public Aff. Educ. (2006)
4. Kember, D., McNaught, C., Chong, F.C.Y., Lam, P., Cheng, K.F.:
Understanding the ways in which design features of educational
websites impact upon student learning outcomes in blended
learning environments. Comput. Educ. (2010)
5. Sharples, M., Taylor, J., Vavoula, G.: A theory of learning for the
mobile age. Learning (2007)
6. Pachler, N., Bachmair, B., Cook, J.: Mobile Learning (2010)
7. Moore, J.L., Dickson-Deane, C., Galyen, K.: E-Learning, online
learning, and distance learning environments: are they the same?
Internet High. Educ. (2011)
8. Jara, M., Mellar, H.: Factors affecting quality enhancement
procedures for e-learning courses. Qual. Assur. Educ. (2009)
9. Parker, A.: A study of variables that predict dropout from distance
education. Int. J. Educ. Technol. (1999)
10. Vrasidas, C.: Issues of pedagogy and design in e-learning systems.
In: Proceedings of the 2004 ACM symposium on Applied
computing—SAC’04 (2004)
11. Motiwalla, L.F.: Mobile learning: a framework and evaluation.
Comput. Educ. (2007)
12. Cobcroft, R.: Literature review into mobile learning in the
university context. Control. 138 (2006)
13. Loyens, S.M.M., Gijbels, D.: Understanding the effects of
constructivist learning environments: introducing a
multi-directional approach. Instr. Sci. (2008)
14. Demian, P., Morrice, J.: The use of virtual learning environments
and their impact on academic performance. Eng. Educ. 7,11–19
(2012)
Table 2 Comparison of module results for 2-semesters AY 2016–
2017
Semester 1 Passing rate (%)
Technical English for computing 90
Introductory business concepts 74
Semester 2 Passing rate (%)
Technical English for computing 99
Introductory business concepts 86
18
17%
48
66
74
Fig. 1 Usage of mobile devices
Respondents
71.84%
17.48%
18
7.76%
27.18% 44.66%
Instagram Youtube
30.66%
28
32
46
74
Fig. 2 Purpose of using mobile device technologies
A Gulf College Case Study: Technology Enhanced …33
15. Pawlowski, J.M.: The quality adaptation model: adaptation and
adoption of the quality standard ISO/IEC 19796-1 for learning,
education, and training (2007)
16. Kirkwood, A., Price, L.: Learners and learning in the twenty-first
century: what do we know about students’attitudes towards and
experiences of information and communication technologies that
will help us design courses? (2005)
17. Lynch, M.: Do mobile devices in the classroom really improve
learning outcomes. Conversat. [Blog] (2015)
18. Waycott, J., Hall, W.: An investigation into the use of mobile
computing devices as tools for supporting learning and workplace
activities (2001)
19. Wagner, E.D.: Enabling mobile learning. Educ. Rev (2005)
34 R. O. Sibayan et al.
A Review Study on the Accuracy
of Conversion Between IFPUG FPA
and COSMIC Function Points
Abedallah Zaid Abualkishik
Abstract
Functional size measurement methods are widely used by
software project managers since it supports early estima-
tion. Function Point Analysis (FPA) was the first method
proposed for the purpose of capturing functional size, but
unfortunately it is flawed in some ways. A sec-
ond-generation method was COSMIC function points
that offered a novel design. However, since then, the
accuracy of convertibility between the two measures has
become an issue. This study aims to determine how
accurate are the conversion types featured in the literature
employing the ordinary least squares regression model by
examining the convertibility of Fetcke case study via the
leave one out cross validation. The findings indicated that
the most commonly-used conversion type did not provide
the highest accuracy. Instead it was the transaction
function-based type that achieved best results. Therefore,
in order to obtain high accurate results, several conversion
types must be tested.
Keywords
IFPUG FPA function points COSMIC function points
Measures Conversion Accuracy
1 Introduction
Functional Size measurement (FSM) is a very useful method
for early estimation. It can be used for project management
functions such as effort estimation, pricing, bidding, and
contacting. Function Points Analysis (FPA) by Albrecht [1],
was a pioneering approach in effort estimation. After a
while, Albrecht and Gaffney [2] adjusted the method for
capturing the functional size. Despite the widespread use of
FPA there was still criticism about its limited ability to
capture only the size of some types of software [3,4].
Furthermore, the FPA method suffers many theoretical and
structural problems [5], for example, it contains some steps
that violate the principles of measurement theory such as
transforming measure of ordinal scale to ratio scale.
On the contrary, COSMIC function points [6] was pro-
posed to fulfil software engineering and measurement theory
principles, and to tackle the limitations of FPA. The con-
vertibility between the two methods had been enhanced
since its initial proposal and several organizations have been
willing to convert the accumulated knowledge of functional
size measured in FPA to the corresponding COSMIC value.
Toward this end, many studies were published to address the
convertibility issues. The conversion between the two
methods can be classified into two main types as follows:
•Statistical conversion: Converts the FPA measure or any
of its sub measures into the corresponding COSMIC
Function Points (CFP) statistically using regression
models [7–18],
•Theoretical conversion: Converts the FPA size or any of
its sub measures into the corresponding CFP size using
proposed formulas derived through a deep study of the
similarities and correspondence between the two meth-
ods. Two studies were published in this regard [18,19].
Many studies were published in the literature that eval-
uated the conversion accuracy between the two methods
[20–24]. Many conversion types were also proposed for the
purpose of estimating the CFP using different FPA measures
like the Unadjusted Function Points (UFP), Data Functions
(DF), Transaction Functions (TF) and the File Type Refer-
enced (FTRs). For example, it is possible to use the TF as an
independent variable to estimate the dependent variable, i.e.
CFP. This paper aims to examine the accuracy of these
conversion types using Fetcke case study [25]. In this con-
text, accuracy refers to the closeness of an estimated value to
the actual value.
A. Z. Abualkishik (&)
American University in the Emirates, Dubai,
United Arab Emirates
e-mail: abedallah.abualkishik@aue.ae
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_5
35
This paper is structured in the following manner: Sect. 2
presents the background of FPA and COSMIC Function
Points, while Sect. 3describes the research methodology.
Section 4explores the analysis of Fetcke case study. Sec-
tion 5proceeds to describe the empirical evaluation of the
accuracy for the tested conversion types and Sect. 6presents
the discussion of the findings. Section 7rounds up the study
and makes recommendations for future research.
2 Functional Size Measurement Methods
2.1 Function Point Analysis (FPA)
The FPA method [26] has five Basic Functional Components
(BFCs) classified into two types: Data Functions (DF) deal-
ing with data inside and outside the system boundary, and
Transaction Functions (TF) which comprise processes that
facilitate the data exchange between the measured system
and the user in relation to the system boundary. DF is of two
main types: Internal Logical File (ILF), which is a user
recognizable and identifiable group of logically related data
or control information that is within the system boundary
and maintained by the measured system, and External
Interface File (EIF), which is a user identifiable group of data
or control information referenced by the measured applica-
tion but maintained by another application.
TF is classified into three types according to data flow in
respect of application boundary and the processing logic of
each transaction. External Input (EI) is an elementary process
that carries data from outside to inside the system. External
Output (EO) is an elementary process that carries derived data
from inside the system to outside. External Query (EQ) is an
elementary process that sends data from inside to outside the
system boundary with a primary logic to present retrieved
information to the user. IFPUG FPA has a weighting system
that assigns certain weights to each TF BFC according to the
referenced Data Elements Type (DETs) and FTRs. As for DF,
each file is evaluated according to the DETs and Record
Elements Type (RETs). More information can be found in the
IFPUG FPA counting practice manual.
2.2 COSMIC Function Point
COSMIC function points [6]defines the smallest unit of
functional user requirements as a functional process, which is
defined as: “a set of data movements, representing an ele-
mentary part of the Functional User Requirements for the
software being measured”[6]. A functional process comprises
a pair of sub-processes: Data manipulation type and/or data
movements types, the latter being COSMIC BFCs that move a
data group type. Four data movements are described in [6]:
•Entry (E): A data movement that moves a data group
from a functional user across the boundary into the
functional process where it is required.
•eXit (X): A data movement that moves a data group from
a functional process across the boundary to the functional
user that requires it.
•Read (R): A data movement that moves a data group
from persistent storage into the functional process which
requires it.
•Write (W): A data movement that moves a data group
lying inside a functional process to a persistent storage.
Each data movement type has one unit of the final
CFP. The final size of an application is the total of all data
movements defined in all functional processes.
3 Research Methodology
3.1 Regression Models
Shapiro Wilk’s test was used to measure the normality,
while Pearson test was used to measure the correlations
between the variables. The Ordinary Least Squares
(OLS) was used to obtain the conversion equations:
•OLS: Is the most used regression model in convertibility
studies. It provides the estimation of the dependent variable
value through the independent variable value linearly. OLS
minimizes the sum of the squared residuals for the depen-
dent variable and the estimated value by the linear regres-
sion model [27]. The linear regression model looks like:
Y¼axþb
3.2 Accuracy of Predictive Models
Many fitting measures that are typically used in empirical
software engineering studies involved in evaluating the
accuracy of the obtained models:
•Magnitude of Relative Error (MRE): MRE measures the
difference between the actual value and the estimated
value divided by the actual value. The MRE measure is
computed using the formula:
MRE ¼Actual Estimated
jj
Actual
•Mean of MRE (MMRE): Is the mean of all MRE values
of all the data points in the dataset. In software
36 A. Z. Abualkishik
engineering studies, an estimation that has MMRE
0:25 is considered reasonable and acceptable.
•Pred (25): Represents the portion of the data points
estimate within MRE ±0.25% for the actual observa-
tions. According to Kitchenham et al. [28], MMRE and
Pred (25) are measures for spread and kurtosis. Addi-
tionally, we use Pred (10).
•Median or MRE (MdMRE): Is the median of all MRE
values.
All the fitting measures were obtained through the Leave
One Out Cross Validation (LOOCV). The LOOCV prevents
and alleviates over fitting. For a dataset of size N, the
LOOCV uses (N −1) data points as a training data for the
construction of the model and then validates it against the
left data point to obtain the desired fitting measures. The
regression model is constructed in each iteration. Finally, the
average is computed for all the desired measures. The
absolute residuals boxplots are used to compare the obtained
models equivalences as suggested by Kitchenham and
Mendes [29]. In addition, the Wilcoxon signed rank sum
test, also known as Mann-Whitney test, is used to compare
the significance of the obtained models by comparing the
absolute residuals.
4 Fetcke Case Study
Fetcke et al. [25] case study is a warehouse Management
Information System. The case study includes four subsys-
tems: Warehouse operation application, Manufacturer’s
warehouse, Customer management application, and Large
warehouse operation. Table 1shows the dataset.
Based on the data availability, it is possible to perform the
following based conversion types: TF, DF, UFP, and FTRs.
Table 2shows the descriptive statistics of Fetcke case study
parameters.
Shapiro-Wilk’s test is used to test the normality of the
variables TF, DF, UFP, FTRs, and CFP and the reported
results are: 0.73, 0.36, 0.86, 0.74, and 0.59, respectively.
Table 3shows the correlation results using Pearson corre-
lation test.
It is of interest to note that the correlation values are quite
high, thus, it is expected to obtain good fitted models.
Table 4shows the parameters of the conversion models
obtained by the OLS regression models.
In general, all the conversion types obtained good
adjusted R2value except for the DF based conversion type.
Therefore, this type is not expected to provide as accurate a
model as the other types.
5 Accuracy Measures Obtained with LOOCV
Table 5shows the accuracy measures obtained for the
conversion types reported in Table 4The accuracy measures
show that the best conversion type for this dataset is the
TF-based type with minimum MMRE, MdMRE and nar-
rower relative error. This is followed by the FTRs-based
type, which is the most common type used in the literature,
and finally the DF-based type. Figure 1shows the boxplots
of the absolute residuals. Figure 1confirms the results
reported in Table 5.
To statistically make sure that the reported values have
not been obtained by chance, the Wilcoxon signed rank sum
test is used to test whether the absolute residuals yielded by
Table 1 Fetcke dataset Application name TF DF UFP FTRs CFP
LS 19 12 31 9 29
LC 37 19 56 18 52
C3514491752
M2614401239
W5621772781
Table 2 Descriptive statistics of
Fetcke case study Application name TF DF UFP FTRs CFP
Mean 34.6 16 50.6 16.6 5.6
Median 35 14 49 17 52
Sdev 13.9 3.8 17.5 6.8 19.5
Range 19–56 12–21 31–77 9–27 29–81
Mean 34.6 16 50.6 16.6 5.6
A Review Study on the Accuracy of Conversion …37
the LOOCV of model 1 are either greater, or less, or equal to
model 2 absolute residuals as shown in Table 6, with the
following three null hypotheses:
1. Ho: The absolute residuals of model 1 are equal to the
mean absolute residuals of model 2.
2. Ho: The absolute residuals of model 1 are greater than
the absolute residuals of model 2.
3. Ho: The absolute residuals of model 1 are less than the
absolute residuals of model 2.
Table 6confirms the previously reported results. To
conclude, it is possible to state that the TF conversion type
produces the conversion with the highest accuracy for this
dataset followed by the FTRs, UFP, and DF.
6 Discussion
The published results in this paper confirm the results pub-
lished in the literature in which it is impossible to find a
unique statistical model between the two measurement
methods, and so, it is needed to test the accuracy of various
conversion types to achieve the most accurate results.
Each conversion type is affected by certain factors that
increase the likelihood of achieving high accuracy in the
conversion process. For example, the TF-based type is
affected by factors as the size distribution of transaction
functions to data functions, the ratio between elementary
processes and functional processes. However, there are
common factors that affect any conversion type. For exam-
ple, the structure of FPA method that comprises five different
BFCs is classified into two types, in addition to the FPA
weighting system that sums ordinal scales value which in
principle violates the measurement theory.
Moreover, it is due to the COSMIC data movements that
are dependent on the data group and object of interest
defined according to COSMIC method as well as the char-
acteristics and data intensity movements of the measured
Table 3 Correlations between
Fetcke case study variables Combination Pearson P-value
TF versus CFP 0.998
DF versus CFP 0.883
UFP versus CFP 0.989
FTRs versus CFP 0.996
TF versus CFP 0.998
Table 4 Conversion equations Conversion type Equation R2
TF CFP = 1.39 TF + 2.26 0.996
DF CFP = 4.53 DF −21.95 0.779
UFP CFP = 1.1 UFP −5.32 0.978
FTRs CFP = 2.28 FTRs + 3.55 0.993
Table 5 Accuracy measures of
conversion types obtained with
LOOCV
Conversion type MMRE MdMRE Pred (25) Pred (10) Relative error
TF 0.025 0.020 1 1 −4.73 to 2.93
DF 0.242 0.258 0.4 0.2 −36.3 to 27.5
UFP 0.052 0.065 1 0.8 −11.31 to 7.63
FTRs 0.035 0.050 1 1 −6.25 to 5.35
Fig. 1 Boxplots of relative residuals of all models
38 A. Z. Abualkishik
system. In addition to the subjectivity of measurement
between different measurers, the quality of documentation is
used to obtain the counts. Moreover, there is also the theo-
retical correspondence between the two methods. In addi-
tion, there are a number or applications used to derive the
regression model and the regression model type.
The FPA weighting system efficiently trims large process
sizes. For example, an EI that references 3 FTRs or 7 FTRs
will be assigned the same weight. Moreover, the ratio of DF
to TF affects the accuracy of the tested conversion types. The
ratio of DF to TF for Fetcke case study ranges between (37.5
and 63.1%). This ratio shows differences in the distribution
of each application in this dataset, and consequently, dif-
ferent conversion equations with different accurate results.
This makes it necessary to apply a systematic conversion
approach that includes testing more than one conversion
type.
Abualkishik et al. [24] pointed out that several conversion
types must be tested to pick the most accurate type that
best-fits a certain dataset. They proposed a new conversion
type that is based on FTRs and found it the most accurate for
several datasets. However, this is not the case for this dataset
in which the TF-based type was found to be the best con-
version type. This can be justified by the lack of correlation
between the FTR and data movements that derived from
various reasons as mentioned previously. The results
reported in this paper coincided with the conclusion reported
in [24] in which more than one conversion type must be
tested to achieve best level of accuracy.
The results of this study are subject to internal threats, for
example, the quality of the experimental data and the sub-
jectivity of the measurements. It is noteworthy to mention
that the measurement of Fetcke case study was carried out
by experts in the field. Moreover, the size of the dataset used
is critical to obtain representative and sound statistical
results. However, obtaining such a dataset is difficult due to
the high cost of FSM counting, for example, one hour of a
certified measurer could cost up to 200 euro/hour, and the
fact that any software organization usually uses one FSM
method for the sake of cost estimation.
The conclusion validity addresses the underlying statis-
tical methods used to obtain the results. In this paper, the
LOOCV was used to obtain the aggregated accuracy mea-
sures, thus preventing any over fitting. Non-parametric tests
were used to test the null hypothesis that does not necessitate
the normality assumptions. Consequently, the error rang of
this study could be marginal.
7 Conclusion
The convertibility between FPA and COSMIC function
points has been increasing since the proposal of COSMIC
function points. The accuracy of several conversion types
was tested using Fetcke case study. The accuracy measures
were obtained via the LOOCV. The results showed that the
TF-based conversion type offers the highest accuracy for this
case study. Future work should consider applying the con-
version types into further datasets.
References
1. Albrecht, A.J.: Measuring application development productivity.
In: IBO Conference on Application Development, pp. 83–92
(1979)
2. Albrecht, A.J., Gaffney, J.E.: Software function, source lines of
code, and development effort prediction: a software science
validation. IEEE Trans. Softw. Eng. SE-9(6), 639–648 (1983)
3. Conte, S.D., Dunsmore, H.E., Shen, V.Y.: Software Engineering
Metrics and Models. Benjamin-Cummings Publishing Co, Red-
wood City (1986)
4. Grady, R.: Practical Software Metrics for Project Management and
Process Improvement. Prentice-Hall, Upper Saddle River, NJ,
USA (1992)
5. Abran, A., Robillard, P.N.: Function points analysis: an empirical
study of its measurement processes. IEEE Trans. Softw. Eng. 22
(12), 895–910 (1996)
6. Abran, A., et al.: The COSMIC Functional Size Measurement
Method Measurement Manual, version 4.0.1 (2015)
7. Vogelezang, F., Lesterhuis, A.: Applicability of COSMIC full
function points in an administrative environment experiences of an
early adopter. In: Proceedings of the 13th International Workshop
on Software Measurement—IWSM 2003 (2003)
8. Cuadrado-Gallego, J.J., Buglione, L., Domínguez-Alda, M.J., de
Sevilla, M.F., de Mesa, J.A.G., Demirors, O.: An experimental
study on the conversion between IFPUG and COSMIC functional
size measurement units. Inf. Softw. Technol. 52(3), 347–357
(2010)
Table 6 Wilcoxon signed rank
sum of LOOCV absolute
residuals
Conversion Type M1 = M2 M1 > M2 M1 < M2
TF versus DF ––1
TF versus UFP ––0.90
TF versus FTRs ––0.90
DF versus UFP –1–
DF versus FTRs –1–
UFP versus FTRs –0.90 –
A Review Study on the Accuracy of Conversion …39
9. Cuadrado-Gallego, J.J., Abran, A., Rodríguez-Soria, P., Lara, M.
A.: An experimental study on the conversion between IFPUG and
UCP functional size measurement units. J. Zhejiang Univ. Sci.
C15(3), 161–173 (2014)
10. Ferrucci, F., Gravino, C., Sarro,. F.: A case study on the
conversion of function points into COSMIC. In: Proceedings of
the 2011 37th EUROMICRO Conference on Software Engineering
and Advanced Applications, pp. 461–464 (2011)
11. Gencel, C., Bideau, C.: Exploring the convertibility between
IFPUG and COSMIC function points: preliminary findings. In:
2012 Joint Conference of the 22nd International Workshop on
Software Measurement and the 2012 Seventh International Con-
ference on Software Process and Product Measurement
(IWSM-MENSURA), pp. 170–177 (2012)
12. Abran, A., Desharnais, J.-M., Aziz, F.: Measurement convertibility
–from function points to COSMIC-FFP. In: Proceeding of the
15th International Workshop on Software Measurement (IWSM),
pp. 227–240 (2005)
13. Desharnais, J.-M., Abran, A., Cuadrado-Gallego, J.: Convertibility
of function points to COSMIC-FFP: identification and analysis of
functional outliers. In: International Conference on Software
Process and Product Measurement (MENSURA) (2006)
14. Heeringen, H.V.: Changing from FPA to COSMIC –a transition
framework. In: Proceedings Software Measurement European
Forum (SMFE) (2007)
15. Cuadrado-Gallego, J.J., Buglione, L., Rejas-Muslera, R.J.,
Machado-Piriz, F.: IFPUG-COSMIC statistical conversion. In:
EUROMICRO 2008 - Proceedings of the 34th EUROMICRO
Conference on Software Engineering and Advanced Applications,
SEAA 2008, pp. 427–432 (2008)
16. Abualkishik, A.Z., Ferrucci, F., Carmine, G., Lavazza, L., Liu, G.,
Meli, R., Robiolo, G.: A study on the statistical convertibility of
IFPUG function point, COSMIC function point and simple
function point. J. Inf. Softw. Technol. 86,1–19 (2017)
17. Abualkishik, A.Z., Selamat, M.H., Ghani, A.A.A., Atan, R.,
Desharnais, J.M., Khelifi, A.: A convertibility study on the
conversion between FPA and COSMIC for real time systems. In:
Proceedings of the 2012 Joint Conference of the 22nd International
Workshop on Software Measurement and the 2012 7th Interna-
tional Conference on Software Process and Product Measurement,
IWSM-MENSURA 2012, pp. 143–149 (2012)
18. Cuadrado-Gallego, J.J., Machado-Piriz, F., Aroba-Páez, J.: On the
conversion between IFPUG and COSMIC software functional size
units: a theoretical and empirical study. J. Syst. Softw. 81(5), 661–
672 (2008)
19. Abualkishik, A.Z., Selamat, M.H., Ghani, A.A.A., Atan, R.,
Desharnais, J.M., Khelifi, A.: Theoretical and probabilistic
conversion model between FPA and COSMIC measurement
method. In: 2012 Joint Conference of the 22nd International
Workshop on Software Measurement and the 2012 Seventh
International Conference on Software Process and Product Mea-
surement, pp. 150–159 (2012)
20. Lavazza, L.: Convertibility of functional size measurements. In:
Proceedings of the 5th International Conference on Predictor
Models in Software Engineering - PROMISE ’09, p. 1 (2009)
21. Lavazza, L., Morasca, S.: Convertibility of function points into
COSMIC function points: a study using piecewise linear regres-
sion. Inf. Softw. Technol. 53(8), 874–884 (2011)
22. Lavazza, L.: A systematic approach to the analysis of function
point –COSMIC convertibility. In: International Workshop on
Software Measurement, ICSM/Mensura (2010)
23. Lavazza, L., Morasca, S.: A study of non-linearity in the
statistical convertibility of function points into COSMIC function
points. In: Proceedings of the Workshop on Advances in
Functional Size Measurement and Effort Estimation - FSM ’10,
pp. 1–8 (2010)
24. Abualkishik, A.Z., Desharnais, J.-M., Khelifi, A., Ghani, A.A.A.,
Atan, R., Selamat, M.H.: An exploratory study on the accuracy of
FPA to COSMIC measurement method conversion types. Inf.
Softw. Technol. 54(11), 1250–1264 (Nov 2012)
25. Fetcke, T.: The warehouse software portfolio a case study in
functional size measurement, 1999/2000. Technical Report
No. 1999–20, Département d’informatique, Universitédu Quebec
àMontr éal, Canada
26. International Function Point User Group (IFPUG): Function Point
Counting Practices Manual, Release 4.3.1, ISBN:
978-0-9753783-4-2 (2010)
27. Miles, C., Shevlin, M.: Applying regression and correlation: a
guide for students and researchers. SAGE, London (2001)
28. Kitchenham, B., Pickard, L.M., MacDonell, S.G., Shepperd, M.J.:
What accuracy statistics really measure. IEE Proc. - Softw. 148(3),
81 (2001)
29. Kitchenham, B., Kitchenham, B., Mendes, E., Mendes, E.: Why
comparative effort prediction studies may be invalid. Proc. 5th Int.
Conf. Predict. Model. Softw. Eng. 1,1–5 (2009)
40 A. Z. Abualkishik
Analyzing the Role of Human Computer
Interaction Principles for E-Learning
Solution Design
Zahra Al Mahdi, Vikas Rao Naidu, and Preethy Kurian
Abstract
Education technology is one of the key application areas
of Multimedia. Interactive multimedia also called as
Hypermedia plays a vital role in enhancing the teaching
and learning experience in higher education sector.
Various e-learning solutions are already available in the
market and many of them are even available for free.
These solutions may include, E-books, interactive
lessons, video-based tutorials, interactive exercises for
revision, educational games, mobile-based educational
tools, and so on. The Higher education sector has students
of varying age groups. Therefore, in order to make sure
that appropriate e-learning solution is adapted with
suitable interface design, it is important to keep all the
principles of Human-Computer Interaction (HCI) in con-
sideration. This research paper analyzes the role of HCI in
the design of e-learning solution. Authors have performed
a thorough literature survey on various resources related
to this topic. The result of this research will provide
guidelines for better e-learning solution design, which
could be considered appropriate for respective users.
Keywords
Advanced Human-Computer interaction
Education technology E-learning HCI principles
Higher education Hypermedia Mobile learning
1 Introduction
Human computer interaction (HCI) plays a vital role in
designing effective e-learning solutions with key focus on
usability. The objective of this research paper is to review
the relationship between Human computer interaction and
e-learning. In order to achieve the objectives of this paper,
sufficient literature was reviewed to explore the potentials of
linking HCI in e-learning. As the technology is enhancing,
designers and developers need to recognize and apply the
right HCI principles to develop a best fit e-learning appli-
cation for our learners. HCI principles are applicable to all
the interactive application design and hence e-learning
solution is no different. E-learning solutions need appropri-
ate user interface (UI) design for different level of users. For
basic users, which can be considered to be at the school
level, the design of UI can incorporate such screen interface
which is appropriate at that level, with respect to font or
color combination apart from graphics. Whereas, when it
comes to higher level of implementation, UI needs to be
analyzed for appropriate user such as elderly or other users.
Moreover, this differs from platform to platform. Hence, for
desktop it may differ and for mobile devices, it may differ.
To enhance the natural learning experience of user, designer
must carry out a deeper study to explore the possibilities of
HCI in e-learning and educational pedagogies. This will
assist in successful creation of an e-learning environment
contrary to traditional environment. The purpose of this
research is to analyze human computer interaction principles
and explore methods on integrating the identified principles
into the design model of e-learning application.
2 HCI Principles
The application of human computer interaction in e-learning
is a blend of art and science which requires a thorough study
on user characteristics and technology capabilities to
Z. Al Mahdi (&)
Centre for Academic Practices, Middle East College,
Seeb, Oman
e-mail: zahra.almehdi@gmail.com
V. Rao Naidu P. Kurian
Computing Department, Middle East College,
Seeb, Oman
e-mail: vikasrn@gmail.com
P. Kurian
e-mail: preethy@mec.edu.com
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_6
41
develop appropriate graphical user interface. While design-
ing effective e-learning applications, HCI principles are
applied to explore the methods of mapping computing
functions to user capabilities effectively to satisfy users
within the context of its use [1].
It is the accountability of the designer of e-learning
applications to sightsee the user requirements and set prin-
ciples accurately to ensure that the final artifact is not only
functioning but promote learning experience through effec-
tive design [2]. The Shneiderman’s eight golden rules [3]
supports for crafting human interactive systems to support
user’s learning experience. The rules must be accentuated on
the interface of e-learning application. Consistency is
essential for interface in terms of layout, command and
dialogue. The user must get proper feedback of their actions
which stimulate them to keep continuing their learning using
application. Facilities must be embedded in the interface to
practice shortcut for executing tasks which promote
e-learning. The user must also be communicated promptly
the status of task completion. The interface of e-learning
application must shield the users from errors and in case of
any fault; users must be given support to get rid of them.
E-learning application must have facilities in interface to
reverse user’s actions at any point of time. User is expected
to get a control of the system as if he is the master of whole
artifact which motivates him to keep continuing its use. The
application also possesses innovative design techniques in
display which facilitate time for the users to learn action
sequences [4]. The systems must support user’s task effi-
ciently and effectively and absolve the careless mistakes [1].
The above rules comprehend wholly requirements of an
interactive interface with prime focus on easing the usability
of the e-learning application.
3 HCI in E-Learning
Teaching and learning systems at education sector are
designed to produce employable graduates who are not only
knowledgeable in their own field of study, but also forward
thinking, creative, and responsible members of society. In its
quest to achieve this objective, the institution has developed
a set of generic graduate attributes that are embedded in
program me and module learning outcomes. A wide spec-
trum of teaching methodologies is applied, including lec-
tures, practical work [5], and usage of different technology
moving from generic content and skill development. These
days, the huge demand of HCI is lying in the field of edu-
cation for various e-learning resource developments with the
support of latest tools and technologies. E-learning using
interactive games motivate students for better knowledge
acquisition and develop a positive attitude among learners
[1].
Students are engaging in educational game by deploying
HCI evaluation methods. Those games craft a new learning
approach and enhance the learning process. The key objec-
tive of designing interactive games for educational purpose
is to engage students and motivate them to learn whilst
playing [6]. The developer can use HCI evaluation tech-
niques to develop and asses the educational Technology
tools and platforms to achieve an extremely productive
environment for learners. The first step towards effective
engagement of students in educational Technology tool is to
examine the Human Computer Interaction facets in the
specific platform. User engagement is evaluated on how
close the interaction occurs between the learner and the tool.
To measure the level of user engagement by applying HCI
principles and evaluate the response of the user to see how
the learners are engaging with the tool and techniques.
However, there are some challenges in learning, such as lack
of engagement or the repetitive nature of tasks. In order to
overcome these challenges, designers need to strive towards
building interaction games [7] by establishing interactive
user interface is highly encouraged in educational institu-
tions. Implementing HCI in e-learning will sustain learning
opportunities and user interaction.
4 Design Approaches for E-Learning
The use of e-learning tools by deploying HCI principles and
applying pedagogical approaches is high in demand for
effective learning [8]. The e-learning becomes an integral part
of educational institutions which motivate learner and get
them engaged easily. E Learning enables the student to
understand fast and create a flexible interaction between
student and learning resources. E-Learning also supports
disabled community to a great degree for achieving learning
objectives in a consistent and flexible way. Also, its gives the
student freedom to learn and do whatever they need and to
learn at their own convenience. Designers must ensure that
e-learning design does not hindrance or stigmatize any group
of users but accommodate wide range of individual prefer-
ences and abilities [9]. The interface must support the learner
to retrieve information regardless of ambiguous conditions.
The learner must be facilitated ways to minimizes hazards in
the interface design and also minimize the consequences of
accidental or unintended actions. The interface of e-learning
application must aid the user to get the knowledge efficiently
and comfortably [8], and with a minimum of fatigue [6]. The
42 Z. Al Mahdi et al.
design must satisfy the student and teacher’s expectations
and should meet the following criteria.
•The visual appearance of subject matter must be
appealing.
•Easy to use navigation structure.
•Learning must be made fun using animations and
graphics.
•Clear instructions on how to use the application.
The most important strategy deployed during the design
process is to use a collaborative approach by analyzing
expectations of: the learners, teachers and educational planners.
5 Proposed Methodology
The design process of e-learning solution or learning
resources by following HCI principles could be very effec-
tive once we implement a systematic approach. Authors
would recommend the methodology given in the Fig. 1that
makes the process clearer [9].
As we see from Fig. 1, the proposed methodology has
five major stages.
5.1 Analysis of Subject Area
In this stage, the subject area is analyzed to identify which
topic needs the assistance of e-learning. In some cases, the
entire subject is identified to produce in interactive format
for better learning [10].
5.2 Identification of Appropriate Solution
Once the subject area is identified, appropriate solution is
adapted from the wide variety of choices [11]. Here the
developer faculty needs to decide if the subject could be well
presented in e-book or video based tutorial or any other
interactive media [12]. The type of learning resource is
decided at this stage.
5.3 E-Learning Solution Design
At this stage, the actual design process begins. This stage is
governed by HCI principles, to make sure the solution
design is as per recommended standard and guidelines [13].
Moreover, for the respective learners, such as elder people or
mid-level students or primary level students, corresponding
design strategy is adapted. This involves, design of layout,
choice of fonts and color, and many such accessibility
options.
5.4 Testing and Implementation
After the completion of design process, the learning resource
is tested for various technical and non-technical factors [9].
The testing stage is also governed by HCI principles, to
ensure all the guidelines are followed with respect to the
requirements. Once the testing phase is clear with positive
result, the solution is implemented for the end-users, i.e.,
students [7].
5.5 Feedback and Recommendations
At this stage, feedback is collected from the end-users in
order to measure the effectiveness. Based on the feedback,
recommendations are provided for further improvements and
hence this make the methodology cyclic [9].
6 Recommendation
The context of traditional classrooms always supports the
student for face to face interactions with the instructor.
However, in modern era students prefers e-learning envi-
ronment due to its flexibility and ease of use. The emerging
technologies also supports better e-learning environment for
all learners. Efficient e-learning solution can be developed
using an integrated approach of collaborating HCI principles
and educational pedagogies. Emphasize must be given on
e-learning activities and interface must have essential fea-
tures for thoroughgoing interactions which can engage
HCI
Principles
Fig. 1 Proposed methodology
Analyzing the Role of Human Computer Interaction …43
e-learning users [11]. The designer must develop a learner—
centric approach in planning, design and implementation of
e-learning platforms. A user centered framework can be
developed by exploring the context of use, analyzing the
tasks and environment and also exploring technology to be
used. A study of personal characteristics, aptitudes and
learning style of users also can contribute in [5] developing a
fruitful e-learning solution with preferences and interests for
the learner’s success. The research supports that interactive
e-learning application with games and animation can create a
positive impact in learners psychologically [7]. The
e-learning platform must facilitate dynamic learning envi-
ronment which must fit with learners individual learning
style [10]. From the perspective of designing e-learning
applications, designers must create a meaningful design
blended with appealing visual design and user interaction to
make learners a comfortable learning environment.
Acknowledgements Authors would like to extend their sincere thanks
to the Management of Middle East College, for support and encour-
agement towards research.
References
1. Issa, T., Isaias, P.: Sustainable Design HCI, Usability and
Environmental Concerns (2015)
2. Terblanche, J.T.: Using HCI principles to design interactive
learning material. Mediterr. J. Soc. Sci. 5(21), 377–380 (2014)
3. Karim, D.F., Kanti, U.: Usability guidelines for usable user
interface. Int. J. Res. Eng. Technol. 3(9), 79–81 (2014)
4. Saini, R.: Graphical user interface design essentials & process. Int.
J. Adv. Res. Comput. Sci. Softw. Eng. 3(9), 482–483 (2013)
5. Andrina Granic, M.C.: Universal design within the context of
e-Learning. In: Conference on Universal Access in
Human-Computer Interaction: Applications and Services, Berlin
(2007)
6. Blazanka Divjek, D.T.: The Impact of Game-Based Learning on
the achievement of learning goals and motivation for learning
mathematics-literature review. JIOS 35(1) (2011)
7. Zhan, L., Duanb, Y.: Evaluation of learning performance of
e-learning in China: a methodology based on change of internal
mental model of learners. Turk. Online J. Educ. Technol. 9(1)
(2010)
8. McKay, E.: Enhancing Learning Through Human Computer
Interaction, p. 290 (Jan 2007)
9. Mehlenbacher, B., Bennett, L., Bird, T., Lucas, J., Morton, J.:
Usable E-Learning: a conceptual model for evaluation and design.
In: 11th International Conference on Human-Computer, Las Vegas
(2005)
10. AL-Hunaiyyan, A., Al-Huwail N., Al-Sharhan, S.: Blended
e-learning design: discussion of cultural issues. Int. J. Cyber
Soc. Educ. 1(1), 17–32 (Mar 2008)
11. Berry, M.: Enhancing Learning Through. In: Idea Group Inc
(2007)
12. Gross, T.: Human computer interaction education and diversity. In:
Human-Computer Interaction Group (2014)
13. Kurosu, M.: Human computer interaction theories, methods, and
tools, Greece (2014)
44 Z. Al Mahdi et al.
Automatic Detection of Students Learning
Style in Learning Management System
T. Sheeba and Reshmy Krishnan
Abstract
Learning style is one of the major factors of student
performance in any learning environment. Determining
the learning style of students enhances the performance of
learning process. This paper proposes an approach to
classify students learning style automatically based on
their learning behavior. One of the best widely used
classifier algorithm is decision tree which is proposed in
this paper. The main concern in decision tree classifier is
the construction of significant rules which are required for
accurately identifying learning styles. Lack of significant
rules would result in misclassification of learning style.
Hence, the main focus of this paper is to construct most
significant rules which would strengthen the existing
decision tree classifier to precisely and accurately detect
the learning style of students. The student behavior is
obtained from the web log files and then mapped with
three learning dimensions of standard Felder Silverman
learning style model. Subsequently, by employing sig-
nificant rules in decision tree classifier, the student
behavior has been automatically classified with high
accuracy. This approach was experimented on 100
students for the online course created in Moodle Learning
Management System. The evaluation result is obtained
using inference engine with forward reasoning searches
of the rules until the correct learning style is determined.
The result is then analyzed with a confusion matrix of
actual class and predicted class which shows that
processing dimension shows variance whereas perception
and input dimension were detected correctly with an
average accuracy of 87%.
Keywords
Learning management system Weblog
Learning styles Felder-Silverman learning style
model Decision tree classifier
1 Introduction
Learning style is typically defined as the best way the learner
prefers to learn. Everyone has his/her own style on learning
which helps them to learn better and can also vary from one
situation to another. The learning style of a learner determines
how learners learn and acquire knowledge in different ways in a
learning system. It is characterized by different types of factors
such as course contents i.e., notes, exams, assignments, tutorials
and exercises; the order in which course is organized and pre-
sented; how information is presented to the learners; the inter-
action mechanisms among learners such as discussion forums,
chat rooms, and email systems. The learning system is used by a
diverse variety of learners with different background, abilities,
preferences, skills, needs, interest and learning styles. The
problem of detecting how learners would learn and acquire new
knowledge and skills has been gained great interest of research
in the last decade. In order to achieve this goal, there is a need to
determine each learner’s learning style and adjust the courses or
assist the learner to best fit each learner needs.
The rest of this paper is organized as follows: Sect. 2
gives the background work in the similar area. Section 3
describes the proposed approach. Section 4demonstrates the
experimental results and discussion. Finally, Sect. 5pro-
vides a conclusion.
2 Literature Review
The various studies in learning system have proved that the
learners learning have improved when the educators’
teaching style match with the learners learning styles.
T. Sheeba (&)
Department of Computer Science and Engineering,
Karpagam University, Coimbatore, TamilNadu, 641021, India
e-mail: tsheebat2002@yahoo.co.in
R. Krishnan
Department of Computing, Muscat College, P.O. Box: 2910
P.C: 112, Ruwi, Sultanate of Oman
e-mail: reshmy_krishnan@yahoo.co.in
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_7
45
In order to detect the learning style of learners and to reduce
the gap between educators’and learners’style, there is a
need to discover each learner’s learning style and adapt the
courses or assist the learners to best fit to it.
There are two ways to obtain learning style. The most
popular method is questionnaire which is a static approach
and time consuming and may not be accurate. After the
emergence of using Learning Management System (LMS) in
education, it become more appropriate to acquire the learn-
ing style dynamically and indirectly using automatic detec-
tion method. There were two approaches used for automatic
detection of learning styles: data-driven and literature-based
approach. The data-driven approach uses sample data to
build a classifier that imitates a learning style instrument.
This approach mainly uses AI (Artificial Intelligence) clas-
sification algorithm which takes the learner model as input
and returns learners learning style preferences as output [1].
This approach has the advantage of to be more accurate and
less error-prone, as it uses real data to detect students’
learning styles. On the other hand, literature-based methods
uses simple rules to calculate learning style from number of
matching hints. The weakness in this approach is that there is
a possibility that some behavioral patterns of learning styles
may not be taken into account for the calculation of learning
style [2].
The proposed system employs data-driven approach
using AI classification algorithm to automatically detect
learning styles. Several models of learning styles have been
described for defining learning styles such as Kolb’s,
Gardner, Felder and Silverman, Biggs and custom learning
style model [1]. Each model has its strength and weakness.
Among the proposed models, Felder and Silverman learning
style model (FSLSM) is chosen as it is the widely used
model proven to be suitable to use in educational systems
and tested in engineering education exhibiting a good degree
of reliability, validity and internal consistency. This model
describes the learning style of learners into four different
dimensions (active/reflective, sensitive/intuitive,
visual/verbal, sequential/global) based on the behavior pat-
terns of learners using the system.
Depending on the FSLSM, various research works have
been proposed to detect learning styles on a data driven
approach using several AI classification algorithms. The
various AI techniques used are Bayesian network [3], Deci-
sion Tree [4], Genetic Algorithms [5,6], Neural Network [7],
Genetic algorithms with K-NN [1] etc. Comparison of these
algorithms in terms of four dimensions [Processing (Pr),
Perception (Pe), Input (In) and Understanding (Un)] of
FSLSM are shown in [8,9]. As each algorithm has its own
strength and weakness, the most widely used AI algorithms
for classification are Bayesian network, Neural Network and
Decision Tree. Bayesian network uses conditional probabil-
ities to represent uncertainty of data, but it has no universally
accepted standard for constructing this network from data.
Neural network shows good classification accuracy as it has
the learning capability from specific examples, whereas it has
the weakness of having high computational complexity; no
theoretical rule defined to determine the optimal number of
hidden neurons; complex to define number of hidden layers;
lack of descriptive power and difficult to identify rules for
both inputs and outputs.
The decision tree is a widely used classification algorithm
which has proved to have high accuracy. This algorithm
requires significant classification rules for identifying
learning styles. The previous studies reported in the decision
tree implementation does not show significant rules for
identifying learning styles based on FSLSM. Hence, the
construction of most significant rules would be the main
focus of the proposed system in order to strengthen the
existing classifier to make accurate classification and pre-
diction of learning style of learners and to emphasis on the
automatic classification of learning styles when weblog files
are given as input to the classifier which is not been previ-
ously done by other researchers in this area.
3 Methodology
3.1 Proposed Approach
The proposed architecture is shown in Fig. 1. The approach
starts with data collection which controls the process of
collecting web log files created automatically in
Moodle LMS based on the student actions. Then data pre-
processing is done to acquire learning style from web log
files. It includes weblog analysis in which students’behavior
is extracted and using significant rules of decision tree,
learning style is extracted based on FSLSM.
3.1.1 Data Collection
Web log files contain all the behaviors that the learner per-
forms in Moodle LMS. These logs are automatically created
when the learners use the system. It records all the activities
in the form of chats, forums, quizzes, exercises, assignments,
exam delivery, frequency of accessing course materials etc.
Initially, the web log files of each learner are collected and
filtered out by the activities and their corresponding actions
as shown in Table 1.
3.1.2 Data Preprocessing
Data preprocessing includes web log analysis in which
learner actions are extracted based on the three dimensions
(processing, perception and input) of FSLSM. The fourth
dimension of FSLSM describes the sequential and global
learner is not considered for experimentation in the proposed
system, since most of the learning content used in
46 T. Sheeba and R. Krishnan
Moodle LMS is provided as a whole content instead of
sequential order.
Processing dimension: This dimension determines the
active and reflective learners by their participation in doing
activity something physical or theoretical. Active learners
mainly prefer to work in groups and perform more number
of exercises whereas reflective learners prefer to work alone
and perform less number of exercises. Based on this learning
behavior, the behavior patterns of learners such as forum
discussions, chats and assignments are investigated from
weblog file. For forum discussion, the actions such as ‘add
post to start discussions’,‘view & add post messages’,‘only
view forums & discussions’and ‘no participation’are ana-
lyzed. For chats, the actions such as ‘view & report’,‘only
view’and ‘no participation’are analyzed and for the
assignments, the actions such as ‘submit’and ‘view-submit
assign form’are analyzed.
Perception dimension: This dimension determines the
sensitive and intuitive learners. The sensitive learners mainly
have more attentiveness, carefulness and low trial and high
Student
Learning Style Acquiring
WebLog
(Behavior)
Database
Decision Tree Classifier
based on FSLSM
Decision
Tree Rules
Data Preprocessing
Fig. 1 System architecture of
proposed approach
Table 1 Activities versus
actions of WebLog files Activities Actions
Quiz Quiz attempt
Quiz continue attempt
Quiz close attempt
Quiz review
Assignments Assign view
Assign submit
Assign view submit assignment form
Chats Chat view
Chat report
Chat talk
Chat add
Forums View forum
View discussion
Add discussion
Add post
Notes Resource view
Powerpoints Resource view
Hyperlinks URL view
Automatic Detection of Students Learning Style …47
completion towards the performance in exams and exercises
whereas intuitive learners’show being bored by details,
carelessness and high trial and low completion in exams and
exercises. Based on this learning behavior, the behavior
patterns of learners such as exam and assignments are
investigated from weblog file. For exams, the actions such as
‘exam review’,‘attempt and continue attempt’,‘exam
delivery time’and ‘exams done’are analyzed and for
assignments the actions such as ‘submit’and ‘view-submit
assign form’are analyzed to determine the number of times
the particular action is performed to determine the number of
times the particular action is performed.
Input dimension: This dimension determines the visual
and verbal learners by their preference over the learning
content and the participation in group activities. Based on
the characteristics of visual and verbal learners, behavior
patterns such as text, power point and hyperlinks are
investigated from weblog file. For these behavior patterns,
actions such as ‘view’and ‘no view’are analyzed to
determine the number of times the particular action is
performed.
3.1.3 Create Learning Style Model
The learning style model is created using decision tree
classifier for classifying the learning styles based on
FSLSM. The decision tree is a flow chart like structure in
which internal node represent a test on the features to be
tracked that lead to those targeted learning style and the
leaves represent the target learning style to be inferred. The
final structure of a decision tree consists of root nodes,
decision nodes, leaf nodes and branches. The root node
represents the base attribute used to build the tree. It is
divided into one or more decision nodes which represent the
test on an attribute that describe the inner part of the tree;
leaf nodes represent the class labels to infer, and the bran-
ches connecting the nodes represent the possible values that
the attribute of the branch initiates [1].
Figure 2shows the modelling of learners’behavior in
Moodle LMS system in which internal nodes represent the
FSLSM dimensions and the action of the learner behaviors
accessing the system.
3.1.4 Classify and Predict Learning Style
The final step is to classify and predict the learning style of
the learners based on their input behavior. The learners’
behaviors extracted from the web log files are given as input
to the decision tree classifier. Based on the significant rules
of the decision tree classifier, the classifier accurately
determines the output which is the learning style of each
learner based on FSLSM. The classification process is
divided into two phases namely training phase and testing
phase. The training phase constructs a perfect tree by par-
titioning the data set recursively into smaller subsets until all
the records in a partition have the same class. In the testing
phase, the nodes are tested with test data set and iteratively
pruned to obtain a tree with higher accuracy. The classified
learning activities of each learner is then used for predict the
learning style of new learners based on the set of decision
rules (Table 2).
For example: The processing dimension (active/
reflective) includes the group activities such as forum dis-
cussion, chats and assignments. For forum discussion, the
actions like ‘add post to start discussions’or ‘view and add
post messages’or ‘only view forums and discussions’or ‘no
Learning Style
Processing
(Active/Reflective)
Perception
(Sensory/Intuitive)
Input
(Visual/Verbal)
Forum
Chats
Assignment Exams Assignments
Exam Review
Exam Attempt Exam Delivery Time
Exams Done
Text
PPT
Hyperlink
Fig. 2 Modelling learner’s behavior with Moodle LMS
48 T. Sheeba and R. Krishnan
participation’are processed. For chats, the actions like ‘view
and report’or ‘only view’or ‘no participation’are pro-
cessed. For assignments, the actions like ‘submit’and
‘view-submit assign form’are processed. Based on the rules
applied to these actions, final values are calculated (Table 2)
which are then used to calculate the final category of
dimensions such as extremely reflective, medium reflective,
neutral, medium active and extremely active.
The perception dimension (sensitive/intuitive) includes
the activities such as exams and assignments. For exams, the
actions like ‘Exam Review’or ‘Attempt & Continue
Attempt’or ‘Exam Delivery Time’or ‘Exams done’are
processed. For assignments, the actions like ‘submit’and
‘view-submit assign form’are processed. Based on the rules
applied to these actions, final values are calculated (Table 2)
which are then used to calculate the final category of
dimensions such as extremely intuitive, medium intuitive,
neutral, medium sensitive and extremely sensitive.
The input dimension (visual/verbal) includes the activities
such as text, ppt and hyperlinks. For all these activities, the
actions like ‘View’or ‘No View’are processed. Based on
the rules applied to these actions, final values are calculated
(Table 2) which is then used to calculate the final category
of dimensions such as extremely verbal, neutral and extre-
mely visual.
3.2 Algorithm of Extracting Learning Style
See Fig. 3.
Table 2 Decision tree rules
Automatic Detection of Students Learning Style …49
4 Experimental Results and Discussion
The proposed work is experimented on around 100 online
learners taking five online computing courses created in
Moodle LMS. The learners registered for these five online
courses had no previous knowledge on the topics taught in the
course, since all these courses are delivered as basic units.
These courses cover rich course topics represented in different
types of elements such as texts, hyperlinks, assignments and
quizzes etc. More number of assignments is presented to the
learners for each topic as per the requirement of the course and
the learners can access as many assignments based on their
need. Also, learners are given more number of quizzes
including formative and summative assessments, in which the
learners can participate themselves at any time. Any number of
quizzes can be attended by the learners whenever they want to
practice the questions to test their knowledge. Also, interac-
tion among learners and educators are provided with the help
of forum discussion and chat room facilities in order to discuss
and share the ideas and views about the topic by posting and
replying to others.
All the learner activities performed in Moodle LMS while
learning are stored automatically in the web log files. The
log files automatically record the learner activities such as
the type of learning content preferred (text, powerpoint,
hyperlinks), the number of assignments done, the number of
quizzes attended with number of revisions and delivery time
and participation in discussion forums and chat facilities etc.
which are used to detect each learners learning style auto-
matically. These actions are extracted from the log files and
then processed in terms of the category used in Table 2
using decision tree learning algorithm in order to detect each
learner learning style.
Algorithm
Input: Weblog files of each learner
Output: Learning style of each learner in three dimensions of FSLSM
1. Access the weblog files of each learner.
2. Preprocess weblog files
Filter the activities and their corresponding actions of each learner from weblog files
based on the three dimensions of FSLSM model.
3. Create learning style model
a. Determine the activities of learners in Moodle LMS
b. Build Tree using decision tree classifier
i. Initially Tree T is empty
ii. T = Create root node and its splitting attribute
iii. T = Add branch to the root node for each split attribute and label it with test
value
For each branch do
Move to the split attribute
Test on possible value of split attribute
Create a new branch below root based on the test result
If stopping point is reached for this branch, create leaf a node with
appropriate label.
4. Predict learning style model
a. Input is the learner activities
b. Start at the root node
c. Move to the decision node
d. Test on each possible value of decision node and descend the appropriate branch
e. Test repeated until a leaf node is reached
f. Return the classification of leaf node which is the learning style
Fig. 3 Algorithm of extracting
learning style
50 T. Sheeba and R. Krishnan
4.1 Evaluation and Analysis
Classification Accuracy. Evaluation is done by determining
the performance of decision tree classifier for around 100
students using classification accuracy. The classification
accuracy determines the percentage of correct instances
placed in the correct category. Equation (1) gives the for-
mula used for calculating classification accuracy and error
rate for the three dimensions of FSLSM model:
Accuracy ¼Correct Predictions=Total Number of Predictions
Error Rate ¼Wron g Predictions=Total Number of Predictions
ð1Þ
The achieved experimental results shown in Table 3
ranges from 75 to 95% shows a high precision for the three
dimensions of FSLSM, thereby proving its suitability for
identifying the learning style of learners with an average
accuracy of 87% and a very less error rate of 13%.
By analyzing the evaluation results obtained, decision
tree classifier is able to classify perception dimension with a
high precision of 95% as most learners did most of the
exams and exercises provided for the course and hence
significant variance not found in this dimension. The input
dimension is classified with a precision of 90% as most of
the learners are interested in using the power point slides and
hyperlinks instead of using the theoretical notes for their
study and hence shown less variance in the predicted class.
The processing dimension is classified with precision of
75% as the learners found to use less use of forums and chats
facilities and hence variance found in this dimension. The
main reason for the variance is that most of the learners have
used the facilities such as chat, email and forum very less.
As a conclusion, learners should be encouraged to use the
facilities of forums, chat rooms, email etc. in order that the
active learners may be discovered and to use collaborative
tasks such as assignments and exercises. The number of
assignments and exams could also be increased for an
effective analysis of learning style.
Confusion Matrix. The evaluation of classification results
is done by a confusion matrix to illustrate the accuracy of
decision tree classifier solution. The confusion matrix con-
tains information about actual and predicted classifications
which is used to determine the performance of the decision
tree classifier. In confusion matrix, for a single prediction,
there are four different outcomes: true positives (TP), true
negatives (TN), false positives (FP), and false negatives
(FN) for a two-class case with classes “1”(“yes”) and “0”
(“no”). A false positive is when the outcome is incorrectly
classified as “yes”(or “positive”), when it is in fact “no”(or
“negative”). A false negative is when the outcome is
incorrectly classified as negative when it is in fact positive.
True positives and true negatives are obviously correct
classifications.
Input Dimension: Table 4shows the confusion matrix
obtained for the prediction of three different learning styles
(Neutral, Extremely_Visual and Extremely_Verbal) of input
dimension.
Processing Dimension: Table 5shows the confusion
matrix obtained for the prediction of five different learning
styles (Extremely Reflective, Medium Reflective, Neutral,
Medium Active, Extremely Active) of processing dimen-
sion. The values in the diagonal of Table 5would always be
the true positives (TP).
Perception Dimension: Table 6shows the confusion
matrix obtained for the prediction of five different learning
Table 3 Experimental results of decision tree classifier
Performance Processing (%) Perception (%) Input (%) Overall (%)
Classification accuracy 75 95 90 87
Error rate 25 5 10 13
Table 4 Confusion matrix of input dimension
Actual
Input dimension Neutral Extremely_Visual Extremely_Verbal
Predicted Predicted_Neutral 70 15 15 Total
predicted = 100
Predicted_Extremely
Visual
15 80 15 Total
predicted = 110
Predicted_Extremely
Verbal
15 5 60 Total predicted = 80
Total
retrieved = 100
Total
retrieved = 100
Total
retrieved = 100
Automatic Detection of Students Learning Style …51
styles (Extremely Intuitive, Medium Intuitive, Neutral,
Medium Sensitive, Extremely Sensitive) of perception
dimension. The values in the diagonal of Table 6would
always be the true positives (TP).
The confusion matrix is used to compute the precision
and recall for each class. Precision is the fraction of retrieved
instances that are relevant, while recall is the fraction of
relevant instances that are retrieved using formula in Eq. (2).
Precision ¼True Positive=Total Predicted
Recall ¼True Positive=Total Retrieved ð2Þ
The plot obtained for the precision and recall values of
each dimension are shown in Fig. 4.
5 Conclusion
The paper proposes a method for the automatic classification
and prediction of student learning style related to FSLSM
using decision tree classifier algorithm. From the experi-
ments conducted, it is concluded that significant rules used
in decision tree is able to classify the learner characteristics
into learning style with an accuracy of 75% in the processing
dimension, 95% in the perception dimension, and 90% in the
input dimension based on three Felder Silverman learning
dimensions with an overall accuracy of 87%. It is evident
that learners learning style obtained are consistent with the
learners preferences based on FSLSM. The final outcomes
Table 5 Confusion matrix of processing dimension
Actual
Input dimension Extremely_Reflective Medium_Reflective Neutral Medium_Active Extremely_Active
Predicted Predicted_Extremely
Reflective
69 10 6 11 5 Total
predicted = 101
Predicted_Medium
Reflective
975 5 9 10 Total
predicted = 108
Predicted_Neutral 11 9 80 3 10 Total
predicted = 113
Predicted_Medium
Active
44474 15 Total
predicted = 101
Predicted_Extremely
Active
725360 Total
predicted = 76
Total retrieved = 100 Total
retrieved = 100
Total
retrieved = 100
Total
retrieved = 100
Total
retrieved = 100
Table 6 Confusion matrix of perception dimension
Actual
Input Dimension Extremely_Intuitive Medium_Intuitive Neutral Medium_Sensitive Extremely_Sensitive
Predicted Predicted_Extremely
Intuitive
78 5 9 11 4 Total
predicted = 107
Predicted_Medium
Intuitive
690 6 9 8 Total
predicted = 119
Predicted_Neutral 9 2 76 4 6 Total
predicted = 97
Predicted_Medium
Sensitive
42472 7 Total
predicted = 89
Predicted_Extremely
Sensitive
315475 Total
predicted = 88
Total
retrieved = 100
Total
retrieved = 100
Total
retrieved = 100
Total
retrieved = 100
Total
retrieved = 100
52 T. Sheeba and R. Krishnan
would benefit educators to incorporate various learning
materials based on the student’s learning style. The classi-
fication results are also used to cluster the learners based on
their learning style which would help the educators to design
the pedagogical structure of the courses.
The future research is to integrate the classifier into the
Moodle LMS system in order to automatically detect the
learning style based on the students’behavior which would
help to design an effective adaptive system.
References
1. Feldman, J., Monteserin, A., Amandi, A.: Automatic detection of
learning styles: state of the art. Artif.Intell. Rev. 44(2), 157–186(2015)
2. Ahmad, N., Tasir, Z., Kasim, J., Sahat, H.: Automatic detection of
learning styles in learning management systems by using literature
based method. In: 13th International Educational Technology
Conference, Vol. 103, pp. 181–189, Procedia, Elsevier (2013)
3. Garcı´a, P., Amandi, A., Schiaffino, S., Campo, M.: Evaluating
Bayesian networks precision for detecting students learning styles.
Comput. Educ. 49(3), 794–808 (2007)
4. Abdullah, M.A.: Learning style classification based on student’s
behavior in Moodle learning management system. TAMLAI Trans.
Mach. Learn. Artif. Intell. 3(1) (2015)
5. Yannibelli, V., Godoy, D., Amandi, A.: A genetic algorithm
approach to recognize students’learning styles. Interact. Learn.
Environ. 14(1), 55–78 (2006)
6. Chang, Y.C., Kao, W.-Y., Chu, C.-P., Chiu, C.H.: A learning style
classification mechanism for e-learning. Comput Educ 53(2), 273–
285 (2009)
7. Kolekar, S.V., Sanjeevi, S.G., Bormane, D.S.: Learning style
recognition using artificial neural network for adaptive user interface
in e-learning. In: Computational Intelligence and Computing
Research, 2010 IEEE International Conference, pp. 1–5, IEEE (2011)
8. Al-Azawei, A., Badii, A.: State of the art of learning styles-based
adaptive educational hypermedia systems (LS-BAEHSS). Int.
J. Comput. Sci. Inf. Technol. (IJCSIT) 6(3), 1–19 (2014)
9. Villaverde, J.E., Godoy, D., Amandi, A.: Learning styles’recog-
nition in e-learning environments with feed-forward neural net-
works. J. Comput. Assist. Learn. 22(3), 197–206 (2006)
Fig. 4 Precision versus recall curve of FSLSM dimensions
Automatic Detection of Students Learning Style …53
Big Data Security and Privacy Concerns:
A Review
Akbar Khanan , Salwani Abdullah, Abdul Hakim H. M. Mohamed,
Amjad Mehmood, and Khairul Akram Zainol Ariffin
Abstract
The past few decades have recorded increases in the
development of new technologies. These technologies,
such as the smart phone, computers, and social network
sensors, have resulted in the production of a large amount
unstructured data from different formats ranging from
Tera Bytes (TB) to Peta Bytes (PB). This huge and
differently formatted data is known as big data. Big data
has a great potential for both the public and private sector.
The utilisation of big data can have a positive impact.
Different tools and techniques such as analytics and data
mining are being used to make the data useful. However,
big data is beset by security and privacy issues.
Researcher from different domain are trying to overcome
the issues in the big data, this paper will focus on the
applications and major security, and privacy issues of big
data.
Keywords
Big data Data analytics Privacy Security
1 Introduction
The past few decades have recorded increases in the
development of new technologies. These technologies, such
as the smart phone, computers, and social network sensors,
have resulted in the production of a large amount unstruc-
tured data from different formats ranging from Tera Bytes
(TB) to Peta Bytes (PB). This huge and differently formatted
data is known as big data. Big data has a great potential for
both the public and private sector. The utilisation of big data
can have a positive impact, for example, on health care.
A hospital will be able to store and analyse patient data to
prevent the outbreak of diseases. Business can also make use
of this data. A company can analyse its customer sales
record to determine customer choices and thereby make
informed decisions about the effective sourcing and distri-
bution of goods and services in a timely manner, and thus
increase profits and make customers happy.
Big data is already used by Google as a distributed
storage system called Bigtable that has been designed,
implemented, and deployed to manage structured data. This
system has the reliability to handle thousands of machines
and PB’s of data, and has achieved several goals including
wide applicability, scalability, high performance, and high
availability. The system is also used in Google products [1].
Government can use big data for transparency in public
affairs for citizen engagement, to prevent fraud and crime, to
improve national security, and to comfort the common citi-
zen. The government sector deals in general issues (like data
from multiple sources with different formats or costs), spe-
cial issues (e.g., data from different sources of the govern-
ment), and sharing of the data with sources of big data [2]
(Fig. 1).
Some significant and insightful studies have been done to
show the importance of big data, but there are still some
questions that need to be asked about what big data means,
how and which data to access [3], and what security and
privacy challenges big data faces. This article will contain
A. Khanan (&)S. Abdullah
Centre for Artificial Intelligence Technology,
Universiti Kebangsaan Malaysia (UKM), Bangi, Malaysia
e-mail: P89401@siswa.ukm.edu.my
S. Abdullah
e-mail: salwani@uk.edu.my
A. Khanan A. H. H. M. Mohamed
Department of Management Information System,
A’Sharqiyah University, Ibra, Sultanate of Oman
e-mail: abdulhakim.mohamed@asu.edu.om
A. Mehmood
Institute of Information Technology, Kohat University
of Science & Technology, Kohat, Pakistan
e-mail: dramjad.mehmood@ieee.org
K. A. Z. Ariffin
Research Centre for Software and Management,
Universiti Kebangsaan Malaysia (UKM), Bangi, Malaysia
e-mail: k.akram@ukm.edu.my
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_8
55
five sections. Section 2will be about the definition, sec-
tion 03 Applications of Big data and characteristics of big
data, and Sect. 3will be about security and privacy concerns
for big data, along with possible solutions.
1.1 Big Data Definition
Although there is no proper definition for the term, it is safe to
say that ‘Big data’can be used for large data sets (unstructured,
different formats) that cannot be managed by traditional
database management systems. The processes for storing,
retrieving and managing the different types of data within a
suitable time frame can be difficult for traditional common
software. Daily data’s size constantly increases by a few dozen
TBs to PBs in a single data set [4]. In today’s world, people are
generating data through technology faster than before [5]. This
huge amount of data, which is mostly generated by social
media, cellular phones, and other digital communication
devices can be the true form of big data [6]. Due to its usage
and application in decision making, big data has become more
attractive and accessible to the public sector, the private sector,
and the field of academia [6].
Big data and analytics can have a positive impact on
business and industry. Companies can invest in big data,
analytics, and other technology to track customer needs and
preferences, and to provide an easy access to goods and
services by various accommodating small markets. Big data
can also help find problems on a societal level by using new
technology For example, big data can be used to identify
new trends in health care, prevent diseases, and much more.
If the data is managed well, it can also help find new sources
of economic growth [7].
1.2 Characteristics of Big Data
Big data has been characterised by the 3Vs: Volume,
Velocity, and Variety, Simply put, volume refers to its huge
size, velocity to the speed of its creation, and variety to its
differentiated formats and sources. A later study suggests
that 3Vs are insufficient to describe big data, so more
components have been added to include Volume, Velocity,
Variety, Veracity, and Complexity [8] (Table 1).
1.3 Big Data Timeline
The concept of a ‘Database Machine’emerged in the 1970s.
The aim was to store and analyse data with the help of
technology, but due to huge increases in the demand for data
processing, the single machine was insufficient. Therefore, in
order to meet the requirement of ‘share nothing’, a parallel
system was proposed in 1980. The architecture of ‘share
nothing’was based on the cluster that every machine has its
own processor, storage, and disk [14]. The availability of
the World Wide Web in 1991 opened the door to the
public, which later on in 1998 lead to the concept of IOT
[15].
It is predicted that the current volume of data will grow
from 130 Exabyte to 40,000 Exabyte between 2005 and
2020, which means that the growth of the data will be double
Big Data
Application
Government
Health
Banks
Telecom
Autom
Energy
Utility
Fig. 1 Big data applications
56 A. Khanan et al.
after every two years. This is why this huge amount of data
—big data—is attracting researchers to find solutions for
various government and industrial problems [16].
2 Big Data Applications
The role of big data can be helpful for many public and
private sectors; some of the examples are listed below.
2.1 Big Data in Healthcare
According to history, most of the data [17], that has been
recorded is by the healthcare sector for record keeping, com-
pliance, and retention of patient care records; most of the data
recorded is in hard form [18]. Use of a proper system to collect
and analyse the data can help the healthcare industry to improve
the quality of life. The future of big data analytics predicts an
increase in epidemics, cures, and diseases [19]. Big data can
also assist the government sector by indicating areas where the
government can take action and save thousands of lives. Big
data in healthcare can be divided into different sub-categories
like bioinformatics, neuro-informatics,clinical informatics, and
public health informatics. Bioinformatics mainly focus on
molecular data; analytic tools can be used to know how the
body works by using molecular data. The main focus of
neuro-informatics is to know how the brain works and how the
data gather frombrain images and medical conditions can even
be associated. Research on clinical information helps GP’sto
get better and more accurate decisions about their patients by
analysing their data. Public health informatics deal with public
data to analyse and get accurate medical information [20].
2.2 Big Data for Government
Big data can play a vital role in the government sector,
because this sector is always trying to improve quality of
life. The government only needs to have an advanced system
in order to collect and analyse data that can help them
identify areas they need to focus on. However, the govern-
ment needs to have a look at the data, and information
policies like privacy, data reuse, data accuracy, data access,
archiving, and preservation as play with data can have pri-
vacy and security issues [21].
2.3 Intelligent Transportation
The development in communication [22] and robotic tech-
nology had a good impact on the life of common people.
Advancements in these technologies have given rise to an
opportunity for the autonomous vehicle to be created. The
aim to introduce autonomous vehicles is to reduce costs and
increase transportation accessibility [23]. The sensor is
another important technology. Advancements in sensor
technology open the door for innovation. Transportation
includes sensor technology with the Global Position Satellite
(GPS) system and on-board cameras. GPS systems help
vehicles locate the required route, and sensor technology
enabled with traffic control systems help control the vehicle
[24]. One example of intelligent transportation and the
autonomous vehicle is the Google car; this car is enabled
with a camera, 3-D radar/range finder, and an artificial
intelligence system that is use for calculation. A combination
of all these technologies and others has enabled the launch of
the self-driven car [25].
Table 1 Volume, velocity,
variety, veracity, and complexity Factor Identification References
Volume Volume is a huge amount of data that is created from different sources
(transactions, unstructured streaming from text, images, audio, VoIP,
video, TV, and other media, sensor, and machine-to-data)
[9]
Velocity Velocity refers to the rate of change of data or how often the data is created [10]
Variety Data variety is the measure of the variety of data (text, images, video, and
audio); one of the best challenges to the effective use of big data is data
variety for analytics, because of incompatible formats, lack of structure,
and inconsistencies
[11]
Complexity Complexity denotes the data that comes from multiple sources that needs
to be linked, matched, cleaned, and transformed
[12]
Veracity Veracity is the reliability of data linked with different types of data just like
correctness, truthfulness, and accuracy
[13]
Big Data Security and Privacy Concerns: A Review 57
3 Big Data Security and Privacy
Security and privacy are the big hurdles for users who have
to outsource their data. For sensitive and personal data,
specific laws need to be established. For example, data
protection and privacy concerns have been regulated in
different countries [26]. Databases related to the government
or people need a high level of security polices and mecha-
nisms to secure them against illegal and malicious use. That
big data technology such as Hadoop and Cassandra are
suffering from insufficient security is of serious concern [27]
Moreover, technologies and mechanisms like firewalls and
DMZ’s for security and privacy cannot be applied or used
for big data because of its vast border. Big data security
objectives are the same as other data types (e.g., confiden-
tiality, integrity, and availability [28].
Cloud Secure Alliance (CSA) has classified four main
challenges for big data security: infrastructure security, data
privacy, data management, and integrity and reactive secu-
rity [29] (Fig. 2).
To provide security to the infrastructure, distribution
computations and data stores must be secured. To secure
data information distribution, privacy must be protected, and
the sensitive data must be secured with cryptography and
granular access control. Managing large volumes of data
requires scalable and distributed solutions to secure data
storage and to provide efficient audits and data sources. Data
integrity must be checked for data coming from diverse
sources and analytics for security can be performed to ensure
the health of the infrastructure [30].
3.1 Infrastructure Security
Modern science infrastructure is solving new large-scale
problems; these solutions were not possible before, as they
produce huge amounts of data capable of storing, distribut-
ing, and processing these data. This is referred to as scientific
data e-infrastructure. The scientific data is more complex and
interrelated with other objects. As things become new and
technology-driven, big data science requires solutions to a
number of components and challenges [31]. One of the basic
challenges is processing of huge data. The collection of data
is easier than the processing of it because the complete
behaviour of data (structure, value, format, etc.) needs to be
analysed and understood. For example, social media allows
any format of data by the user, but the volume can be
increased to a level that can be difficult to manage, because
the amount of data that a single processor can process is still
limited. In order to process this huge data, special algorithms
need to be designed [32].
3.2 Data Privacy
One of the sensitive problems that big data is facing is data
privacy. Manipulation of data can cause a privacy issue, like
information collected from the user and used for the business
purposes of an organisation about which the user is unaware,
or that user information is collected and combined with other
data to get certain results [33]. A lot of personal and private
information that can include health, medical, financial, bank,
and much more can be accessed, which may be a violation of
a personal legal right for privacy. Therefore, the field should
make sure that all the privacy policies are properly placed
[34]. Social media and health informatics are the biggest
sources of data collection. One of the threats to personal
security is the unregulated collection of data by different
organisations, especially by social media companies.
Developing an algorithm that can randomise the data among
other data sets is a major research problem [35].
3.3 Data Management
Management of data is another one of the difficult issues that
need to be addressed by big data. Although data is already
managed by traditional ways in the business world, it will
still be difficult if the data is distributed to different places
that are owned and managed by different entities, and
coming in at a large volume; hence, a big management
solution is required [36]. Dealing with big data is a difficult
task because of the huge amount of data with different for-
mats (picture, audio, video, etc.); yet, this can be handled.
The problem becomes worse if the data is stored in different
Big Data
Security
and Privacy
Data
Management
Integrity and
Reactive
Security
Data Privacy
Infrastructure
Security
Fig. 2 Big data privacy and security domain
58 A. Khanan et al.
geographical locations. In this case, it becomes impossible to
manage the data. Management of data plays a key role in
large organisations. Various technologies like Hadoop,
MapReduce, and Hive have been introduced to the market to
manage data. Hadoop data is broken down into several parts
that can be spread into a number of systems. In this process,
data is repeated many times on different nodes to provide a
security for any failure node [37].
3.4 Integrity and Reactive Security
It is difficult to check the trustworthiness of big data’s dif-
ferentiated sources, but the data from varied sources can be
used by certain algorithms to produce accurate results.
Authenticity and integrity of data must be considered [38].
Data integrity is a key element for collaborative analysis
where analysts and decision makers use information within
organisations. Mostly, data mining approaches are being
applied to improve the efficiency of decision making.
Integrity can also be affected by the quality and reliability of
data. Basically, integrity is the prevention of illegal and
unauthorised access to the data [39]. In the field of infor-
mation security, data integrity’s main concern is maintaining
and assuring the accuracy and consistency of the data by
preventing unauthorised access. For maintaining integrity,
all the characteristics of data must be correct, including
business rules, relations, definitions, and so on [40].
Quality and Reliability of data. Quality of data has a
high importance for big data utilisation. Low quality of data
is just a waste of resources and transmission. A lot of factors
can be included to restrict the quality of data including
generation, acquisition, and transmission. Quality of data is
mainly important for accuracy, completeness, redundancy,
and consistency. The problems related to quality need to be
addressed; therefore, effective methods to detect the quality
of data automatically and repair the data need to be exam-
ined [41]. Reliability of data—whether or not we can trust
data—accuracy, consistency, and completeness are all
essential [42].
4 Research Trend in Big Data
The author in the article [43], briefly overview the issues
related to big data and email security. The analyses of the
data showed in the article, describe the threat related to big
data. According to author, different type of threat like mal-
ware can trap the data easily. The author proposes to have a
framework with having guidelines for the prevention big
data security.
The article [44], reviewed the primarily security issues
related to energy big data analytics and for internet of thing
based smart grid. According to author the smart grade can
benefit from the IoT Technology, meanwhile the smart
devices are integrated with so huge number, that now they
are causing the main security for the internet based smart
grid. The data need to be kept save form intrusion and pri-
vacy, if we want to be benefited from the smart grid and big
data.
According to author [45], modernization in the technol-
ogy also arise the volume of big dat. A much more focus
need to be given to secure sensitive health care data from
adversaries and malicious software. That will help to
maintain integrity and privacy of sensitive information. The
security issues therefore must be dealt and new security need
to build in health care context. The availability and protec-
tion of data without having the privacy concern will deter-
mine the potential to adopt the health care data into the cloud
environment.
The author in the article [46], proposed solution in order
to overcome the issue associated with storage of big data
through could compute. As the adoption of cloud computing
services for storing big data is increasing with a rapid speed.
According to author there are still many open security risks
that need to be addressed in the cloud. The confidential data
store at cloud could have a security risk on data file in one
place.
5 Open Security and Privacy Challenges
Big data is facing numerous challenges; some of the research
challenges identified by researchers of big data security and
privacy are as follows:
•Scalable and compostable privacy preserving data min-
ing and analytics [47].
•Risks in outsourcing and use of third-party tools [48].
•Organisational learning culture and competencies [49].
•Lack of infrastructure to insure the security of data (in-
tegrity, accountability, availability,) and become more
vulnerable if data is from different sources [50].
6 Conclusion
Indeed, big data can be a gold mine for both the public and
private sector, as it can be used for variety of purposes.
Business can boost and government can improve health
facilities by using this huge data. Yet, at the same time, big
data also faces a lot of challenges including data manage-
ment, infrastructure, and analytical issues, as well as security
and privacy issues and data visualisation. Therefore, big data
is the main focus of research for many researchers. This
Big Data Security and Privacy Concerns: A Review 59
paper discussed big data literature, security, and privacy
concerns, and listed current big data privacy and security
issues.
Acknowledgements This work was supported by the Universiti
Kebangsaan Malaysia (DIP-2016-024).
References
1. Chang, F., Dean, J., Ghemawat, S., Hsieh, W.C., Wallach, D.A.,
Burrows, M., Chandra, T., Fikes, A., Gruber, R.E.: Bigtable: a
distributed storage system for structured data. Google Inc. In:
Proceeding of the OSDI, 6 (2006)
2. Mehmood, A., Khanan, A., Umar, M.M., Abdullah, S., Ariffin, K.
A.Z., Song, H.: Secure knowledge and cluster-based intrusion
detection mechanism for smart wireless sensor networks. IEEE
Access 6, 5688–5694 (2018). https://doi.org/10.1109/ACCESS.
2017.2770020
3. Boyd, D., Crawford, K.: Critical questions for big data. Inf.
Commun. Soc. 15, 662–679 (2012)
4. Elragal, N., Elragal, A.: Big data analytics: a literature review
paper. In: Lecture Notes in Computer Science (2014)
5. Duan, L., Xiong, Y.: Big data analytics and business analytics.
J. Manag. Anal. 2(2015)
6. Kshetri, N.: The emerging role of big data in key development
issues: opportunities, challenges, and concerns. Big Data Soc. 1
(2014)
7. Abawajy, J.: Comprehensive analysis of big data variety land-
scape. Int. J. Parallel Emergent Distrib. Syst. 30,5–14 (2015)
8. Kuo, M.-H., Sahama, T., Kushniruk, A.W., Borycki, E.M.,
Grunwell, D.K.: Health big data analytics: current perspectives,
challenges, and potential solutions. Int. J. Big Data Intell. 1, 114–
126 (2014)
9. Cardenas, A.A., Manadhata, P.K., Rajan, S.P.: Big data analytics
for security. IEEE Secur. Priv. 11(6), 74–76 (2013)
10. Li, Y., Gai, K., Qiu, L., Qiu, M., Zhao, H.: Intelligent cryptog-
raphy approach for secure distributed big data storage in cloud
computing. Inf. Sci. 387, 103–115 (2017)
11. Xu, L., Jiang, C., Wang, J., Yuan, J., Ren, Y.: Information security
in big data: privacy and data mining. IEEE Access 2, 1149–1176
(2014)
12. Kaisler, S., Armour, F., Espinosa, J.A., Money, W.: Big data:
issues and challenges moving forward. In: System Sciences
(HICSS), 46th Hawaii International Conference, IEEE, pp. 995–
1004 (2013)
13. Wolfert, S., Ge, L., Verdouw, C., Bogaardt, M.J.: Big data in smart
farming–a review. Agric. Syst. 153,69–80 (2017)
14. Lukoianova, T., Rubin, V.L.: Veracity roadmap: is big data
objective, truthful, and credible? 12 (2014)
15. Chen, M., Mao, S., Liu, Y.: Big data: a survey. Mob. Netw. Appl.
19, 171–209 (2014)
16. Herland, M., Khoshgoftaar, T.M., Wald, R.: A review of data
mining using big data in health informatics. J. Big Data 1,2
(2014). https://doi.org/10.1186/2196-1115-1-2
17. Plachkinova, M., Vo, A., Bhaskar, R., Hilton, B.: A conceptual
framework for quality healthcare accessibility: a scalable approach
for big data technologies. Inf. Syst. Front. 1–14 (2016)
18. Mehmood, A., Khanan, A., Mohamed, A.H.H.M., Mahfooz, S.,
Song, H., Abdullah, S.: ANTSC: an intelligent Naïve Bayesian
probabilistic estimation practice for trafficflow to form stable
clustering in VANET. IEEE Access 6, 4452–4461 (2018). https://
doi.org/10.1109/ACCESS.2017.2732727
19. Fay Chang, J., Ghemawat, S., Wilson, C., Hsieh, D.A., Wallach,
M., Burrows, T., Fikes, A., Grube, R.E.: Bigtable: A Distributed
Storage System for Structured Data. Google Inc (2006)
20. Hashem, I.A.T., Yaqoob, I., Anuar, N.B., Mokhtar, S., Gani, A.,
Khan, S.U.: The rise of ‘big data’on cloud computing: review and
open research issues. Inf. Syst. 47,98–115 (2015)
21. Herland, M., Khoshgoftaar, T.M., Wald, R.: A review of data
mining using big data in health informatics. J. Big Data 1,2
(2014). https://doi.org/10.1186/2196-1115-1-2
22. Kim, G.-H., Trimi, S., Chung, J.-H.: Big-data applications in the
government sector. Commun. ACM 57,78–85 (2014)
23. Manogaran, G., Thota, C., Lopez, D., Sundarasekar, R.: Big data
security intelligence for healthcare industry 4.0. In: Cybersecurity
for Industry 4.0, pp. 103–126. Springer, Cham (2017)
24. Bagloee, S.A., Tavana, M., Asadi, M., Oliver, T.: Autonomous
vehicles: challenges, opportunities, and future implications for
transportation policies. J. Mod. Transp. 24, 284–303 (2016)
25. Gupta, A.: Review on big data promises for information security.
J. Data Min. Manag. 1(2016)
26. Poczter, S.L., Jankovic, L.M.: The Google car: driving toward a
better future? J. Bus. Case Stud. (Online) 10, 7 (2014)
27. Thota, C., Manogaran, G., Lopez, D., Vijayakumar, V.: Big data
security framework for distributed cloud data centers. In: Cyber
Security and Threats: Concepts, Methodologies, Tools, and
Applications, pp. 589–607, IGI Global (2018)
28. Moura, J., Serrao, C.: Security and privacy issues of big data.
arXiv preprint arXiv:1601.06206 (2016)
29. Eiman Al Nuaimi, H.A.N., Mohamed, N., Al-Jaroodi, J.: Appli-
cations of big data to smart cities. J. Internet Serv. Appl. (2005)
30. Chaulagain, R.S., Pandey, S., Basnet, S.R., Shakya, S.: Cloud
based web scraping for big data applications. In: 2017 IEEE
International Conference on Smart Cloud (SmartCloud), New
York, NY, pp. 138–143 (2017) https://doi.org/10.1109/smartcloud.
2017.28
31. Demchenko, Y., Zhao, Z., Grosso, P., Wibisono, A., Laat, C.D.:
Addressing big data challenges for scientific data infrastructure. In:
Cloud Computing Technology and Science (CloudCom), IEEE 4th
International Conference on 3–6 Dec 2012, pp. 614–617 (2012)
32. Sneha Gupta, M.S.C.: Big data issues and challenges. Recent
Innov. Trends Comput. Commun. 3(2015)
33. Katal, A., Wazid, M., Goudar, R.H.: Big data: issues, challenges,
tools, and good practices. In: Contemporary Computing (IC3),
2013 Sixth International Conference, 8–10 Aug 2013, pp. 404–409
(2013)
34. Liu, Y.: Research on the application of big data in academic
libraries. In: 2018 International Conference on Intelligent Trans-
portation, Big Data & Smart City (ICITBS), Xiamen, pp. 364–367
(2018) https://doi.org/10.1109/icitbs.2018.00099
35. Stahl, B.C., Wright, D.: Ethics and privacy in AI and big data:
implementing responsible research and innovation. IEEE Secur.
Priv. 16(3), 26–33 (May/June 2018). https://doi.org/10.1109/msp.
2018.2701164
36. Gupta, A.: Analysis of real-time big data: its applications and
challenges. J. Data Min. Manag. 1(2016)
37. Kaur, P., Monga, A.A.: Big data management. Adv. Found. Res.
Sci. Eng., 1(2015)
38. Alvaro, A., Cardenas, P.K.M., Sreeranga, P., Rajan: Big data
analytics for security. IEEE Comput. Reliab. Soc. (2013)
39. Khan, N., Yaqoob, I., Hashem, I.A.T., Inayat, Z., Mahmoud A.W.
K., Alam, M., Shiraz, M., Gani, A.: Big data: survey, technologies,
opportunities, and challenges. Sci. World J. (2014)
40. Stahl, B.C., Wright, D.: Ethics and privacy in AI and big data:
implementing responsible research and innovation. IEEE Secur.
Priv. 16(3), 26–33 (May/June 2018). https://doi.org/10.1109/msp.
2018.2701164
60 A. Khanan et al.
41. Jasim, A.C., Tapus, N., Hassoon, I.A.: Access control by
signature-keys to provide privacy for cloud and big data. In: 5th
International Conference on Control, Decision and Information
Technologies (CoDIT), Thessaloniki, Greece, pp. 978–983 (2018)
https://doi.org/10.1109/codit.2018.8394916
42. Cai, L., Zhu, Y.: The challenges of data quality and data quality
assessment in the big data era. Data Sci. J. 14, 2 (2015)
43. Zaki, T., Uddin, M.S., Hasan, M.M., Islam, M.N.: Security threats
for big data: a study on Enron e-mail dataset. In: International
Conference on Research and Innovation in Information Systems
(ICRIIS), pp. 1–6. (2017)
44. Chin, W.L., Li, W., Chen, H.H.: Energy big data security threats in
IoT-based smart grid communications. In: IEEE Communications
Magazine, vol. 55, pp. 70–75, Available: ISSN: 0163-6804 (Oct
2017)
45. Chandra, S., Ray, S., Goswami, R.T.: Big data security in healthcare:
survey on frameworks and algorithms. In: IEEE 7th International
Advance Computing Conference (IACC), pp. 89–94 (2017)
46. Chin, W.L., Li, W., Chen, H.H.: Energy big data security threats in
IoT-based smart grid communications. In: IEEE Communications
Magazine, vol. 55, pp. 70–75, Available: ISSN: 0163-6804 (Oct
2017)
47. Surbiryala, J.: Ph.D. Forum: improving the security for storing the
big data in cloud environment. In: IEEE International Conference
on Smart Computing (SMARTCOMP), pp. 1–2 (2017)
48. Salleh, K.A., Janczewski, L.: Technological, organizational, and
environmental security and privacy issues of big data: a literature
review. Procedia Comput. Sci. 100,19–28 (2016)
49. Zaki, T., Uddin, M.S., Hasan, M.M., Islam, M.N.: Security threats
for big data: a study on Enron e-mail dataset. In: International
Conference on Research and Innovation in Information Systems
(ICRIIS), pp. 1–6 (2017)
50. Sivarajah, U., Kamal, M.M., Irani, Z., Weerakkody, V.: Critical
analysis of big data challenges and analytical methods. J. Bus. Res.
(2016)
Big Data Security and Privacy Concerns: A Review 61
China’s Relations with Arab Gulf States
Golam Mostafa
Abstract
Arab Gulf states are important for China and play
significant roles because of their geo-strategic location,
huge reserve of oil and gas, fast and steady growth of
economy with rapid expansion of market for consumer
and merchandise goods which China has a plenty of
them. The area was, however, out of the radar of Chinese
attention until recently as Beijing was preoccupied with
other parts of the world. The paper focuses on China’s
multilevel interests in economic, trade and investments in
strategic sectors as well as steady and guaranteed supply
of oil and gas from the region. The findings of the paper
are: Economic ties between China and GCC countries
have increased significantly since the mid-1990s and are
expected to grow rapidly in future; Oil and gas dominate
China’s import items from the Gulf and Saudi Arabia has
become the largest supplier and will remain so in near
future; As China intends to increase its influence and play
an increasingly important strategic roles in the region
Beijing is focusing on getting involved in new and
strategic sectors like, nuclear energy, aerospace, commu-
nication, infrastructure building and so on; China’s
ultimate politico-military and security goals and objec-
tives in the region are to be gradually involved in the
multi-billion dollar military, security and strategic sectors
of arms market not by challenging or going into direct
conflict with the West, particularly to the US who are
currently dominating the market, rather by using the trust
and supports of the leaderships in the region.
Keywords
GCC Middle East OBOR Arab Gulf states
Free trade agreement
1 Introduction
China has become one of the fastest growing economies in
the world during the last four decades or so, a rising
superpower with rapid economic growth and expansion of
trade and investments all over the world and the Gulf region
is not an exception. China’s relations with GCC countries
are not based on a long historical traditions and experiences
rather evolved to the current stage through many twists and
turns over the last few decades. China wants to establish and
improve relations with GCC countries both at institutional
frameworks as well as on individual basis, and, so far, the
later one has proved to be more effective and successful.
Chinese Foreign Minister Huang Hua sent a congratulatory
telegram to the Secretary General when the GCC was cre-
ated in 1981, and expressed interests in cooperating and
developing relations with the newly created organization but
there was no positive response and interests were shown in
developing links with the communist China [1].
Individual Gulf Arab states showed interests and took
initiatives in recognizing and establishing with China. In
1971, Kuwait became the first Gulf country to establish
diplomatic relations with China and supported its entry into
the UN which was highly appreciated but no further devel-
opment took place until the mid-1990s. As China was
modernizing its foreign policy and opening to the outside
world through the policies of ‘open door’and “go broad”in
the late 1970s, it was eager and interested in establishing
contacts with more Arab countries. Beijing established
diplomatic relations with the Sultanate of Oman in 1978, and
other GCC countries followed the suite. But despite formal
diplomatic relations, real communications and expansion of
trade, business, connections and linkages were not devel-
oped mainly because of the reminiscence of Cold War pol-
itics, division of the world among great powers for sphere of
influence, control and domination, and China’s own internal
power struggle. GCC countries were not considered as
strategically important in the Chinese eyes as it was
G. Mostafa (&)
American University in the Emirates, Dubai,
United Arab Emirates
e-mail: golam.mustafa@aue.ae
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_9
63
overwhelmingly preoccupied in building relations with US,
ASEAN, South Asia and exploring Africa. But China’s Gulf
policy got a renewed importance in 1993 when the country’s
demand exceeded its domestic supply of oil and started
looking for imports from stable and reliable sources, and
Gulf countries considered to be the obvious choice.
The study of Sino-GCC relations is important for many
reasons. From the Chinese perspective relations with the
GCC is important and crucial because; (a) China views the
GCC countries as the most reliable partner (more than 50%
of its oil consumption is supplied by Saudi Arabia) and
stable supplier of its energy needs for both oil and gas as
they have a huge reserve of it; (b) Saudi Arabia has the
largest economy in the Arab world with significant influence
in the Arab and Islamic world as well as it is a member of the
G20 and China considers the Kingdom politically and
strategically important to maintain close and friendly rela-
tions and gradually forming an alliance/partnership with it;
(c) Saudi Arabia as a founding and most influential member
of the OPEC carries a lot of weight in deciding oil pro-
duction and price setting in global market, which is impor-
tant for China as a growing oil importing and consuming
nation; (d) GCC countries, along with the Arab League
members, recognize “One China”policy and practice it in
their foreign policy and diplomacy which is very important
for China; (e) China’s Gulf policy also fits into its grand
project of “One Belt One Road, (OBOR)”project of linking
Asian trade and business with Europe [2]; (f) GCC countries
strongly support and actively participate in financial insti-
tutions initiated and created by China for funding and sup-
porting OBOR and other projects for investment,
infrastructure building and development. For example, all
GCC countries (except Bahrain, a prospective member) are
members of Asia Infrastructure Investment Bank (AIIB)
created in 2016 and are heavily investing in it.
For GCC countries, China is important because; (a) It is
an emerging peaceful superpower with a very high and
steady economic growth and industrial development and a
continuous demand for imports of oil and gas; (b) Arab Gulf
states trust China, respect its policy of neutrality,
non-intervention and non-interference into domestic affairs
of others; (c) They also consider China as a distant Asian
neighbor with emerging global power and influence and
consider it as a reliable and trustworthy partner and feel
comfortable in doing business with and dealing with it;
(d) China does not carry any past political, military or ide-
ological baggage in the Gulf and that make easier for it in
dealing with the countries in the region; (e) Recently, par-
ticularly after September 11, GCC countries are under
scrutiny/pressure and targets of criticism from US Admin-
istrations about their political systems, human rights, way of
life, roles, positions and actions on global war on terrorism
as well as on regional wars and conflicts which offended and
irritated many leaders in the region but China never criti-
cized or raised those issues or put any pressure on them
which are highly welcomed by the leaders in the region.
Charles Freeman, former US Ambassador to Saudi Ara-
bia, characterized China’s relations with the Arab countries
as, “The Arabs see a partner who will buy their oil without
demanding that they accept a foreign ideology, abandon
their way of life or make other choices they would rather
avoid. The Arabs see China as a country that is far away and
has no imperial agenda in their region”[3].
The paper is organized into several sections; In the
Introductory Section, the role and importance of the topic,
and a brief historical review of the establishment, evolution
and overtime growth of Sino-GCC relations are discussed
and analyzed; Sect. 2discusses the general trends and
overall growth of China’s economic, trade and investment
relations with the GCC countries; Sect. 3provides a critical
analysis of China’s relations with the Kingdom of Saudi
Arabia (KSA); Sect. 4concentrates on China’s relations
with the United Arab Emirates (UAE); Sect. 5briefly ana-
lyzes Sino-Kuwaiti relations; Sect. 6is about Sino-Qatari
relations; Sect. 7elaborates China’s relations with Oman
and Bahrain; Sect. 8is the final Concluding one that suc-
cinctly summarizes the findings of the research and raises
some challenges and opportunities.
2 Trade, Economic, Investment
and Institutional Relations
China’s primary interests in the Gulf are to promote trade,
increase exports of its consumer and manufacturer goods
into the markets of the Arab Gulf states which is important
and necessary for its economic growth and industrial
development. Beijing is now the number one exporter to all
GCC countries as well as many Arab states in broader
Middle East. China’s relations with the GCC states repre-
sents one of the fastest growing trade relationships in the
world—and the trajectory is still moving upward. China’s
trade with GCC countries was worth of more than $92 bil-
lion in 2010 that increased to $158 billion in 2014; exports
increased more than $56 billion in 2010 to $98.07 billion in
2014 [4].
Along with burgeoning trade relations China has been
steadily investing in important strategic sectors in GCC
countries, like transportation, communication, railway,
agriculture and so on. Hundreds of treaties, MoUs and
agreements are signed between China and individual GCC
member states during high level bilateral visits and meetings.
For example, in 2008 China’s Sinopec signed a $350 million
oil drilling deal with Kuwait Petroleum Corporation (KPC);
China Railway Construction Corporation concluded a $5.5
billion agreement to build a rail network in Saudi Arabia;
64 G. Mostafa
Chinese National Petroleum Company (CNPC) started a $3
billion oil project in Iraq; and the CNPC won a bid to build a
$3.29 billion oil pipeline in the United Arab Emirates. In
between 2001 and 2009, Chinese companies signed about
3000 contracts worth approximately $2.7 billion in the Gulf
oil services sector alone [5].
China’s interests in the Gulf go beyond the simple eco-
nomic, trade and investment relations with individual
countries but has also carefully orchestrated and focused on
institution building for cooperation in political, cultural and
strategic sectors. Thus, China established the China-Arab
States Cooperation Forum in 2004, representing 22 members
of the Arab League that meets in every two years. In the
sixth ministerial meeting in 2014, which was held in Beijing,
the Prime Ministers of Kuwait and ministers from 20 other
Arab states attended the Forum where three important doc-
uments—“Beijing Declaration”,“Action Plan for 2014–16”
and the “Development Plan for 2014–24”—were signed.
A comprehensive strategy known as “1+2+3”proposed
by China meaning; cooperation in energy, improving trade
and investment, and cooperation in new sectors of nuclear
energy, aerospace technology, construction and job creation
[6]. Within the China-Arab Cooperation framework, China
was supposed to build Confucius institutes in the Arab world
for teaching and learning Chinese language, art, culture,
literature and translating important Chinese books on the
region into Arabic language but the progress is slow. In early
2013, there were only 7 Confucius Institutes in the Arab
World, and only 2 are in GCC countries; one in UAE and the
other in Bahrain [6]. China is also providing fellowships and
scholarships to students from GCC countries to study in
Chinese educational institutions, holding exhibitions and
regular exchange programs, cultural activities and so on for
promoting people-to-people diplomacy. But most of them
are done and organized on bilateral basis rather than on
institutional framework by involving all or most of the GCC
countries.
Another important area for institutional cooperation is the
signing of a Free Trade Agreement (FTA) between GCC and
China. In 2004 during a ministerial meeting, the decision
was made to sign a comprehensive FTA between China and
the GCC countries to boost and expediate trade, investment
and other economic ties. So far, 9 Round of Negotiations
took place where the parties worked hard to finalize the
agreement by 2017. During his historical visit to Saudi
Arabia in January 2016 Chinese President Xi Jinping met the
Secretary General of the GCC reviewed of progress of the
FTA and agreed to accelerate the pace of negotiations and
committed to work closely to conclude a comprehensive
FTA at the 10th Round of meeting scheduled to be held at
the end of March 2017. But it could not happen because of
the conflict between Qatar and several other GCC countries
and the issue is uncertain and not clear when the final FTA
can be signed [7].
Cooperation in banking and financial sectors is also
another important aspect in China-GCC relations. GCC
funds in various member states are interested in and actively
invested in major Chinese bank IPOs, including China
Agriculture Bank and the Industrial and Commercial Bank
of China [8]. Chinese construction companies are also
actively engaged in trillion dollar-plus GCC construction
market.
To achieve its goals and objectives, China wants to
maintain; close friendly relations with all GCC countries;
promote multilevel cooperation and friendly relations with
the countries in the region; ensure stable and peaceful
growth and success of modernization process; rise as an
emerging superpower with enhanced power, international
status and influence. But so far, it has been proved that
China has become more successful in bilateral relations in
dealing with individual GGC member states than those
dealing within institutional frameworks. The following sec-
tions analyze China’s relations with individual GCC
countries.
3 China-Saudi Relations
Saudi Arabia, with its huge reserve of oil and gas, is not only
the most important country and largest economy in the Gulf
region but in the broader Middle East. China’s trade rela-
tions with the Kingdom can be traced back to the era of the
ancient Silk Road and later some limited political and eco-
nomic ties were established during the 1930s and 1940s, but
all relations were cut after the communist revolution in
China in 1949. Some unofficial links were reestablished after
1979 even in the absence of diplomatic relations mainly in
three sectors; allowing Chinese Muslims to perform Hajj;
limited Chinese good could enter into Saudi market; and
limited military cooperation when China started providing
Saudi Arabia with long-range missiles [9].
Establishment of formal diplomatic relations in 1990
opened wide opportunities for developing trade and eco-
nomic relations but no visible progress appeared to have
made. Relations developed by leaps and bounds in the new
millennium and soon China became the top trading partner
for Saudi Arabia. Chinese leaders also highly valued their
relations with Saudi Arabia always expressed interests and
readiness to cement then further. By 2013 China became
Saudi Arabia’s number one trading partner in exports and
remains so. Bilateral trade between the two countries
reached to $69.1 billion in 2014.
Bilateral relations between the two countries were highly
valued and appreciated by top leadership of both the
China’s Relations with Arab Gulf States 65
countries. During the high-profile visit of Chinese President
Xi Jinping to Saudi Arabia in January 2016 he characterized
China-Saudi relations as “As Good Partners for Common
Development”[9].
China has four major objectives in its economic relations
with Saudi Arabia; to build a long-term, stable and reliable
partnership in energy sector; to expand trade and investment
in infrastructure building and communication; to engage and
involve in new and strategic sectors of economy with pri-
orities in aerospace, peaceful use of nuclear energy and
renewable energy; to promote and enhance travel and tour-
ism between the two countries mainly the Saudi visitors to
China [5].
China imports about 40% of its domestic consumption of
oil and a major portion it comes from the Arab Gulf states.
China’s energy consumption is increasing fast to meet its
rapid urbanization, infrastructure building, population
growth and industrialization with all probability these will
continue to grow. Eve with a slowdown of economy, in 2012
China imported 1.88 million barrels of oil per day (mb/d)
from the GCC countries which constituted 35% of its total
imports and out of that 1.08 million barrels were from Saudi
Arabia alone. According to US Energy Administration
forecast, the consumption of oil in China will increase sig-
nificantly from 13.2 million barrels per day (mb/d) in 2020
to 17.5 (mb/d) in 2040 [10].
Saudi Arabia signed hundreds of MoUs, agreements,
protocols and treaties for trade, investment and develop-
mental projects, joint ventures as well as new aspiring sci-
entific projects of national and strategic importance. These
documents are signed and negotiated during the frequent
bilateral visits of top leaders between the two countries
which has become a regular phenomenon. After ascending
the throne, King Abdullah visited China, and this was the
first visit of a Saudi ruler to China followed by the visits of
President Hu Jintao (2 times) to Riyadh. The historical visit
of President Xi Jinping in January 2016 and the return visit
of King Salman to China in March 2017 further cemented
relations between the two countries.
During the visit of Xi Jinping in 2016, he proposed for
forging a strategic partnership of mutual support and form-
ing synergy between the two states for respective develop-
ment strategies, increase mutual understanding and support
each other on issues relating to respective core interests and
major concerns, and cement political mutual trust’[7].
During a response visit of King Faisal to China in March
2017, 21 deals worth of US$65 billion were signed between
the two countries in the fields of energy, culture, education,
and technology. Saudi Basic Industries Corp (SABIC) and
Sinopec agreed to develop petrochemical projects in both
China and Saudi Arabia. Saudi and Chinese companies
signed deals, ranging from exploring investments in oil and
petrochemical plants to e-commerce and co-operation in
renewable energy markets. A MoU between the giant state
oil firm Saudi-Aramco and China North Industries Group
Corporation considering the building of refineries and
chemical plants in China. Another important MoU was
signed by the Kingdom to participate in China’s Chang E-4
moon mission and partnership agreement for manufacturing
drones [11]. Other important projects are; Saudi-Aramco has
taken a 25% stake in a refinery in Fujian and has formed a
joint venture with PetroChina for a 200,000-bpd refinery in
the southwestern Chinese province of Yunnan. Saudi
investments also include downstream assets, including a
string of gas stations. Meanwhile, China’s Sinopec took a
37.5% stake in Saudi Arabia’s Red Sea Refining Company
(YASREF) in the city of Yanbu [8].
During a recent meeting of Chinese Vice Premier Zhang
Gaoli and Khalid AlFalih, Minister of Energy, Industry and
Mineral Resources of Saudi Arabia, in Saudi-China Forum
held in Jeddah in August 2017, 60 agreements were signed
between the two countries worth of $70 billion which will
cover investment, trade, energy, postal service, communi-
cation and media [12]. It is also not only the one-way traffic
of Chinese investments in Saudi Arabia, but the Kingdom
also aspires to be the biggest investor in the sector of refinery
and petrochemicals in the Chinese market. Saudi Arabia is
keen to develop its nuclear energy for peaceful commercial
use particularly to develop water desalination plants, and
signed a MoU with China as early as 2012 to cooperate on
the civilian use of nuclear energy. Recently the Kingdom
launched a renewable energy and other mega projects for
diversifying its economy, as a part of the “Vision 2030”and
China is in close cooperation in these efforts. Riyadh is in the
early stages of feasibility and design studies to build the first
two commercial nuclear reactors which will produce
2.8 GW. China National Nuclear Corporation (CNNP) has
recently signed an MoU with the Saudi Geological Survey
(SGS) to promote further cooperation to explore and assess
uranium and thorium resources.
Military and security cooperation between the two part-
ners started as early as in 1985 when Saudi Arabia report-
edly purchased 36 CSS-2 East Wind intermediate range
ballistic and 9 missile launchers from China. Even some
Saudi officers were sent to China for training on how to use
Chinese weapons, but all these were kept obscured from the
US. Although economic, trade, investment relations and
Saudi oil exports to China were booming during the last two
decades or so, military and security cooperation lag far
behind as the Arab Gulf states were overwhelmingly
dependent on the West, particularly on the US for their
military and security needs. In contrast to multibillion dollar
security contract with the US, China sold only $700 million
in arms to Saudi Arabia during the period of 2008–2011
[13]. But recently there seems to have a surge in improving
and expanding military and security relations with China.
66 G. Mostafa
On November 7, 2016 King Salman met Meng Zhinazhu, a
special envoy of Chinese President Xi Jinping, in Riyadh
and signed a five-year plan for security cooperation in the
fields of counterterrorism cooperation and joint military
drills. Saudi Arabia is intersected in purchasing high tech
and sophisticated Chinese military technology and arms and
China is willing to sell without any political and ideological
strings attached [13].
Nevertheless, a scrutiny will reveal that China’s military
relations and arms sale to the Kingdom is still very low and
insignificant. There may be several reasons for this slow
growth; First, the GCC countries may not found the Chinese
military technology and arms as most appropriate and suit-
able for their needs and requirements; Second, political
reason; Saudi Arabia is not happy and satisfied with China’s
close military ties with Iran and its roles and policies
regarding the crisis in Syria and Yemen; Third, the leader-
ship of the Kingdom may be worried and concerned that a
warm and close military relations with China may anger and
frustrate America, its traditional ally, that may jeopardize its
hope and aspiration in rebuilding the close traditional alli-
ance with US Administration.
Some political observers and experts of the region
express doubt and suspicion that whether the Kingdom is
genuinely interested in building a security and military
alliance with China or these strategic maneuverers are cre-
ated and orchestrated to convince (and use it a trump card)
Washington to get maximum strategic advantage and bene-
fits including the sale of most sophisticated arms to Riyadh.
4 China-UAE Relations
UAE has become one of the most important locations for
exporting and re-exporting of China’s consumer and man-
ufactured goods and products to the neighboring countries as
well as to Africa. Trade between the two countries increased
from $2.1 billion in 2000 to $24 billion in 2008 and $37.1
billion in 2015, when UAE became the 15th largest importer
of Chinese goods, and Dubai played the crucial role. Trade
between UAE and China increased to $60 billion by the end
of 2016, compared to $54.8 billion in 2015 [14]. China
usually imports oil, natural gas, and chemical products from
the UAE and exports garments, textile fabrics, electronic,
telecommunication equipment and other consumer and
merchandise goods. UAE has become the second largest
trading partner of China among the GCC countries after
Saudi Arabia.
One of the symbols and success story of China’s trading
culture in Dubai is the establishment of the Dragon Mart
which is the world’s largest Chinese trading center outside
the country. There are more than 5000 stores and about
one-third of them are run by Chinese retailers, and it can
welcome more than 120,000 visitors every day and with its
growing expansion and extension the capacity with certainly
grow further in future. Currently, more than 3000 Chinese
companies operate in Dubai compared to only 18 in 2005.
Similarly, the number of Chinese people living in Dubai
(currently 300,000) are also increasing rapidly [15]. A Dubai
consultancy firm, Falcon Associates, handles strategic ini-
tiatives of the Dubai government, has been tasked with
further strengthening relations with China. They recruit top
Chinese graduates to intern at top Dubai-based companies
and invites leaders from China to visit Dubai. Dubai has
become an attractive vacation destination for many Chinese
tourists, and it attracted more than 300,000 tourists in 2014,
and the number increased to 450,000 in 2015. Thirteen
Chinese cities, including Beijing, Guangzhou, Shanghai and
Shenzhen, as well as Hong Kong and Taipei, are connected
to Dubai with more than 100 weekly flights [16]. The recent
introduction of visa-on-arrival scheme for Chinese citizens
will certainly help to further increase the number of Chinese
visitors into the UAE. Organizing special trade, cultural and
educational events between the two countries have become a
common and regular phenomenon. In 2016 a “Dubai Week
in China”exhibited in the heart of Beijing. Similarly, “China
or Shanghai week”in Dubai are organized on regular basis
as part of cultural events and promotion of people-to-people
understanding [8].
Trade, economic and investment relations between the
two countries are very strong and based on solid founda-
tions. As early as 2008 during the visit of Sheikh Moham-
mad, the Vice President of UAE and Ruler of Dubai, to
Beijing and Shanghai, Emmar signed a MoU with Chinese
government to explore the use and development of property
and infrastructure in Chinese cities. Etisalat signed a similar
treaty with Huawei Technologies for further cooperation
among them. DP World signed an agreement to invest
$1.9 billion in ports at Tianjin and Quanzhou; China’s Cosco
Shipping Ports invested US$400 million in building a con-
tainer terminal in Abu Dhabi, the capital of the UAE [1].
During a visit to UAE in 2012 Chinese Premier Wen
Jiabao emphasized the need and importance of further
improving and strengthening relations between the two
states and emphasized that “China is willing to expand
cooperation with the UAE in trade and exploration of oil and
gas as well as in the field of developing new energy
resources, with the aim to establish a long-term, stable and
comprehensive energy partnership between the two sides”.
Leaders and officials from the UAE side expressed similar
views and expressed optimism for further growth and
development of Sino-UAE relations. According to Hani
Rashid Al-Hamli, Secretary-General of the Dubai Economic
Council “Transforming Dubai into the biggest destination of
Chinese direct investment in this region is being driven by
directives from the wise leadership to bolster economic
China’s Relations with Arab Gulf States 67
relations between the two countries and make China a
strategic partner in development projects”[14]. In 2016
China Construction Bank, second largest in China terms in
of assets listed a $600 million bond on Nasdaq Dubai. All
major Chinese banks have their branches in Dubai, the
region’s largest financial free zone; Dubai International
Financial Centre (DIFC). Abu Dhabi Department of Eco-
nomic Development, Abu Dhabi Investment Authority
(ADIA), Abu Dhabi National Oil Company (ADNOC), DP
World, Etisalat and others are working with Chinese banks
and companies for joint projects and collaboration that will
further strengthen relations between the two countries [15].
Dubai has become an important financial center in the
Gulf and Middle East for China because of its growth, sta-
bility, security and importance as trade and financial hub in
the Arab world. The UAE has become the most important
country in the Middle East in using yuan for direct payments
to China and Hong Kong. In 2015, the Chinese currency was
used for 74% of payments by value from the UAE to China
and Hong Kong on the Swift international transactions net-
work. The UAE center will provide local Chinese firms,
UAE companies and those from other regions with renminbi
liquidity for trade settlement and investment. China wants
the UAE to be included in its Renminbi Qualified Foreign
Institutional Investor scheme with a 50-billion-yuan quota,
allowing the UAE-based institutions to channel offshore
yuan holdings into Chinese securities [4].
All these positive factors and developments will further
cement bilateral ties, economic, trade and investment rela-
tions between the two friendly states. Leaders of the two
countries are eager and interested in improving, expanding
multi-level relations and there are no serious issues of con-
flict and contention in bilateral relations between the two
countries.
5 Kuwait
As mentioned earlier, Kuwait established diplomatic rela-
tions with on March 22, 1971, being the first Arab Gulf
country to do so and supported China’s inclusion into the
UN which was highly appreciated by the Chinese leadership.
Traditionally, China was not a major trading partner for
Kuwait like Saudi Arabia and UAE; in 2008 only 4.4% of
Kuwait’s exports went to China and 6.8% import items came
from China but that changed rapidly and soon China
became the largest trading partner in Kuwait’s imports.
Kuwait-China trade increased from $8.5 billion in 2010 to
more than $10 billion in 2014. A series of high profile
bilateral visits resulted in signing treaties, agreements and
MoUs during the 1980s and 1990s for investment and
cooperation in various sectors of economy. As early as 1977
China and Kuwait signed an agreement on Economic and
Technical Cooperation which was revised and modified in
1989 to reflect new developments and changes. A MoU on
military cooperation was signed at Beijing in March 1995
followed by a contract signed in Kuwait in December of the
same year worth of $400 million (Kuwait News, 2009, May
4). During the 1980s China and Kuwait signed three
important agreements; Agreement on Civil Aviation Trans-
portation (1980; Agreement on Cultural Cooperation
(1982),) and Agreement on Sports Cooperation (1992) [5].
In April 2009, China’s Sinopec signed a $350 million oil
drilling deal with Kuwait Petroleum Corporation (KPC).
Kuwait Investment Authority (Kia) granted a $1 billion
license by China’s Central Bank in 2012 to invest in its
domestic inter-bank bond market that has a stake in the
Agriculture Bank of China. China’s foreign exchange reg-
ulator also awarded Kia a fresh quota of $700 million for
direct investment in the Chinese securities market in addition
to the $300 million granted earlier. Ten new agreements and
MoUs were signed to boost cooperation in the areas of
economy, investment, energy, culture, education and civil
aviation during the visit of Kuwaiti Prime Minister Sheikh
Jaber to China in June 2014 [9].
China and Kuwait share similar and identical views on
many major international and regional issues, events and
conflicts and support and advocate their peaceful resolutions
through dialogue and negotiations. During the Gulf Crisis in
1990 when Iraq invaded Kuwait, China strongly opposed the
move and demanded that Iraq should withdraw its troops
from Kuwait and restore and respect its independence,
sovereignty and territorial integrity. On the other hand,
Kuwait recognizes and strictly follow the ‘One China Pol-
icy’in all diplomatic forums and activities.
Kuwait is interested in expanding and promoting relations
with China at multilevel, particularly in trade, investments,
travel and tourism, and keeping that in mind Kuwait opened
Consulate General offices in various cities—Guangzhou and
Shanghai—as well as in Hong Kong in addition to the main
Embassy in Beijing.
6 Qatar-China Relations
When Qatar achieved full independence from the United
Kingdom on September 3, 1971, China sent an official
congratulation and expressed interests in developing rela-
tions between the two states but there was no response and
full diplomatic relations were established only in 1988.
Bilateral trade between China and Qatar increased by tree
times between 2008 and 2013 to $11.5 billion and that was
further increased to over $19 billion in 2015 [16].
Qatar is the largest natural gas supplier to China that
meets about 22% of its energy needs. In 2008 the China
National Offshore Oil Company (CNOOC) signed a 25-year
68 G. Mostafa
deal with Qatar for the annual supply of 2 million tons of
liquefied natural gas (LNG) starting from 2009. PetroChina
also signed a separate 25-year deal with Doha to purchase
three million tons of LNG per year [17]. Thus, Qatar became
China’s second largest supplier of gas after Australia. In
2014 China signed agreements to participate in building $8
billion worth of infrastructure projects that include civil
construction works, road building, bridges, ports, telecom-
munications railways and building a new stadium for the
World Cup in 2022. China’s direct investment in Qatar has
also increased rapidly; a 77.5% increase in 2015 compared
to 2014.
One of the most significant developments took place in
financial cooperation sector when China established a ren-
minbi clearing center in Qatar in April 2015; the first in the
Middle East. The main objective was to offer financial
institutions access to Chinese renminbi and foreign exchange
markets. The new center benefits Qatar in strengthening its
links with China and bolster its image as regional financial
center [18]. The Industrial and Commercial Bank of China
launched its first Middle Eastern Chinese yuan-clearing
center in Qatar and the aim was to expand trade and
investment between Beijing, Doha, and the region. China
decided to establish the clearing center in Qatar not by
accident; at that time Doha had about $43 billion in net
foreign currency reserve and $200 billion in foreign assets in
its sovereign fund. Qatar National Bank raised a $1 billion
loan in the Asia bank market where the Agricultural Bank of
China had a leading role [19].
China-Qatar relations is not only one-way ties, Qatar is
also actively investing in China which is growing rapidly. In
2014 Qatar’s Sovereign Wealth Fund (QSWF) paid Hong
Kong $4.78 billion to secure 20% stake of Sogo department
store operator Lifestyle International Holdings. The Fund is
actively investing in banking and financial sectors and
already bought a 22% stake in Citic Capital Holdings, one of
China’s top investment funds.
The recent conflict between Qatar and three of its fellow
GCC members (Saudi Arabia, UAE and Bahrain) and Egypt
made China worried and concerned about its future relations
with the Arab Gulf states (Wintour, 2017, June 5) although
policy differences and tension between Qatar and its Arab
neighbors are not new. As mentioned earlier, China has been
negotiating a free trade agreement with the GCC countries
since 2004 and a significant progress is made but the rift
between Qatar and three other GCC members will certainly
make the process delayed and more complicated [20].
Chinese policy on this matter is neutral and
non-involvement, and Beijing considers it as an inter-GCC
problem that must be resolved diplomatically, and it does not
want to interfere and become involved into it although it is a
matter of concern and irritation because until the issue is
resolved there will be no progress in the FTA project
between China and the GCC countries.
7 Qatar-China Relations
China-Oman relations demonstrate China’s opening to the
world and a new pragmatic change in its foreign policy
perceptions and orientations by moving away from its old
political, ideological supports to Marxist-Leninist rebels.
Contemporary Sino-Omani relations emerged out of some
mistrust, distrust and hostility during the period of domestic
unrest of an armed uprising in Oman’s southern Dhofar
Province in the 1960s. China provided moral, diplomatic,
financial and military assistance to the rebels by providing
military training and deploying advisers to fight alongside
the rebels in the region. Despite these inauspicious begin-
nings, Oman established diplomatic relations in 1978.
Trade between the two countries increased from $10
billion in 2010 to $24 billion in 2014. Oman started
exporting oil to China as soon as Beijing started importing it
after 1993 and soon assumed the leading position. By 1997
China became the third largest recipient of Omani oil that
represented an estimated ten percent of China’s total oil
imports [21].
China-Oman contacts date back to ancient Maritime Silk
Route that linked Asia with Europe. The two countries are
eager now to revive and further develop and expand these
links under the auspices of China’s new 21st century project
of Maritime Silk Road (OBOR). Oman is an important
country for China as it is in the southeastern Arabian
Peninsula close to the Strait of Hormuz, the vital maritime
artery between the Arabian Gulf, Gulf of Oman, and the
Arabia Sea and wider Indian Ocean, and about 40% of the
world’s seaborne oil crosses this Strait.
China wants to get benefit from Oman’s development and
expansion of infrastructure building; road and railway that
will integrate Sohar Port and Freezone to existing Omani and
GCC transportation corridors and further extending into the
UAE and Saudi Arabia [22], AIIB provided $300 million to
Oman to expand its Duqm port and to start the Sultanate’s
first railway system. Ultimately, these transportation net-
works system will provide Oman a competitive advantage
over others to establish logistical and transportation hubs in
the region.
Despite all these positive and important factors China’s
relations with Oman are somehow overlooked or did not get
proper attention. However, in recent years, contacts between
these two countries are expanded and diversified beyond the
energy sector, yielding notable developments on the diplo-
matic, military, and economic fronts. People’s Liberation
Army Navy (PLAN) warships engaging in anti-piracy
China’s Relations with Arab Gulf States 69
operations in the Gulf of Aden made over 20 port calls to
Oman’s Port Salalah for replenishment and supply, testa-
ment [23].
Oman has long charted and followed an independent
foreign policy based on the principles of neutrality, prag-
matism, moderation, non-involvement, negotiation and
compromise, and to maintain good and friendly relations
with all countries. Oman is the only Arab Gulf country that
maintains cordial diplomatic ties, robust social, economic
relations and holds regular military exercises with Iran
which has drawn the ire of most GCC countries but gets full
supports of China as Beijing also maintains a robust eco-
nomic, trade and military relations with Tehran.
China’s relations with Bahrain started late as in the cases
of many Arab states and China never forged to have official
ties with Manama mainly because of Cold War politics,
ideological and other military and security issues and con-
siderations. Bahrain formally established diplomatic rela-
tions late in 1989 and since then the two countries developed
modest but growing economic, trade and investment rela-
tions. According to Bahrain Chamber of Commerce and
Industry the total trade between China and Bahrain (imports,
exports and re-exports) was about $1.22 billion in 2015. The
relations boosted after the high-level visit of King Hamad
bin Isa al-Khalifa to China in 2013 when several important
agreements were signed on trade and investments [24].
To improve and strengthen economic, trade and invest-
ment ties, the first China-Bahraini Committee for Economic,
Trade and Technological Cooperation was founded in 1990.
Several other important Forums and Councils were also
formed later. For example, the Bahrain-China Joint Invest-
ment Forum (BCJIF) was formed in 2010, co-organized by
the China Council for Promotion of International Trade
(CCPIT). Bahrain Chamber of Commerce and Industry
(BCCI) was created to promote trade and business with other
countries including China. The BCJIF seeks to promote
investment initiatives and advantages between the two
countries by identifying opportunities to enhance financial
cooperation in finance, real estate and banking, and to open
new prospects about mutual advantage.
Bahrain’s trade with China is nominal but increasing
rapidly. On September 13, 2013, the trade volume between
Beijing and Manama reached more than $1.5 billion, which
exceeded US$1.22 billion in 2015, and the forecast is for
further growth [25].
China showed growing interests in investing in several of
Bahrain’s major construction and infrastructure projects. In
January 2014, Chinese construction companies signed
agreements with the Bahraini government to build 40,000
new residential units across the country. The same year,
Bahraini government announced a plan to open a vast,
China-themed mall like that of the Dragon Mart in Dubai
and calls it “Dragon City”. Bahrain also maintains close
cultural and educational ties with China. Chinese Govern-
ment provides regular scholarships and funding for Bahraini
students to study in higher educational institutions in China.
Another important aspect of China-Bahrain relation is
Beijing’s strong support for Bahrain’s sovereignty, territorial
integrity, stability and peace and China’s position largely
corresponds to that of the Bahraini and Saudi ones. China
conveyed a message to Iran that it would not support any
instability in the Gulf, a stance that was highly appreciated
by Bahrain [18]. Despite the fact of China’s declared support
of Bahrain’s independence and territorial integrity, Manama
is suspicious and concerned about the real Chinese role and
motivation because of its close and robust relations with
Shiite Iran that, Bahrain believes, is meddling and interfering
into its domestic affairs and fueling the tension and conflict
by using and escalating the sectarian issue and supporting
the Shiia community who are fighting against the Sunni
Government.
8 Conclusion
A scrutiny of China’s relations with the Arab Gulf states
demonstrates that Beijing has developed multilevel and
multidimensional relations with all of them without excep-
tion but at a different space and limit. Trade, investment and
financial relations are developed much quicker and faster
with oil-rich, economically strong and more powerful Arab
states like, Saudi Arabia, UAE, Qatar and Kuwait than those
of others—Oman and Bahrain. Another observation can be
drawn that relationships between China and individual GCC
member states grew faster and more rapidly than those at
institutional levels. Dozens of bilateral treaties, agreements
and MoUs worth of hundreds of billions of US dollars are
signed for cooperation in the fields agriculture, trade,
investment, oil sector, infrastructure building, railway, roads,
bridges and ports, telecommunication as well as in the new
sectors of economy like, aerospace, nuclear energy, devel-
oping alternative energy and diversification of economy.
Although China’s military cooperation and arm sales to the
region is insignificant, it is gradually picking up and coun-
tries like Saudi Arabia, UAE, Kuwait and Oman are showing
interests and cooperating in this sector [13].
As mentioned earlier, ambitious, well organized and well
planned multilateral organizations and institutions were
created for stable and sustainable growth of relations
between the two dynamic regions of the emerging world.
The China-Arab Cooperation Forum established in 2004 was
supposed to be used as a forum for GCC countries to interact
and deal with China, especially on political and strategic
issues. It had several meetings but failed to achieve fruitful
results and remains as an inactive and dysfunctional body.
Similarly, the Free Trade Agreement (FTA) between GCC
70 G. Mostafa
and China was another high ambitious project for institu-
tional cooperation to boost and expediate trade, investment
and other economic ties but it also failed to achieve the
desired goals because intra-GCC conflict [26].
There are number of issues and challenges behind the
lack of success through institutional framework; First, even
though GCC is functioning for more than 35 years, institu-
tions, negotiating, consensus building process and mecha-
nisms are still weak or absent. Often it has been suffering
from internal squabbles, tress, tensions and conflicts and
failed to create a cohesive, integrated, strong institutional
framework, so that external countries can deal with it as a
single entity. Second, China has also failed (or did not try) to
build a positive image about its people, culture and society
to the Gulf states rather, for them, maintaining and growing
state-to-state relations is good enough for diplomacy and
trade.
There are both objective and subjective factors and con-
ditions for further growth and expansion of China’s relations
with Arab Gulf states. China has a modern foreign policy of
growth, peaceful rise and ‘going out’for its market needs
and exports. The Gulf states, on the other hand, want to
diversify and reorient their foreign policies and want to
“look towards east”mainly as a response to the
pressure/criticism by their Western allies, particularly the
USA. But whether these are the sings for a long-term alli-
ance building or just a marriage of convenience is yet to be
seen in future.
China, as an emerging superpower depending and
deploying “Soft Power”strategy, wants to emerge as a
trusted, influential, powerful strategic partner to the countries
in the region, reduce the US domination and influence there
not by going into confrontation rather by working with its
allies in the region. China intends to play effective and
meaningful roles as a peace-maker and peace-broker to
resolve the local and regional conflicts where others failed.
The Arab Gulf states understand, recognize and support
China’s goals and ambitions in the region knowing fully of
Beijing’s own constraints and limitations.
References
1. Mei, Z.: China’s Interests in the Gulf-Beyond Economic Relations,
Perspectives 004. Middle East Institute, Singapore (2009)
2. Lirong, M.A.: The ‘one belt, one road’strategy and the ‘321’
cooperation mode between China and GCC. J. Sino-W. Commun.
7(1). Middle East Studies Institute, Shanghai International Studies
University, Shanghai, China (June 2015)
3. Bailey, R.: China and GCC: growing ties: is China set to become
the GCC’s most important economic partner by 2020? And what
does this mean for the region? Gulf Business, Tuesday, 16 Apr
2013
4. Khaleej Times: Increased Yuan usage will catalyze GCC-China
trade. Retrieved 28 Aug 2017 from https://www.khaleejtimes.com/
business/increased-yuan-usage-will-catalyse-gcc-china-trade,5
Nov 2016
5. Niazi, K.: Kuwait looks towards the East: relations with China.
Middle East Institute. Retrieved 25 Sept 2017 from http://www.
mei.edu/content/kuwait-looks-towards-east-relations-china (2009)
6. Cheng, J.Y.S.: China’s Relations with the Gulf Cooperation
Council States: Multilevel
7. Jinping, X.: China’s President Xi visits Saudi Arabia to improve
ties, from https://www.bbc.com/news/world-middle-east-35351391
(2016)
8. Molavi, A.: Saudi-China –the supply heavyweight meets the
demand heavyweight. The New Silk Road Minito. Retrieved 10
Aug 2017 from http://newsilkroadmonitor.com/china-and-the-gcc-
states-a-turbo-charged-trade-relationship/ (2015)
9. Al-Tamimi, N.: China-Saudi Arabia Relations, 1992–2012: Mar-
riage of Convenience or Strategic Alliance? Routledge, London
2(1), 15–32 (2013)
10. U.S. Energy Information Administration: Annual Energy Outlook
2013, p. 159
11. Blanchard, B.: China, Saudi Arabia eye $65 billion in deals as king
visits. Retrieved on 12 Mar 2017 from http://www.reuters.com/
article/us-saudi-asia-china-idUSKBN16N0G9?il = 0 (2017)
12. Gao, C.: Closer ties: China and Saudi Arabia sign $70 billion in
new deals: China says its bilateral relations with Saudi Arabia have
entered a new era, Diploma. Retrieved 17 Sept 2017 from http://
thediplomat.com/2017/08/closer-ties-china-and-saudi-arabia-sign-
70-billion-in-new-deals/ (2017)
13. Ramani, S.: China and Saudi Arabia’s burgeoning defense ties:
tensions in the U.S.-Saudi alliance have China poised to expand its
defense ties with Riyadh. Retrieved 18 Sept 2017 from http://
thediplomat.com/2016/11/china-and-saudi-arabias-burgeoning-
defense-ties/ (2016)
14. China Daily: Retrieved 3 Sept 2017 from http://www.chinadaily.
com.cn/business/2016-12/, 12 Dec 2016
15. Al-Fil, G.: UAE China relations to see strong growth in 2017,
Trends. Retrieved 8 Oct 2017 from https://trendsmena.com/global/
oriental-march, 13 Mar 2017
16. Global Edge: Retrieved 5 Oct 2017 from https://globaledge.msu.
edu/countries/qatar/tradestats (2016)
17. Qatar-China signs 25-year gas deal, Peninsula (Doha), 8 Mar 2009
18. Rakhmat, M.Z.: “China, Qatar and RMB internationalization: with
a new renminbi clearing center, Beijing takes an important step
forward. Retrieved 10 Sept 2017 from http://thediplomat.com/
2015/06/china-qatar-and-rmb-internationalization, 6 June 2015
19. Hollingsworth, J.: Why Qatar matters to China, in spite of Gulf
isolation, South China monitoring post. Retrieved 15 Sept 2017 from
http://www.scmp.com/news/china/diplomacy-defence/article/
2097206/why-qatar-matters-china-spite-gulf-isolation, 7 June 2017
20. South China Monitoring Post: Gulf split: Qatar isolated after seven
countries cut diplomatic ties over accusations of support for
extremists”. Retrieved 21 Sept 2017 from http://www.scmp.com/
news/world/middle-east/article/2096889/gulf-split-qatar-isolated-
after-seven-countries-cut, 5 June 2017
21. Muscat daily: Retrieved 10 Sept 2017 from http://www.muscatdaily.
com/Archive/Business/Oman-s-oil-production-reaches-990-030-
bpd-in-September-4czb, 14 Oct 2015
22. Zambelis, C.: China and the quiet kingdom: as assessment of
China-Oman relations. China Brief 15(22) (2015)
China’s Relations with Arab Gulf States 71
23. Kostecka, D.: The Chinese navy’s emerging support network
in the Indian Ocean. China Brief 10(15). Retrieved 23 Sept 2017
from https://mg.mail.yahoo.com/d/compose/6167472330 (22 July
2010)
24. Bahrain Chamber of Commerce and Industries: Retrieved 28 Sept
2017 from http://www.bcci.bh/sites/default/files/library/Bah-China
%20Executive%20Report%2020
25. Bahrain News Agency: Retrieved 2 Oct 2017 from http://www.
bna.bh/portal/en/news/724865 (28 Apr 2016)
26. China FTA Network. Retrieved 5 Oct 2017 from http://fta.
mofcom.gov.cn/enarticle/engcc/engccnews/201612/33922_1.html
(2016)
72 G. Mostafa
Citizen-Centric Approach in Delivery
of Smart Government Services
Ayman Ahmad Obedait, Mohamed Youssef, and Nikolina Ljepava
Abstract
Urban centers and cities across the world are increasing.
As per Population Reference Bureau, 70% of world
population will live in cities by 2050. This will lead to
increasing pressure on city resources, congestion, water
and sanitation problems and many other challenges.
Governments across nations realize this and are working
towards making cities Smarter and governance citizen
centric which will help to improve the quality of life of
city residents and deliver government services in the most
efficient manner. This paper provides a detailed literature
review of the existing research on Smart Cities and citizen
centric governance. First the role ICT plays in governance
is explained and the key trends in ICT which are affecting
governance explored. Moreover, the definitions of Smart
City are provided, along with an explanation of various
dimensions in a Smart City and capabilities required to
implement Smart City initiatives. The paper also provides
an overview of the key benefits derived once a city
transitions to a Smart City. Various challenges faced in
delivering citizen centric governance has been reviewed
and a case has been made on how Smart
governance/e-governance can address these challenged.
Additionally, the state of Smart City implementation in
Dubai and UAE has been reviewed. The paper is
concluded by providing an overview of the various ways
in which customer centricity can be embedded into
Governance through the application of technology.
Keywords
Smart city Smart city dimensions Smart city
capabilities Governance Citizen-centric
ICT Technology
1 Introduction
Newtonian physics suggests that the biggest task is con-
verting potential energy into a useful reality. Today, we are
faced with a similar issue wherein the biggest task at hand is
to harness the latent potential in technology to simplify the
life of citizens and improve quality of life rather than com-
plicate it by providing them more tools and processes to
follow. The spectacle of new trends and technologies and
latest breakthroughs is unyielding and is telling on many
fronts. The list of technology of the future is ever increasing,
and technology has become the inseparable part of everyday
life; yet, only few technologies have the potential and ability
to alter one’s way of living. However, organizations cannot
wait till the efficacy of each of these are proven before
developing solutions and implementing in their organization
as they would be left behind the curve.
Technology impacts the daily lives of people, in their
homes, offices and while interacting with the government.
Today with Mobile, internet, social media, video confer-
encing tools and mobile apps, communication has become
smooth, quick and easy. These tools have been used to
spread knowledge, education and awareness which has led
to multifold changes. Knowledge in one country has spread
to another leading to quickening of development. Awareness
about rights has led to human right movements across the
globe. Quality education has made available in remote pla-
ces through the use of internet. Governments have utilized
technology to improve lives of citizens and provide better
services. For e.g. a lot of information about government
benefits and services is provided on website, appointments
can be booked on internet and grievances can be addressed
A. A. Obedait (&)
RTA, Dubai, United Arab Emirates
e-mail: Ayman.obeidat@gmail.com
M. Youssef N. Ljepava
American University in the Emirates, Dubai,
United Arab Emirates
e-mail: mohamed.youssef@aue.ae
N. Ljepava
e-mail: nikolina.ljepava@aue.ae
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_10
73
through video conferencing. This has led to reduction in the
time and effort required to access government services by
citizens and at the same time reduces the transaction cost for
the governments.
2 ICT and Its Role in the Society
Information and Communication Technology (ICT) has
advanced at a rapid pace over the last ten years, more so
recently in the streams of data analytics, cloud computing,
core system transformation, digital technology and the
ever-evolving role of IT within the enterprise [1]. The goal
of implementing these technologies in business and gov-
ernment sectors has been to either improve overall customer
experience, operational efficiency or both [2]. ICT has had
far-reaching benefits beyond the ones mentioned earlier,
however they would need to satiate a few hygiene factors
before they could revolutionize the world:
1. Mass adoption—ICTs are vectors of social and economic
transformation globally [3]. By enhancing the overall
connectivity and altering the way people communicate
with each other and with organizations, ICT would
transform the world. However, this transformation would
require a mass and systematic adoption of technology;
else, it would remain as pocketed initiatives with no
tangible impact to the society. Per McKinsey et al. [4],
2013 there is a strong correlation between the adoption of
ICT and the country overall economic and social
indicators.
2. Pervasive ubiquity—While technology is expanding
around globally at a pace swifter than ever before, it still
has not had the reach required to meet the global need,
despite efforts by several initiatives such as internet.org
by Facebook. Internet.org is a partnership between
Facebook and six companies (Samsung, Ericsson, Med-
iaTek, Opera Software, Nokia and Qualcomm) that aims
to make internet accessible to people in developing and
least developed countries by increasing efficiency and
facilitating development of new business models. There
still is a huge digital divide that exists between devel-
oping countries and developed countries in terms of the
reach of ICT, which undermines the efforts of digitally
prone organizations. Highly populated regions of the
world such as India, China, Indonesia, Brazil, Pakistan
and Nigeria are still evolving their readiness for ICT
revolution and are yet to fully harness the capabilities of
ICT. This is reflected from their rankings in the Network
Readiness Index, 2015 wherein according to the Global
Information Technology Report all of them are ranked
lower than 55 (China—59, India—91, Indonesia—73,
Brazil—72, Pakistan—110 and Nigeria—119) in a list of
139 countries. Network Readiness Index framework
assesses a country on six principles to evaluate a coun-
try’s capability to utilize ICT for benefit of the people.
If channeled properly, ICT has the capability to create
new economic opportunities and help nurture better political
and social inclusion, which would ultimately lead to the
overall uplift of the society. ICT supports and fosters
entrepreneurship and provides new tools to the organizations
that help improve overall levels of productivity and effi-
ciency [5]. More importantly, this enables and provides
better access to the wider population to essential services,
education and financial services, which also acts as a direct
channel for an uninterrupted interaction between the
Government and its citizens. This improved presence of the
Government leads to efficient public administration [6], and
improves the participation of the citizens in policy making
and decision making through open data initiatives.
Top trends in ICT
The following top trends in information and communication
technology that have the potential to alter the future and
strongly influence the quality of life and the citizens
well-being have been identified:
1. Internet of Things (IOT)—Internet of Things which
means inter-linking of physical devices, buildings and
other electronic items which enables these objects to
collect and exchange data, which can be used to provide
a seamless, connected experience to the user. It has
multiple potential applications across various industries
including the public sector—smart cities, smart gover-
nance, military etc. have been capitalizing on the benefits
of connected things. This technology could prove to be
transformative once the potential of data is converted into
actionable insights [7].
2. Augmented Reality (AR) and Virtual Reality (VR)—AR
and VR have been adopted effectively by the retail and
real estate industry and is gradually pervading through
other allied industries. This has the potential to redefine
business processes in the government [8], the roles and
responsibilities of field workers, improve the way we
communicate with citizens and reform the training
environments.
3. Big data—refers to data sets that are large, complex and
require advanced processing software to utilize them. Big
data have applications in predictive analytics and user
behavior analytics which can be used to predict diseases,
crime, business trends etc. The public sector has been
using and harnessing data for enabling better decision
74 A. A. Obedait et al.
and policy making to help reduce the cost of governance
and improve overall citizen happiness [9]. However, with
the ability to capture data at multiple touch points from
all citizens and the capability to churn the data has pro-
vided the government a remarkable opportunity to
transform large scale data resulting in scalable and
repeatable revolutionary results.
4. Blockchain—Blockchain uses cryptography (like Bit-
coin) in order to store and verify data in a safe and secure
environment as part of shared ledgers. This technology
has the potential to redefine how transactions are con-
ducted between governments and citizens—including but
not limited to licensing, contracting and payments [10].
While, the adoption of this technology is fairly in its
nascent stages, it needs to be adopted fairly soon and
harnessed in order to reap the cost benefits of this
technology.
5. Artificial intelligence (AI)—AI has the potential to help
improve overall customer satisfaction and help reduce
costs through continuous machine learning [11] that
would enable governments to provide better and con-
sistent service by studying citizen behavior and transac-
tions continually.
3 Smart Cities—The Role of ICT in Smart
Cities
3.1 Definition of Smart Cities
Smart Cities have been defined in various manner by
researchers covering the aspects of IT education and
infrastructure [12], economy and mobility [9], quality of life
and management of natural resources [13]. It can be argued
that a city can be classified as “smart”when the Government
and organizations invest in social and human capital,
infrastructure and disruptive technologies which helps foster
sustainable economic growth and improve the overall quality
of life, through contributory and inclusive governance with a
prudent management of all resources. The key goals of a
Smart City are economic growth, quality of life and eco-
logical footprint which is aligned to the concept of triple
bottom line [2].
3.2 Key Dimensions of Smart Cities
Based on the definition above, and the literature findings the
author considers five key dimensions to a Smart City—
economy, people, governance, mobility, environment lead-
ing to better quality of life:
1. Economy—This dimension covers the aspects of pro-
ductivity, entrepreneurship, innovation and industrial
coverage [14]. This is one of the key dimensions as it
would ensure employment and overall growth in
infrastructure.
2. People—They form the fundamental basis to any Smart
City as contributors to growth and consumers of the
services. The key features of this dimension are affinity to
learning, qualification, skills, creativity and open mind-
edness [15].
3. Governance—Governance forms the outer
all-encompassing layer of a Smart City covering the
aspects of regulation and enablement of decision-making
through participation of all stakeholders [10].
4. Mobility—This is the key enabler and forms the back-
bone of the city providing easy accessibility to amenities
and services. This covers communication, smart and
sustainable infrastructure, local and national accessibility
[15,16].
5. Environment—Susceptibility to natural resources is a
major factor that needs to be managed, by harnessing
non-conventional sources of energy. Overall environ-
mental protection is key to the success of Smart City and
pollution is a major deterrent that needs address [17].
4 Smart Cities—The Role of ICT in Smart
Cities
4.1 Challenges Associated with Implementation
of Smart Governance
A cornerstone of Smart Cities is Smart Governance, which
includes involvement of various stakeholders (especially
citizens) engagement in decision making and public ser-
vices. ICT infrastructure is utmost important to implement
Smart Governance, it helps to bring various stakeholders
together and implement a smooth and transparent process
[18]. But, implementation of Smart Governance faces below
challenges:
1. Data security in a digital environment –The main char-
acteristic of a Smart City is the amount of data that is
generated, stored and harvested. While the objective and
intent of data gathering by connecting objects and people
is positive, there is a risk of it being used by businesses
and individual with malicious and selfish motives [13,
18].
2. Inclusiveness and social cohesion—According to
Hoevenaars [19], the issues related to inclusiveness and
social cohesion are one of the biggest challenges that
Citizen-Centric Approach in Delivery of Smart Government Services 75
might be faced by governments. While smart technolo-
gies can bring people together and create social cohesion,
there is a major risk on the lack of digital savviness
amongst the citizens, leading to a lower adoption of these
new technologies. Businesses and citizen communities
need to be made more responsible to address this social
problem through improved education and awareness.
3. Disruption of labor market owing to automation—The
labor market will be transformed drastically as a result of
automation. Robotics and AI leading to an increase in the
unemployment rates and requiring people to be retrained
on new skills, which would be relevant for the new
markets, will replace many traditional jobs. The key
challenge for the city would be to smoothen and expedite
this transition while ensuring that there is no impact on
employment and other key social indicators [8,16].
4. Need for talent—This is very closely related to the
challenge on the disruption to the labor market, however,
it covers the other aspect of the disruption, wherein, the
city would need to attract and retain the relevant
resources with a creative and technological bent of mind.
5. Reliability of infrastructure—Smart cities are notorious
for creating single points of failure due to the increased
dependency on digital technologies. If critical digital
infrastructure fails or is attacked, then there is a risk of
the city coming to a standstill. The challenge is to make
the entire system and infrastructure resilient to such
threats [20].
4.2 Governance and Its Challenges
Governance refers to the incentives, arrangements for
accountability, rules and regulations that affect the way key
agencies in government including politicians and other
constitutional bodies interact with citizens to deliver public
services. Governance also includes the ways in which ser-
vice providers could be held accountable for their efficiency
and responsiveness in providing the services. Considering
this, governance in a nutshell is a set of principle-agent
relations defined by the rules, regulations, accountability
mechanisms and incentives to act in a certain way.
Governance involves interactions between multiple
stakeholders: First interaction is between government, politi-
cians and citizens. The quality and depth of this interaction
depends largely on the strength of government institutions,
rules, regulations and monetary motivation arrangements.
Civil service organization, policies for HR management,
resource allocations, public financial probity and information
availability also affects the interaction in a big way. Second
interactions of citizens and policy maker’s take place through
channels for expressing voice, including votes, taxes, and
representation in parliament and other political bodies. Third
interaction is between citizens and actual service providers or
the government organizations. Citizens can improve this
interaction by proactively participating and assuming key
responsibilities in actual service delivery. They can also be a
key part of feedback mechanism and institutionalizing favor-
able changes by putting social pressures.
According to Wild et al. [21], four common constraints
have been found which leads to dysfunctions in the three
interactions and ineffective public service delivery:
Imperfection in politician citizen interactions
Those are the imperfections resulting from disturbances in
the interactions between government and politicians and
common citizens. Three types of imperfections in
politician-citizen interactions are possible:
1. Reduced trust due to low credibility of the promises
made by politicians.
2. Limited information availability with citizens about
politicians’performance.
3. Social fragmentation among citizens that can take form
of identity politics.
For example, in Malawi, entrenched state parties have
been using state resources for political gains. Water
resources have been given to ruling party aligned groups
who have used them in an unsustainable manner for
short-term gains, rather than using it for the larger benefitof
population. Similar is the case with Nepal, where parties
compete to gain access to state resources and provide dismal
services [13]. The presence and extent of imperfect infor-
mation can have multitude effects on the quality of service
delivery outcomes, and this will affect government agency’s
incentives to improve these services in different ways. Thus,
access to information and the ability of the populace to
understand it is critical [13].
Policy incoherence
This constraint relates to the poor coordination and capability
gaps between design of policies, thought process on imple-
mentation, structure of policy and roles to be played by
different stakeholders in governance leading to poor imple-
mentation. There are two types of policy incoherence—
Horizontal—Non-exclusive roles/duties and unclear respon-
sibilities among co-providers and other public bodies and
Vertical—no capability with the implementation agencies.
76 A. A. Obedait et al.
For example, in the Kenyan water sector, coordination
was reportedly ‘very weak’, with 11 ministries sharing some
responsibility for water [22]. They neither had coordination
amongst the 11 ministries nor capability (vertical
incoherence).
Inefficiencies in monitoring performance
This is present in cases where regularized formal processes
for project management, monitoring and supervision are
poorly enforced and usually not followed. Informal pro-
cesses though exists are not sufficient for proper execution of
project. This can take two forms—top down and bottom
up. Lack of performance oversight can result in dissatis-
faction leading to users opting out of the government pro-
vided services [18].
For example, in Uganda formal processes for monitoring
and supervision were not followed across the chain of
responsibilities in the health sector [23]. This mean that
health units and staff have not been subjected to active
oversight, leading to public facilities often being closed and
high level of absenteeism amongst the health centre staff,
diversion of funds leading to shortages of public medical
supplies and essential equipment.
Collective action challenges and Moral Hazard
Collective action from citizens is essential to enforce
accountability amongst public service provider. However, it
is not always possible to organize collective actions that
would lead to decrease in inefficiencies in governance. Even
if, citizen groups are formed, it is not necessary that they act
in the interest of the collective group although individual
members may benefit on achievement of group objectives.
This is particularly relevant in the case of delivery of citizen
services, which often need participation from multiple
stakeholders—service providers, local authorities and
citizens.
Moral Hazard refers to the cases in which public services
providers are protected irrespective of their efficiency in
delivering citizen services [6]. This can result in a wide
variety of dysfunctional behaviours on the part of those
actors insulated from the risks associated with their decisions
(whether they be a part of the state, service users or service
providers), such as an unwillingness to put the sector on a
sustainable financial footing (whether through user fees or,
in the case of public providers, through raising sufficient
own revenues) or to invest resources that are available.
Where such dynamics are prevalent, service delivery is
likely to continue to be short term oriented and dismal.
GCC countries have faced all constraints identified above
at some time in the past. For countries in the GCC such as
UAE, the foremost challenge in delivering government ser-
vices lies in the characteristics of the country demographics.
Population is an amalgamation of different nationalities with
dynamic and often changing expatriate population, which
accounts for 88% of the total UAE population, a large per-
centage of which is young. Countries in GCC face multitude
society related challenges as well due to increasing share of
foreign nationals, demand from populace for participation in
governance and environmental pressure [24].
4.3 How Do E-Governance and Smart
Governance Help Overcome These
Challenges?
Governments have been using technology to improve effi-
ciency and productivity for long time. For example, gov-
ernment in South Korea used computerization in the 80s and
90s to save information and data related to the Government.
However, this use of technology in governance has evolved
especially with the rapid development of ICTs.
E-governance is very fundamentally the use of information
technology to help deliver government services in an effi-
cient manner thereby enabling a good citizen experience.
As can be seen historically and from the example of
South Korea, e-government has been evolving through
various stages. Several models have been defined by
researchers to explain these stages of e-governance:
1. Hiller’sfive stage model which starts from emerging web
presence and evolves to a fully integrated web presence
[22].
2. United Nations and American Society for Public
Administration describe the stages from emerging pres-
ence to seamless and fully integrated presence.
3. Layne and Lee [25] have a four-stage model which
begins from cataloguing to transactions to vertical and
horizontal integration across various government entities
and services and customer interaction channels.
4. Moon [26] proposed a model with five stages from
information distribution to integrated political
participation.
These models can be further summarized into a five-stage
model which is an amalgamation of these models given that
all the models are based on similar principles:
1. Digital presence—This is a one-way communication to
merely provide information to the citizens through digital
channels.
2. Communication—This is a two-way communication
between the citizens and the Government, where the
Citizen-Centric Approach in Delivery of Smart Government Services 77
citizens and Governments can ask each other specific
questions.
3. Transaction—In this stage, the citizens can transact and
utilize Government services.
4. Transformation—In this stage there is complete integra-
tion of all Government institutions allowing citizens to
transparently interact and transact with all Government
agencies.
5. Smart Governance—Integration of information, com-
munication with citizens, organizations and government
agencies (G2C, G2B, G2G) [25] and deploy technologies
to plan and operate across all government agencies,
processes to help foster sustainable living [22].
In effect, based on the provided literature findings, it can
be assumed that Smart Governance is the evolutionary final
stage of e-governance. The drivers and elements for Smart
Governance are same as that defined by the author earlier in
the review, implying that Smart governance is the funda-
mental basis for the development of Smart Cities.
5 UAE and Smart Governance
Through its vision 2021, UAE wants to become a pioneer
and leader in providing best in class citizen services utilizing
technology. A strong effort has been made in order to
achieve this objective.
The challenge of delivering government services lies to
large part in the demographics of the country which is an
amalgamation of locals and non-residents, expatriate work-
ers from other countries. A large portion of the population is
consisted of younger generational cohort, individuals who
have come to UAE for work from other countries world-
wide. This social and age diversity complicates the provision
of governance and thus it is important that services are
provided in a way which easy to understand and navigate for
both locals and non-locals.
UAE has prepared an e-government strategic framework
which lists down the initiatives planned over a period of time
to improve governance. The framework leads to:
•UAE Vision 2021—making UAE one of the best coun-
tries in the world.
•UAE Government Strategy—put citizens first, account-
able and innovative government.
E-Governance has been in the agenda of UAE since the
beginning of new century. The transformation towards
e-governance started with eDirham (2001) which was to
simplify collection of government service fees. The journey
has been continued with several other initiatives, leading to
UAE being considered one of the foremost countries in
utilizing ICT to improve governance.
5.1 Developments in UAE for E-Governance
E-government portal of Abu Dhabi provides a single shop
access to all government services. This portal is being used
by citizens, businesses, tourists, expats, efficiently delivering
government services in a cost-effective manner. The portal
also answers queries and receives complaints and sugges-
tions through the Abu Dhabi Government’s various
channels.
One of the notable developments in e-governance in UAE
has been the Abu Dhabi Systems and Information Centre
(ADSIC). This center has become key in developing, pilot
testing and supporting various initiatives with the vision to
transform government services. A key objective of the center
has been to establish a strong technology-led platform which
can act as a catalyst for e-governance transformation.
The e-government strategy developed for Abu Dhabi has
a twofold approach, to develop a world-class customer
experience for users of government services and drive
government modernization through positioning the govern-
ment as a customer focused service provider.
Few other initiatives stand out as well, for example:
1. The UAE national identity card which is a critical in the
successful execution of e-government and eServices.
2. Electronic Land Management System (eLMS) which has
simplified and optimized land services through the use of
technology.
3. Happiness meter—To measure the overall impact of all
the initiatives undertaken by the Dubai Government,
there have been happiness meters installed across the city
to help measure citizen happiness with the Government
and its services. These meters are now also being
extended to the private sector.
4. Smart District Guidelines—These are guidelines that
have been provided to developers to help them build a
truly seamless city for the citizens of Dubai.
5. Smart Dubai Index—Measurement is a critical factor for
implementation of smart governance to gauge the impact
of the e-government initiatives. The Dubai Government
has defined an index across six city dimensions across
twenty-three core areas of city development.
6. Dubai Data—Dubai is moving towards becoming an
Open Data Government wherein all key information will
be shared with citizens and other governments to help
form a participatory government.
7. Smart Dubai Platform—This is Dubai’s initiative to
implement IoT citywide, wherein all critical
78 A. A. Obedait et al.
infrastructure would be mounted with sensors to capture
real time data on the city and report dashboards to the
citizens.
8. Dubai Blockchain—The Government is moving all its
services onto the blockchain to help improve the trans-
action time and reduce security threats.
5.2 Impact of Smart Governance Initiatives
Due to the efforts, UAE has been able to improve its rank in the
UN e-government surveys and improve the efficiency and cost
of providing governanceservices. Rankin the UN e-government
survey improved to 8th position in 2016 from 28th in 2012 and
49th in 2010. They also have an ambitious target of moving 80%
of Government services to digital by 2018 [24], which would be
a huge step in ensuring the Smart Dubai agenda.
6 Conclusion
It can be argued that that a customer centric approach is
being adopted for governance through technology world-
wide. Governments across the world have begun to adopt
principles of e-governance and Smart governance while
building Smart Cities; this study attempted to look at various
examples and case studies addressing key issues using
technologies and systems that have been highlighted and
identified in the earlier sections:
1. Augmented Reality (AR) for planning cities and
infrastructure—The application of AR in real infras-
tructure and land end case uses, has the potential to help
governments and citizens to visualize and understand
the architecture and identify the issues in the early
stages of design [27].
Kamp tower in Jatkasaari, Helsinki, Finland was one
of the first time in the world that AR was used to make
real time decisions on infrastructure [27].
2. Citizen interaction via Virtual model facilitating—Vir-
tual modeling helps to engage with various stakeholders
within the government and with citizens who might not
be co-located to participate in governance and help
co-create their city.
Finland has a mandatory building act where inter-
action with the citizens is required before the setup of
any major infrastructure and virtual models are now
being used to enable this communication [28].
3. Social media to engage citizens—Social media has
helped transform the traditional communication
between citizens and citizen communities and
Governments. This is also aligned with the open data
concept of Governments, wherein the Government
shares facts and figures to engage with citizens and
form a participatory government [29].
4. Multiple countries across the world have resorted to
social media to engage with citizens.
5. Gamification to enable learning—Gamification can be
used as an effective tool to help motivate government
officials to provide better customer service and help
citizens learn more about the government through an
interactive and gamified system [29].
6. Public procurement via smart contracts—Blockchain
enabled technology is being deployed by governments
to enable public procurement through secure and
dynamic smart contracts, wherein the time to procure
and pay has been reduced making the overall procure-
ment system efficient [10].
7. Emergency management—Internet of things is being
used through mounted sensors to detect public safety
threats in real-time and take appropriate action to
minimize public damage.
8. Congestion management—Reduction in congestion
through smoothening of citizen and tourist movements
in busy areas. IoT is also being used to manage traffic
jams and parking lots. For example, in London, a traffic
management system utilizes sensors to optimize green
light time at traffic intersections and co-ordinates traffic
lights across the city to improve traffic throughput. This
leads to reduction in time spent in traffic and reduced
emissions from vehicles [7].
9. 3D printing—Three-dimensional printing of building,
components to reduce carbon footprint and also reduce
lead time to procure and build [4].
10. Waste management—IoT is being used to manage
waste through segregation and measurement of wastes
and ensuring more waste is added to containers before
being emptied, therefore reducing the carbon emissions
from the waste collection trucks [30].
11. Smart metering—Governments across the world have
adopted smart metering for utilities management across
the city. Enel SpA, Italy has deployed more than 30
million smart meters across its customer base.
References
1. Desouza, K.C., Swindell, D., Smith, K.L., Sutherland, A.,
Fedorschak, K., Coronel, C.: Local government 2035: strategic
trends and implications of new technologies. Issues Technol.
Innov. 27 (2015)
2. Howard, H., Cannon, B.M., Mendonsa T.R.: Predicts 2017:
government CIOs are caught between adversity and opportunity.
Gartner (2016)
Citizen-Centric Approach in Delivery of Smart Government Services 79
3. Hang, C., Kohlbacher, F.: Disruptive innovations and the greying
market. In: Proceedings of the 2007 IEEE IEEM, pp. 1915–1919
(2008)
4. Mckinsey Global Institute: Disruptive technologies: advances that
will transform life, business, and the global economy (2013)
5. Rokhman, Ali: E-government adoption in developing countries;
the case of Indonesia. J. Emerg. Trends Comput. Inf. Sci. 2(5),
228–236 (2011)
6. Zouridis, S., Thaens, M.: E-government: towards a public
administration approach. Asian J. Public Adm. 25(2) (2003)
7. Madakam, S., Ramaswamy, R., Tripathi, S.: Internet of Things
(IoT): a literature review. J. Comput. Commun. 3, 164–173 (2015).
https://doi.org/10.4236/jcc.2015.35021
8. Alkhamisi, A., Monowar, M.: Rise of augmented reality: current
and future application areas. Int. J. Internet Distrib. Syst. 1(4), 25–
34 (2013). https://doi.org/10.4236/ijids.2013.14005
9. Mircea, R.T., Ivan, M.L.: Big data: present and future. Database
Syst. J. V1 (2014)
10. Lindman, J., Tuunainen, V.K., Rossi, M.: Opportunities and risks
of blockchain in payments. In: Proceedings of the 50th Hawaii
International Conference on System Sciences https://doi.org/10.
24251/hicss.2017.185 (2017)
11. de Montjoye, Y.A., Farzanehfar, A., Hendrickx, J. Rocher,
L.: «Solving artificial intelligence’s privacy problem», Field
actions science reports [Online], Special Issue 17 | 2017, Online
since 31 Dec 2017, connection on 1 July 2018. URL: http://
journals.openedition.org/factsreports/4494
12. Hall, R.E.: The vision of a smart city. Presented at the second
international life extension technology workshop, Paris, France
(2000)
13. Thuzar, M.: Urbanization in South East Asia: developing smart
cities for the future? Regional Outlook, pp. 96–100 (2011)
14. Bronstein, Z.: Industry and the smart city. Dissent 56(3) (2009)
15. Finnerty, B., Lacheca, D.: Government portals need to evolve now
or they won’t satisfy anyone. Gartner Report (2017)
16. Deloitte: Smart cities: how rapid advances in technology are
reshaping our economy and society (2015)
17. Albino, V., Berardi, U., Dangelico, R.M.: Smart cities: definitions,
dimensions and performance. J. Urban Technol. (2015)
18. Giffinger, Fertner, C., Kramar, H., Kalasek, R., Pichler-Milanovic´,
N., Meijers, E.: Smart cities: ranking of European medium-sized
cities Vienna. Centre Reg. Sci. (2007)
19. Hoevenaars: The biggest challenge to develop a successful Smart
City project. Blog Smart City May 28 (2015)
20. Holland, G.: Will the real smart city please stand up? Cities 12(3),
303–320 (2008)
21. Wild, L., Chambers, V., King, M., Harris, D.: Common constraints
and incentive problems in service delivery. Working paper 351,
ODI (2012)
22. Rampa, F.: Applying the EC’s“Governance Analysis Framework”
to the water sector in Kenya. European Centre of Development
Policy Management (2011)
23. Ntiro, S.: eGovernment in Eastern Africa. KPMG, Nairobi (2000)
24. Madichie, O.M., Al Athmay, A.A.: An initial assessment of
e-governance and public sector marketing in UAE. Int. J. Bus.
Emerg. Markets 5(3), 234–253 (2013)
25. Layne, K., Lee, J.W.: Developing fully functional e-government: a
four stagemodel. Gov. Inf. Q. 18(2), 122–136 (2001)
26. Moon, M.J.: The evolution of e-government among municipalities:
rhetoric or reality? Public Adm. Rev. 62(4), 424–433 (2002)
27. Olsson, T., Savisalo, A., Hakkarainen, M., Woodward, C.: User
evaluation of mobile augmented reality in architectural planning.
In: Gudnason, G., Scherer, R., (eds.), pp. 733–740, CRC Press,
Leiden, The Netherlands/Balkema (Taylor & Francis Group)
(2012)
28. Sanders, E.B.-N., Stappers, P.J.: Co-creation and the new
landscapes of design. CoDesign Int. J. CoCreation Des. Arts
(2008)
29. Deterding, S., Dixon, D., Khaled, R., Nacke, L.: From game
design elements to gamefulness: defining gamification. In:
Proceedings of the 15th International Academic MindTrek Con-
ference: Envisioning Future Media Environments, pp. 9–15 (2011)
30. Tratz–Ryan: Smart city governance requires a sustainable strategy
with well-defined objectives. Gartner (2016)
80 A. A. Obedait et al.
Cloud Concept for Implementing Multimedia
Based Learning in Higher Education
Vikas Rao Naidu, Anjum Zameer Bhat, and Baldev Singh
Abstract
Education technology is rapidly adapting various revolu-
tionary approaches to providing an enhanced learning
environment to the students. In many educational insti-
tutions, cloud-based services are being implemented to
facilitate the enhanced e-learning solutions. Cloud imple-
mentation enables on-demand educational resources in
various format, which includes, e-books, audio, video and
other interactive materials to support enhanced learning.
Cloud concept can transform the traditional way of
teaching to engaging and interesting pieces of media to
support teaching which is more accessible, even outside
the classroom. This research paper highlights few similar
approaches which are adapted to provide enhanced
e-learning solutions by implementing some multimedia
tools, for educational resources development. The study
of the existing system will provide guidelines to incor-
porate changes, wherever required, to facilitate successful
implementation of cloud-based services to support edu-
cation technology.
Keywords
Cloud in education Education technology
E-learning Interactive media in education
Teaching and learning solutions
1 Introduction
Computing resources are being utilized in every sector
successfully enabling seamless working environment and
providing cutting edge to organizations in matching to per-
petually increasing competition. Although computerization
can exponentially increase the productivity, mobility and
benefits of the organization however it does not come
without expenditure. Companies of late have been spending
huge amount of money on computing resources and devel-
opment of infrastructure that is essential for running infor-
mation systems, specialized applications, databases,
repositories and much more. Researchers some time back
perceived that computing resources can be provided as a
service (a utility) like any other service e.g. water, electricity,
internet etc. The biggest advantage in such an arrangement
would be the pay-as-you-go feature i.e. you need to pay
exactly for the computing resources you are availing and
second thing is, what one procures is exactly what is
required by him. Cloud computing a buzz word in modern
IT industry is on demand computing which provides com-
puting resources as a service. Various cloud service archi-
tectures are available however more prominent ones are
Infrastructure as a Service (IaaS), Platform as a Service
(PaaS) and Software as a Service (SaaS) [1]. These service
architecture and many other variants are being used by
various organizations and cloud service providers are pro-
viding appropriate computing resources to organizations
without any investment from the availing organization for
the infrastructure development, maintenance and
administration.
2 Cloud Computing in Education
Cloud computing in recent past has been adapted in various
organizations ranging from software development compa-
nies to automobile manufacturers, from broadcasting
V. R. Naidu (&)A. Z. Bhat
Middle East College, Muscat, Oman
e-mail: vikas@mec.edu.om
A. Z. Bhat
e-mail: azameer@mec.edu.om
B. Singh
Vivekananda Institute of Technology, Jaipur, India
e-mail: baldev.vit@gmail.com
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_11
81
companies to higher education institutions and many more in
order to avail maximum computing resources with minimum
investment, no administrative overhead and no maintenance
with a flexibility of enhancing or scaling up the resources in
future as demand may arise. Cloud computing in education
especially in higher education has been utilized and there are
various precedents where cloud resources have been used in
Universities, colleges and higher education institutions to
cater to the requirements of students.
The use of cloud computing is very much common in
multimedia where high end and expensive multimedia
computing resources are being provided on demand facili-
tating students with on disposal various expensive software
products which otherwise would be very difficult to procure
and access. Moreover cloud computing is also used in
teaching multimedia and assisting students in understanding
the concept of multimedia tools. Moreover cloud computing
can promote collaborative learning especially in multimedia
application enhancing the learning capability of students and
assisting teachers in effective lesson delivery [2]. The cloud
applications in (SaaS), users can flexibly access their data via
a web browser from a computer system or a laptop in home,
at school or a library or any other convenient and appropriate
place, and achieve rapid and efficient communication, col-
laboration, exchange or share documents, contacts, notes,
audio/video and other data [3]. The e-learning solutions
through cloud computing can be very effective in reducing
the cost of multimedia tools as well as requiring no main-
tenance or update moreover providing high level of security,
privacy and compatibility to the end users [4]. The multi-
media applications which otherwise are expensive to be
procured by colleges and small institutions and hence
depriving students of their use and learning, cloud comput-
ing offers an affordable solutions for such institutions to
subscribe for on demand computing completely appropriate
to the requirements of that institutions and facilitating stu-
dents to utilize services which otherwise won’t be feasible
and possible in normal circumstances due higher cost.
3 Cloud Concept for E-Learning
Cloud computing has been utilized in various sectors and
fields in the recent past and most of the organizations irre-
spective of scale and nature of work have benefitted from the
implementation of cloud computing. On demand computing
resources leveraging the benefits of the organization and at
the same time providing ease of administration, flexibility,
scalability and manageability at an optimal cost. Cloud
computing has been utilized in education sector by many
reputed universities and institutions all over the world.
Cloud computing has been implemented in many higher
education institutions for providing the virtual lab environ-
ments to students of degree and diploma courses [5]. It has
also successfully been utilized by many higher education
establishments for e-learning and e-Resources. Many of the
educational establishments have implemented the learning
management systems on the cloud providing optimum fea-
tures of scalability, redundancy, fault tolerance and load
balancing yielding high performance without literally any
administrative overhead. Cloud services are also being uti-
lized in many higher educational institutions for providing
application services to the students and faculty members.
There are various examples of higher education establish-
ments availing SaaS (Software as a Service) for multimedia
application on pay-as-you-go basis which otherwise are very
expensive for educational establishments to purchase.
Cloud computing has certainly enhanced the capability of
educational institutions for providing e-learning resources
and enhancing e-learning in an educational setup. Cloud
computing has benefitted higher education institutions in the
following manner.
1. IaaS (Infrastructure as a Service) has provided flexibility
to educational establishments to avail a required hard-
ware resources at a considerably much lesser which
otherwise may not be monetarily feasible for the insti-
tution to procure. This has certainly enhanced capabilities
of educational establishments to implement e-learning
projects and services which require high end hardware
devices.
2. PaaS (platform as a Service) has given flexibility in
choosing the appropriate systems software most suitable
and compatible for the organization.
3. SaaS (Software as a Service) has significantly enhanced
the capability of educational establishments to provide
appropriate high-end application software to the students
at a never before price.
All the above factors have enabled higher educational
institutions implementing cloud services to enhance student
experience and provide better learning to students of various
courses.
Use of cloud computing in multimedia is not new, various
educational establishments all over the world are availing
different public cloud services to facilitate students of mul-
timedia with variety of application software for learning
multimedia concepts. As a matter of fact most of multimedia
high-end applications are very costly and could sometimes
be difficult even for many good and profitable higher edu-
cation institutions to procure. Multimedia based cloud is an
excellent idea which leverages maximum services and
facilities to students however at a much lesser affordable
cost, without even requiring high configuration client
82 V. R. Naidu et al.
machines. As the applications are run on the cloud, any
machine which can run a compatible browser should be fine
to access the multimedia cloud services [6].
Cloud concept utilizes audio and video to present a
complex concept in simplified and visual form, which is
further stored on cloud for multiple access simultaneously.
This is meant only for the key concepts, and not for the
entire course materials. But based on the complexity of the
course materials, it can be further extended to entire course.
This can be used as the enhancement technique for providing
easy-to-learn solutions to the students. In another word,
cloud concept for e-learning is very helpful for engaging
students especially in activity based learning environment,
such as flipped classroom.
Few universities around the globe has successfully
implemented this concept in their campus for enhanced
learning experience among faculty and the students. As
shown in Fig. 1, the first stage is to identify the key con-
cepts, for which audio-visual materials is to be developed.
These key concepts could be the complex ideas and for-
mulations, which cannot be explained using traditional
chalk-and-board method. In the next stage, media (learning
resource) is developed, to make these concepts, easy to
understand. Later the entire package of these learning
materials is uploaded on cloud by means of internet.
In order to make the session more engaging and inter-
esting, the developer or faculty has to make sure that these
audio-visual materials should be short and to-the-point.
Ideally it is recommended to have couple of short video
tutorial of 5–10 min duration, instead of having a longer
one. Moreover, it is important to note that implementation of
cloud concept involves some hardware and software
requirements at the campus, and hence it cannot be imple-
mented without the presence of this infrastructure.
Finally, it is important to design the assessments which
better suits such type of classroom. Activity based learning
requires specially designed assessments. These assessments
could be formative or summative in nature. The concepts
should be linked to the assessment tasks which is designed
in interactive platform. Some examples of such interactive
assessment includes, interactive quiz, online shared screen
such as Padlet, interactive videos etc.
4 Proposed Framework for Implementing
Cloud Concept
The cloud concept could be implemented in any educational
institution with a generic framework as suggested in Fig. 2.
Certain hardware and software infrastructure would be a
pre-requisite but it depends on the level of implementation.
The first step in proposed framework is the analysis and
identification of key concepts on which the media based
elements need to be developed in order to facilitate activity
based learning for enhanced teaching and learning experi-
ence. This include identification of such topics or modules
which really need assistance of technology such as
e-learning resources which needs to be accessed even out-
side the campus.
The second step is the actual process of media produc-
tion, which involves development of audio-visual materials.
There are many free and open source tools which can sup-
port such e-learning resource development. Some tools such
as Screencast-o-matic can be used for developing video
tutorials of practical modules which involves usage of
toolsets. Other such free access tool includes VideoPad
video editor, Blender, Alice, Pencil2D etc.
The next stage in this process would be to transfer the
multimedia based services on the cloud. The optimal solu-
tion would be to avail a cloud services from a public cloud
service provider and take an appropriate subscription based
on the requirement of a particular educational establishment.
As the implementation of private cloud would result in huge
investment, most of the educational establishment would
prefer to go for cloud services that are provided by a public
cloud service provider. Moreover the security is not at all
any concern in this case as the student availing the service
would be working on their practical’s and projects related to
multimedia and no confidential information would be shared
Key
concepts
Audio /
Video
(Media)
Internet
Cloud
Concept
for e -
learning
Fig. 1 Basic structure of cloud concept for e-learning
Analysis and
Identification of
Key Concepts
Media Production
(Audio / Video)
Publish on
Cloud
Implementation in
Activity based
teaching
Assessment,
Feedback &
Reflections
Fig. 2 Proposed framework
Cloud Concept for Implementing Multimedia Based Learning …83
on the cloud. The data of multimedia applications in case of
students is always a dummy data that does not belong to any
organization and has no significance as far privacy and
confidentiality is concerned.
Once the media is published on cloud, the access could be
provided to the students by sharing the hyperlink in their
module notes. Students can access these video resources in
the form of Video-on-Demand (VOD) service at their own
convenience and pace. The flexibility of access is the key
factor, which defines the scope and level of implementation.
The e-learning resources must be accessed without any
glitches and to ensure this, the developer must take care of
multiple optimization factors of the media. Appropriate
activities such as interactive quiz, or games could be con-
ducted during the class sessions to access the students’
learning. Interactive video based applications such as Vizia,
allows students to answer quiz even during the video play-
back, based on the part of the video they have watched so
far. Apart from quizzes, it also allows students to cast polls
for some activities such as critical evaluations.
The assessment results and feedback provide a way to
draw recommendations on the practical implementation of
cloud concepts in e-learning which allows the faculty or
developer to further improve the learning resources at the
next level. It also enables the faculty member to identify the
potential areas of improvement in order to provide the best
possible learning resources to the students.
5 Conclusion
Implementation of cloud services in education in general and
multimedia applications in particular is a revolutionary
change which is yet to yield its full potential and benefits.
The cloud implementations specific for education and min-
utely specific for areas in education like multimedia are
going to be very common in next few years. The appropriate
architecture, methodology and framework for implementa-
tion of cloud services in multimedia is the need of the hour
as this area still demands a lot of exploration and research
and certainly the scope of improvement is very vast. Cloud
services can certainly yield vast benefits for multimedia
students by providing them infrastructure, applications and
services through cloud that are relevant to the multimedia
specialization and cannot be easily procured because of high
cost. Many of the students from various higher education
institutions from multimedia specialization are not able
comprehend essential concepts related to multimedia
because of lack of resources and infrastructure, being fair
enough to higher education institutions multimedia appli-
cations are very costly as well. However, students in these
educational establishments are deprived from the learning
because of lack of enough resources and infrastructure.
Implementation of cloud computing services for multimedia
applications can bridge the gap and may result in improved
student experience and learning. This paper is a mere effort
in the direction of facilitating better learning resources for
students of higher education institutions especially from
multimedia specialization.
Acknowledgements Authors extend their sincere thanks to the Man-
agement of Middle East College, Oman, for support. Special thanks to the
management of Vivekananda Global University, Jaipur, India for pro-
viding all possible guidance and support to pursue this research work.
References
1. Zameer, A., Khalfan, D., Vikram, A.: Virtual private network as a
service—A need for discrete cloud architecture. In: IEEE Explore,
Noida (2016)
2. Zeng, Z.: Design of a cloud services platform for a multimedia
teaching environment. In: World Transactions on Engineering and
Technology Education, Guangzhou (2016)
3. Kurelovic, E.K., Rako, S., Tomljanovic, J.: Cloud computing in
education and student’s needs. In: 36th International Convention
on Information & Communication Technology Electronics &
Microelectronics (MIPRO) (2013)
4. Karim, I., Goodwin, D.R.: Using cloud computing in e-learning
systems. Int. J. Adv. Res. Comput. Sci. Technol. (IJARCST)
(2013)
5. Nan, X., He, Y., Guan, L.: Optimal allocation of virtual machines
for cloud-based multimedia applications. In: Multimedia Signal
Processing (MMSP) (2012)
6. Zhu, W., Luo, C., Wang, J., Li, S.: Multimedia cloud computing.
In: IEEE Signal Processing Magazine (2011)
7. Andrina Granic, M.C.: Universal design within the context of
e-learning. In: Conference on Universal access in human-computer
interaction: applications and services, Berlin (2007)
8. AL-Hunaiyyan, A., Al-Huwail, N., Al-Sharhan, S.: Blended
e-learning design: discussion of cultural issues. Int. J. Cyber
Soc. Educ. 1(1), 17–32, (Mar 2008)
9. Gowda, R.S., Suma, V.: A comparative analysis of traditional
education system vs. e-learning. In: International Conference on
Innovative Mechanisms for Industry Applications (ICIMIA),
Bangalore, India (2017)
10. Niharika, M., Sahoo, P.K.: Protecting cloud based multimedia
content using 3-D signatures. Int. J. Adv. Comput. Tech. Appl.
(IJACTA) 4(1), 205–208 (2016)
11. Singh, U., Baheti, P.K.: Role and service of cloud computing for
higher education system. Int. Res. J. Eng. Technol. (IRJET) 4(11),
708–711 (2017)
12. Zameer, A., Singh, B.: Learning Resources as a Service (LraaS),
Noida (2017)
84 V. R. Naidu et al.
Diplomacy in the Internet Age—Challenges
and Opportunities for the UAE
Melissa M. Cyrill and Aftab Kamal Pasha
Abstract
In the United Arab Emirates, internet-based tools have
increasingly shaped recent political, social, economic,
and public interactions. The number of users of social
media platforms alone reflect a highly engaged online
community in the country. The multi-functionality of
internet-enabled platforms hosted on the Web 2.0, which
include blogs, microblogging sites (Twitter), social net-
working sites (Facebook), video hosting sites (YouTube),
and visual media sharing websites (Flickr, Snapchat,
Instagram)—offer a range of options to the government
and state agencies to promote certain narratives, gauge
public opinion, receive real-time feedback, promote
citizen engagement, and shape the interpretation of
events, policies, and goals. At the same time, high levels
of internet penetration expose Emiratis to local, regional,
and international news and communication. With this
background, the proposed paper examines how the internet
has changed communication and, thereby, the contours of
diplomacy, including the challenges and opportunities that
countries like the UAE face in the internet age of
information abundance and real-time sharing. Lastly, the
paper briefly touches upon the regional security and
geopolitical challenges faced by the UAE, namely, the
threat perceived from Iran and Qatar, and the consequent
bolstering of new partnerships.
Keywords
Internet diplomacy Information age Digital com-
munication Public diplomacy Networked society
Geopolitics of the UAE
1 Introduction
Over the course of the past decade, the internet has become a
pervasive part of the daily lives of individuals, business
operations, and interactions between citizens and their gov-
ernments in Arab countries, similar to the rest of the world.
In the Arabian Gulf states, internet penetration rates are the
highest among West Asian nations; by 2014, Qatar (95%),
Bahrain (99%), UAE (96%), and Kuwait (93%) had near
universal access to the internet, while the larger countries of
Oman (80%) and Saudi Arabia (67%) showed widespread
diffusion [1]. Mobile broadband access is also very high in
this region; it reached an average of 120.32% 2015, with the
UAE showing an access rate of 144.20% [2]. Statistics from
the online tracking source, Internet World Stats, noted that
by mid-2011, an estimated 72.5 million Arabs were internet
users; this grew to 250.3 million in early 2017 [3].
This increase in internet penetration has dramatically
altered the scope for mass communication—with the avail-
ability of a multitude of private and public platforms
of communication (from internet-based instant messaging
services to blogging and microblogging websites and
smartphone applications). Transformation of information
communication technologies (ICTs) has implicated all
media, including the traditional domain of television, news,
and radio. These established information and broadcasting
channels now utilise internet-enabled platforms to adapt to
the changing audience consumption patterns and to remain
relevant. Parallel to these developments, website blogs and
citizen-driven news sources have also emerged. These may
have relatively smaller user bases but function as outlets of
alternative information: offering real-time updates (including
first-hand), using different mediums to engage with news
and entertainment (satire), adopting positions different from
what is mainstream or state-endorsed, and providing a range
of perspectives on world and local events.
This has been made possible because of how the internet
in itself has changed in the past ten years. While earlier,
M. M. Cyrill (&)A. K. Pasha
Centre for West Asian Studies, Jawaharlal Nehru University,
New Delhi, India
e-mail: melissacyrill@gmail.com
A. K. Pasha
e-mail: drakpasha@gmail.com
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_12
85
internet-based platforms like social media, video sharing
websites, and instant messaging services primarily fulfilled
social networking needs—connectivity, communication,
socialisation, and entertainment—now these channels serve
as veritable tools of news gathering and publishing, broad-
casting, governance, development, diplomacy, and business.
Control over news and information is, therefore, shifting
away from a few elite sources of provision via the dispersed
ownership of online content creators. And, nowhere was this
more evident than within the Arab world—from Africa to
the Levant to the Gulf kingdoms—during the uprisings from
2011, initially christened in global media as the Arab Spring,
and later, the Arab Winter.
To ensure the themes of this paper are clear, it is neces-
sary to explain how ‘diplomacy’is understood as a function
of sovereign states and as an exercise. Diplomacy, as used
here by the paper’s authors, refers to the practical and
established methods of influencing the decision making
process and behaviour of foreign governments and peoples.
Diplomatic objectives are secured through dialogue, nego-
tiation, and other non-coercive measures. Communication
strategies, thus, lie at the heart of diplomatic reporting and
dialogue. In fact, several definitions underline the synonymy
of diplomacy and communication; Constantinou [4] under-
stands diplomacy as “a regulated process of communica-
tion”, while James [5] calls it “the communication system of
the international society”, and Bjola and Kornprobst [6] talk
about the “communication among internationally recognized
representatives of internationally recognized entities”.
This is why the central premise of the paper is that the
future of diplomacy is intrinsically linked to and shaped by
the future of communication media—in effect, the commu-
nication technologies facilitated by the internet. A corollary
to this argument is that the revolutionary developments in
information communication technologies (ICTs) have both
challenged diplomacy (by virtue of accelerating connectiv-
ity) and created infinite opportunities (via platforms for
innovative outreach). A simple but illustrative example is the
way microblogging or tweeting by diplomats and politicians
shapes public opinion, which is made powerful and perva-
sive by the networked nature of the internet.
Today, internet media enables governments and diplo-
mats to measure public sentiment and track changes in
public sentiment. This in turn feeds into the country’s public
policy and decision making processes. States realise that by
virtue of their ubiquitous user base and connectivity, internet
or online media can effectively stimulate direct two-way
dialogues with citizens, garner them immediate feedback,
allow them to course correct poorly received policies, and
achieve limited referendums. In this way, the internet
enables the process of political communication and influ-
ences its outcomes. It has the capacity to increase partici-
pation in the political system and spread awareness, and the
nature of its networked platforms creates a multiplier effect
—allowing for the transmission of messages on a significant
scale.
These developments tempt us to be techno-optimistic—
having excessive conviction in the liberating and empow-
ering value of new technologies—yet, such expectations
must be tempered. The world of the internet or cyber space is
not an innocent, progressive alternative to the real-world
space; the internet is merely a host to those who use it, and
reflects the perils, curiosity, ambition, prejudices, and aspi-
rations as experienced and asserted by those using it. This
means that while the fundamental reach of the internet can
be a force for positive and constructive change, it can be
equally disruptive or manipulated. This characteristic and
power of the internet directly feeds into the scope and
practice of diplomacy as it confronts new threats and new
goals. For instance, cyber space has now emerged as yet
another frontier, which has created a new category of
diplomatic initiative—that of digital or e-diplomacy.
To better appreciate the impact of the internet on diplo-
macy imperatives in the UAE, this paper will firstly analyse
the state of the internet in the UAE and its application in the
arena of diplomacy and civic engagement, followed by a
brief examination of the internet’s intervention in the con-
duct of diplomacy. With this supporting framework, the
paper will explore the challenges and opportunities for the
UAE in expanding its diplomacy initiatives in a
hyper-connected era, and will make a comment on its pre-
sent geopolitical status.
2 Internet and State-Society Relations
in the UAE
In the UAE, internet-enabled media have empowered locals,
opened up entrepreneurial opportunities, and improved
sociocultural linkages, while also exposing them to surveil-
lance and propaganda, among other things. Users of
internet-based media vocalise their thoughts on a variety of
subjects, and can communicate across a widespread geog-
raphy, irrespective of their gender, religious, or ethnic
identities, away from the immediate pressures of society and
family. This in itself is transformative, given the traditional
identity of the Gulf Arab peoples. Consequently, the Emirati
state and its institutions are keen participants on the internet,
both to promote state narratives and monitor the behaviour
of online publics. In the recent past, this has resulted in
greater citizen engagement and the cultivation of nationalist
pride, on one hand, while also in the crackdown on con-
troversial content or arrest of detractors, on the other.
The ‘Arab Social Media Report 2017’throws some light
on the users of internet-enabled media in the region. Its
findings indicate that the proliferation of ‘social media’and
86 M. M. Cyrill and A. K. Pasha
increase in its users have made these channels the de facto
form of interaction for the masses in the Arab world. This is
a departure from the initial stage of growth where access to
internet platforms were limited to the elite classes [7]. In
terms of access and usage in the UAE, a 2016 social media
survey by The National, an Emirati daily, found that
WhatsApp access had reached about 97%, Facebook usage
was at 89%, followed by YouTube at 73%. At that time, the
least used platforms were Snapchat at 27% and LinkedIn at
16%. Finally, the largest cohort of social media users
belonged to the age group 18–21 [8]. The youth demo-
graphic is a key feature of the Arab world’s internet land-
scape—almost 64% of social media users in the region are
under 30 years of age. In the UAE, the percentage of the
population under the age of 25 stands at 34%. A persistent
concern, however, is the gender distribution of Arab internet
users. Data collected by the Arab Social Media Report 2017,
for example, shows that only one out of three social media
users are female (2010–16) in the Arab world; this drops to
one out of four users in the Arabian Gulf states or 24.6% as
compared to 36% in North Africa [7].
Nevertheless, the overall penetration levels of internet
and social media in the region, and the UAE in particular,
has caused the Emirati government to utilise these domains
to actively engage with their citizens. In 2013, a national
brainstorming session was conducted for the first time,
where citizens and members of Emirati society could reach
out and interact with respective UAE council ministers on
Twitter—they discussed a myriad of public policy matters,
such as healthcare and education. A report was subsequently
released titled: ‘From Majlis to Hashtag Engaging Citizens
through Social Media’[9]. Yet, contradicting the notion that
the UAE is socially engaged online is a short-term study by
Banu Akdenizli on how foreign ministers in the Gulf (UAE,
Bahrain, Qatar, and Saudi Arabia) use Twitter. Her conclu-
sions come from an in-depth analysis of 438 tweets between
October 1, 2016 and December 31, 2016 (this is part of an
ongoing larger study that tracks a total of 16 accounts,
including embassies, foreign ministries over a year-long
period) [10].
Akdenizli states that among the four analysed accounts,
the UAE had the most followers at 3.6 million, followed by
Saudi Arabia with 1.3 million, Bahrain with close to
350,000, and finally Qatar with 25,544. The UAE foreign
minister followed 562 people in October 2016, which
increased to 600 by December, that year. Of all the tweets
analysed by Akdenizli during this time period—39.2%
belonged to Qatar’s foreign minister, 33.7% came from the
minister of UAE, 22.7% from Bahrain, and only 4.3% from
Saudi Arabia. Almost three fourths (74.2%) of the tweets
were original content, 20.6% were retweets, and a mere
5.3% were reply tweets, indicating a lack of interest among
the leaders in using this online tool in an interactive manner.
Only 9% of all the tweets contained a ‘mention’(of another
account on the medium that will improve exposure), and
only 2.2% posted a question to their followers. One fifth
(21.3%) of the tweets contained links—mostly to interna-
tional news websites. Hashtags enhance visibility, as they
can be potentially read by individuals who are not following
the said minister. Almost half of all tweets contained a
hashtag (44.7%), and almost 90% of them were merely
about marking a location [10]. The majority of the tweets
were in Arabic (65.1% in Arabic and 34.9% in English),
which is unsurprising; the introduction of an Arabic interface
resulted in the growth of Twitter’s user base to 6.5 million in
2014 (posting an estimated 10 million tweets a day) [1].
Evidently, the UAE is beginning to see value in culti-
vating its online presence, either through limited engage-
ment on popular social media platforms or in the sharing of
key information online. However, the country’s diplomatic
cohort will most certainly lose out in securing long-term
influence over public opinion if it avoids interactive com-
munication. This becomes even more significant in the case
of shaping foreign public opinion, where the language of
communication is also important.
3 Informational Abundance and New
Threats in the Internet Age
Simplistically put, the internet structurally inverted the
few-to-many architecture of old media, during which time a
small number of people could influence and shape the per-
ceptions and beliefs of societies en masse. In the present day,
the “many-to-many environment”of the internet ensures that
every desktop and smartphone can function like a printing
press, a broadcasting station, and a place of assembly.
Transforming this role of the internet is what technolo-
gists refer to as the Web 2.0, which has enabled the creation
of new tools of media. The Web 2.0 is defined as “the
second stage of development of the Internet, characterized
especially by the change from static web pages to dynamic
or user-generated content and the growth of social media”
[11]. The new social and interactive media channels hosted
on the Web 2.0 contribute to the growth of ‘networked’
relations in the virtual sphere that run parallel to and spill
over into the physical public space.
Analysing this confluence of digital networks and society,
Manuel Castells has spoken of a ‘network society’where
important social structures and activities get organised
around electronically processed information networks [12].
Similarly, Kittilson [13] discusses the capacity of cyberspace
to function as a virtual civil society, and serve as a medium
for civic discourse, articulation, and deliberation.
Inevitably, the extended usage and added functionalities
of internet media affects the scope of their impact in the lives
Diplomacy in the Internet Age—Challenges and Opportunities …87
of peoples, governments, and corporations. Developments in
cyber space shape those in the physical world and vice versa
as social media platforms monitor the pulse of almost all
social, political, cultural, and economic matters—both on a
macro and a micro scale. This makes communication and
interactions online highly vulnerable to manipulation and
perception management. The US Department of Defense
(DOD) defines perception management as “Actions to con-
vey and/or deny selected information and indicators to for-
eign audiences to influence their emotions, motives, and
objective reasoning as well as to intelligence systems and
leaders at all levels to influence official estimates, ultimately
resulting in foreign behaviors and official actions favorable
to the originator’s objectives”[14].
Such far-reaching and behavioural changes activated by
internet use—in the way we work, socialise, network, and
interact with knowledge and information—also fundamen-
tally alters the scope and course of diplomacy. For instance,
the sheer volume of information available that can be shared
at any time, as well as the security of this information
challenge modern day diplomats as they try to stay ahead of
online forces—both commentary and reporting.
Today, the impact of new communication channels is felt
upon the core business of diplomacy, moving it away from
branding and image management to action-oriented dis-
course shaping. This is because what is published on the
internet, anywhere, shapes public opinion, everywhere, as it
gets shared through social media networks. Obar and
Wildman [15]define social media as “computer-mediated
technologies that facilitate the creation and sharing of
information, ideas, career interests and other forms of
expression via virtual communities and networks”.
The pace of innovation and development of stand-alone
and built-in social media services proliferating
internet-enabled devices challenge the scope of definition,
but the authors identify certain common features of social
media: they are Web 2.0 internet-based applications; they
host user-generated content such as text posts or comments
or ‘tweets’, digital photos, audio feed, videos, and other
graphic data; users can create service-specific profiles for the
website or applications that are designed and maintained by
the social media organisation; and they facilitate the devel-
opment of online social networks by connecting a user’s
profile with those of other individuals or groups [15].
Popular social media include blog sites like WordPress
and Medium, microblogging sites like Twitter, video hosting
sites like YouTube, social networking sites like Facebook,
and visual media sharing sites like Instagram, Snapchat, and
Flickr. Content shared through these social media online—
status posts, tweets, memes, satirical productions, or
manipulated reports—can dramatically influence policies,
elections, mainstream public discourse, and political
communication anywhere in the world, regardless of its
origin or authorship.
Thus, on one hand, online media offers tools for social
justice activists (by enabling fast spread of real-time video
and audio content); on the other hand, it is open to abuse by
terrorist outfits and propaganda. Among the most visible
recent examples of the latter are the cyber intrusions and
propaganda during the 2016 American elections by
Russia-based hackers, and the sophisticated ability of ISIS
networkers to attract volunteers, from the world over, to fight
for the ‘caliphate’in their captured territories across Iraq and
Syria.
Out of this level of penetration, influence, and real-time
impact has emerged what is now lexically established as the
era of ‘post truth’and ‘fake news’. In this climate of so much
information all the time, it becomes a matter of national
security as governments increasingly pay attention to what is
being communicated in their countries online and scrutinise
its verity and capacity to incite. Moreover, in this era of
informational abundance, as we spend most of our time on
smartphones, computers, and other technology devices—our
senses are routinely overwhelmed by the scope of informa-
tion available online. This is not to say that the quality of
information available to us is authentic at all times. Trolls,
bots, hacks, post-truths, and misinformation are as much at
the forefront of today’s online vocabulary as is cutting-edge
innovation and breadth of news coverage.
Powers and Hensman [16] of the US Advisory Com-
mission on Public Diplomacy provide clear and simple
definitions for the most common and unsettling forces that
manipulate people and content on the internet, namely,
trolls, bots, and hackers. Trolls can be understood as indi-
viduals who post content or comment on content posted by
others, essentially in order to undermine the latter. Trolls are
known for their strength in numbers—where multiple per-
sonalities post expressly to annoy, demoralise, and hurt their
targets. Bots are used in two main ways—to amplify content
on the internet and to mimic actual human beings online.
For example, on Twitter, one individual may control
several hundred bots, which can automatically retweet the
content of their favoured public personality (for example,
politician or celebrity). This creates the illusion of ‘virality’,
where the popularity of a tweet or hashtag becomes aug-
mented. Bots can respond to specific prompts using artificial
intelligence, for instance, by responding to breaking news;
they can also mimic human traits online and participate in
online conversations. Hackers cause disruption through
information theft or manipulation in order to undermine trust
in and the credibility of individuals, organisations, govern-
ment institutions, or systems [16].
These represent some of the unique yet omnipresent
threats of the internet age—causing insecurity on the very
88 M. M. Cyrill and A. K. Pasha
internet-enabled platforms through which we communicate,
learn, work, and interface with vital institutions. In fact,
these threats depict a shift towards the weaponisation of
information, its host channels, and content creators. It is no
wonder then that politicians and thought leaders have ceased
to pontificate on the emancipatory ways of the internet as a
medium that could unite the world, and foster peace and
prosperity.
Yet, it will be no less ignorant to simply dismiss the
capabilities of the internet; it dissolves barriers to knowledge
and people, and provides access to the thought-processes of
individuals and communities previously considered
un-connected or not part of ‘the conversation’because of
disenfranchisement or discrimination. Finally, ICT devel-
opments in data gathering and computing abilities allow
governments and corporations as well as inventers and
innovators to respond to real-time needs, opinions, emer-
gencies, threats, and opportunities.
4 Diplomacy in the Internet
Age—Challenges and Opportunities
for the UAE
Diplomacy may be understood as a component of a nation’s
soft power—the ability to wield influence without resorting
to coercive means, such as war and violence. Practitioners of
diplomacy or diplomats seek to achieve the goals set by their
government, through strategies and broad tactics that are
prescribed by the foreign policy wing of the government. As
such, foreign policy and diplomacy are not synonymous;
diplomacy is an instrument of a country’s foreign policy.
And, while a country’s foreign policy may employ the use of
intelligence agents, subversive tactics, war or threat of war,
diplomacy necessarily substitutes the use of force in the
course of statecraft.
The primary tools of diplomacy are international and
public dialogue and negotiation; its conduct is entrusted to
the country’s diplomatic corps, which is the body of
non-politically trained and accredited envoys as well as the
country’s political leaders. The foremost objective of
diplomacy is the furtherance of the country’s national
interests. National interest is derived from the country’s
geography, history, economics, and the distribution of its
power capabilities in relation to its neighbours and the
international system. This includes but is not restricted to
safeguarding the country’s sovereignty as well as its terri-
torial, political, and economic security. Diplomacy is,
therefore, a continuous process; it is usually conducted in
confidence, and its achievements are often the subject
material of international relations.
The role and importance of a country’s diplomatic efforts
cannot be overstated enough. Through the course of their
work, diplomats shape the image of their country abroad,
and are key messengers of their government in their inter-
actions with foreign diplomatic agents and governments.
Consequently, the role of the diplomat can be expansive, and
responsibilities range from reporting information collected
on the ground, to serving as emissaries, to convincing
stakeholders at high-table negotiations that the decision or
policy of their home country is what is best for all concerned
parties. Having enunciated the work and broad contours of
what diplomacy seeks to achieve, as well as the dramatic
evolution of internet-enabled and internet-mediated com-
munication technologies in previous sections, the next sec-
tion will focus on understanding how diplomacy is changing
with the transformation of the internet.
In the UAE, recent geopolitical events such as the per-
ceived rise of Iranian influence, the impact of social media
during the regional uprisings from 2011 onwards, and
regional differences with Qatar as well as strategic and
economic ambitions, have come to determine the country’s
diplomatic agenda and agenda-setting process. Below are
highlighted some of the most important consequences of the
ubiquitous role played by the internet on the practice and
policy of diplomacy. The internet has both expanded the
dimensions of diplomacy and introduced new challenges,
ranging from the way it is now practiced to the threats
emanating from cyber insecurity and new methods of con-
ducting propaganda attacks.
4.1 Diplomatic Reporting
In their explanation, Parris and Bryson (2010) have asserted
that “communicating in the right way, in the right voice,
with the right people, in the right order of precedence was
often more important than the objective truth or wisdom of
what you communicated”[17]. While clarity, coherence, and
concise communication remains vital, it is the element of
correctness or truth that is the most challenged for diplomats
in the internet era, yet also the most important—unlike
previous times, due to the transparent accountability facili-
tated by the internet, on one hand, and its obfuscatory
capacity, on the other. The latter is in major part due to the
speed at which information travels in cyber space, and how
easily it can become entangled in value laden accounts.
Diplomats and statesmen are increasingly confronted by
the need to verify sources while also being required to report
on information as it unfolds on the ground; sometimes the
latter is a detriment to the former. Examples of this are more
liberally found among politicians as they cater to an
immediate audience of voters, such as re-posting of fake or
incorrectly presented facts, fringe opinion pieces, or even
satirical accounts. The stakes become high when it comes to
audio or video accounts of unfolding events, such as during
Diplomacy in the Internet Age—Challenges and Opportunities …89
the time of a conflict or emergency when the internet
becomes populated with real-time information on social
media channels.
At another level, the growth of ICTs offers “more per-
sonal and informal channels of communication”[18], which
may allow officials in an embassy to seek confirmation of
facts and opinion from other persons of interest that might
not result in accurate analysis. It can also become a
doubled-edged sword as it may compromise the independent
ability of an embassy to assess local developments.
4.2 Transmission of Government Messages
More important than ever before in the instant communi-
cation era facilitated by the internet is ensuring that foreign
governments receive a logical and consistent position from a
country. In other words, this means that diplomats and
political representatives of a government must speak in a
singular voice, present a reliable version of, say, a decision
taken or development that has unfolded—instead of having
multiple voices speaking multiple versions.
Perhaps the most relevant, and which will probably be
studied in depth in future, is the current Trump presidency in
the United States [19]. Known for his preference for Twitter
communiqués, it is now an oft occurrence that a message
from the American president gets contradicted by the
country’s foreign policy wing (State Department) or
spokespersons of the White House administration or the
Pentagon (Department of Defense).
This has had tremendous implications on countries who
previously considered the United States a natural ally or
looked to the US to provide security and other forms of
support—they can no longer trust America to be reliable.
The changing American position on Qatar, depending on
who was speaking (President, State Department, or the
Pentagon) in the context of the Gulf Cooperation Council
(GCC) blockade of the country is a relevant example.
1
4.3 Shaping Public Narratives
Public diplomacy is probably the biggest beneficiary in the
field of diplomacy in the internet era. Defined without
general consensus, it is an expansive term that simply
translates as people’s diplomacy. It accounts for
government-endorsed efforts aimed at communicating
directly with foreign audiences or the people of other
countries.
Public diplomacy entails a government’sofficial efforts to
shape foreign opinion or cultivate support for the country’s
strategic objectives. The instruments of public diplomacy are
varied, and include statements by key decision making
authorities, targeted campaigns by government organisa-
tions, and efforts to persuade international media to
favourably project official policies to foreign audiences.
Here it needs to be mentioned that there are two main
types of public diplomacy.
The first is ‘branding’or what may be understood as
cultural communication. This is how a government tries to
improve its image without seeking particular support for any
immediate policy objective. States use this type of diplo-
macy to foster a better image of themselves in the world, to
generate goodwill, facilitate cooperation across a variety of
issues, maintain long-term alliance relationships, and
undermine external propaganda. One example would be
Qatar’s successful bid to host the 2022 FIFA World Cup.
The UAE has utilised this category of diplomatic initia-
tive most constructively in recent times. The creation of
‘Brand Dubai’effectively and persuasively showcases the
emirate as a forward looking, open-minded, economically
diverse, and commercially attractive oasis in the often
fraught Arab region. This has generated positive appeal from
around the world, as Dubai is associated with enterprise and
a pioneering spirit, seen as a thriving tourist destination, and
is attractive to corporates, artists, and marketing gurus alike.
Media coverage and advertisement of major landmarks,
such as the Burj Khalifa, Burj Al Arab, or the Palm
Jumeirah, on one hand, and events like Art Dubai, Dubai
Music Week, Dubai Drumming, Dubai Property Show,
Global Village, Dubai Food Festival, and the Dubai Inter-
national Film Festival, on the other, create a dynamic image
of the city, its business environment, and its culture. This
branding then strengthens the UAE’s authority to wield
regional and international influence.
Political advocacy is the second category of public
diplomacy. It is designed to achieve specific and immediate
policy objectives, unlike the long-term perception manage-
ment of ‘branding’strategies. Some recent examples may be
examined to fully grasp this category of diplomatic exercise.
The UAE was quick among the GCC states to ensure that
its public diplomacy measures engaged with its citizens
1
On May 23, 2017, Qatar and the UAE suffered a diplomatic
breakdown when the former complained of a cyber-hack that attributed
false statements to its emir, Sheikh Tamim bin Hamad Al Thani.
Subsequently, in June, a coalition within the GCC, led by Saudi Arabia
and the UAE, imposed an embargo on Qatar—shutting access to air,
land, and sea routes; Qatari diplomats and residents were also expelled
from the blockading states. The states of Saudi Arabia, UAE, Bahrain,
and Kuwait claim that Qatar has maintained unacceptably cordial
relations with Iran, has worked to promote terrorist activity, and has
meddled in the internal affairs of its neighbours. The countries have
asked Qatar to shut down its flagship media channel, Al Jazeera. This
diplomatic impasse remains.
90 M. M. Cyrill and A. K. Pasha
during the aftermath of the neighbourhood uprisings (from
2011 onwards), and successfully maintained the country’s
political stability. Carrying forward the example of the
ongoing GCC crisis with Qatar, political advocacy initiatives
involve UAE diplomats and royal officials convincing for-
eign publics, including those within the GCC, about the
validity of their claims.
More generally, public diplomacy initiatives under this
category attempt to secure the cooperation of leaders of other
countries, and minimise chances of the latter facing a
domestic backlash over unpopular actions. For instance,
after the takeover of Crimea in 2014, a move towards his-
torical validation was made by Russian state media, creating
an alternative perspective that might be accepted by people
in the countries that are seen as its allies.
4.4 E-Diplomacy
The application of internet media to the field of diplomacy
has happened in the domain of public diplomacy as it is the
branch that interacts with societies at large. This channel of
diplomatic interaction is popularly and variously referred to
as e-diplomacy, digital diplomacy, cyber diplomacy, or even
Twitter diplomacy. Further, the expansion of this interface
between diplomats and political figures on one hand, and
foreign and domestic publics on the other, reduces the
insularity of traditional diplomacy.
Use of internet tools like social media transcends the
hierarchy of diplomatic communication, and includes ordi-
nary people in the political process by engaging in direct
(albeit not face-to-face) and sometimes sustained dialogue—
instead of the previous process of unidirectional messages
either through holding events, signing Memoranda of
Understanding (MoU), making speeches, or publishing
articles. Also, by virtue of its interactive operability and its
instant ability to share content, messaging and signalling by
diplomats and political actors on social media are now
exposed to immediate and universal scrutiny.
An array of amusing and bemusing instances become part
of the 24-hour news cycle as such actions or inactions are
labelled political or diplomatic faux pas at best, or dominate
the conversation at worst because it deprives the government
of control over its own policy narrative. This could be a
handshake, a mistaken or awkward or unsuitable gesture, or
statements made in an emotional or excited state, or errors
made during ‘live tweeting’. Once the image is clicked or
post updated or tweet sent, the rapidity of access can spin the
issue out of control. Here again, America’s experiences
under the Trump presidency can prove to be instructive to
those who study and practice public diplomacy via the
internet domain.
4.5 Cyber Security
The rapid expansion of the internet’s user base has left it
more vulnerable to attacks and underhanded forces than ever
before. This includes deliberate strategies such as the use of
trolls and bots—as explained in the previous section, mis-
information campaigns like fake news, online content like
memes and photoshopped images meant to inflame its
audience, and the work of hackers such as the Wikileaks and
the e-mail leaks of high-ranking officials during the US
elections, among others.
All of these present a whole host of threats to today’s
diplomats who necessarily share sensitive information
through online networks, and may inadvertently expose
themselves or their state’s agendas. The accusations hurtled
between the UAE and Qatar in 2017–18 is a useful
case-in-study.
4.6 New Imperatives for Diplomatic Training
Diplomatic corps around the world are now having to be
trained and retrained to function effectively in this
all-information, all-the-time ecosystem of the internet.
Nirupama Rao, India’s foreign secretary from 2009 to 2011,
makes some insightful observations in this regard. She
observes how the diplomat has become naked with his/her
smartphone—exposed at all times, and subject to the over-
sight of whole social media platforms whose subscribers
equal the populations of large-sized countries.
As Rao notes, “The demands of openness and trans-
parency in policy deployment and articulation, real-time
communication, countering fake news and alternative facts
in a post truth world, clarity and conciseness, are all upon
diplomacy”[20]. The Australian security specialist, Rory
Medcalf, further notes, “The job descriptions for hacks,
spooks, diplomats and wonks are becoming less and less
distinct …when a crisis or event breaks across the 24 hour
information cycle, pioneers from each profession find
themselves turning to fast-paced, flexible social media—
Twitter, blogs, Facebook, YouTube—to help make and
project succinct meaning in a world of noise”[20].
Thus, modern day practitioners of diplomacy must not
only possess the ability to communicate clearly, courteously,
concisely, and comprehensively; they need to be trained in
the use of technology and online tools, to keep abreast and
Diplomacy in the Internet Age—Challenges and Opportunities …91
ahead of the news cycle—in order to secure the state’s
control over its agendas.
5 Geopolitical Challenges Facing UAE
Diplomacy—A Brief Examination
The Arabian Gulf states perceived the 1979 Iranian Revo-
lution as having destabilised the regional security architec-
ture. To contain revolutionary Iran, countries in the Arab
Gulf formed the Gulf Cooperation Council (GCC) in 1981,
and supported Iraq in its war with Iran from 1980 to 1988.
While, subsequently, these states tried to normalize ties with
Iran, the 1991 invasion of Kuwait by Iraqi forces perma-
nently changed the security configuration of the region.
In the following decades, the terrorist attack on US soil
on September 11, 2001 acerbated regional tensions to some
degree, although, the 2003 invasion of Iraq by American
forces is what eventually precipitated geopolitical conse-
quences that have since shaken the security mapping and
defence architecture of the region. This is because with the
downfall of President Saddam Hussein in Iraq, the country—
once a powerful international and regional actor—fell into a
political and security vacuum, resulting in fighting between
competing groups from different ethic and sub-religious
communities.
Ultimately, distance and costs of war shaped American
post-war reconstruction efforts in Iraq where the support of a
Shia (and presumably pro-Iranian) candidate as president of
Iraq shook the strategic calculus of Sunni Arab kingdoms in
the GCC, namely, Saudi Arabia, UAE, Bahrain, Kuwait,
Qatar, and Oman. This is because some of these Arab Gulf
states anticipated an increase in Iranian influence in Iraq,
alongside its efforts in Syria, its support of the Shia militia
group Hezbollah, Hamas in Palestine, and Shias in Bahrain
and elsewhere in the region.
The Arab uprisings of 2011 further stoked anxiety in the
GCC kingdoms, which have been known for their political
stability and relative economic security and wealth. In the
aftermath of the uprisings, Iran’s participation in Iraq and
intervention into Syria through the Hezbollah militia, as well
as the rise (although short lived) of the Muslim Brotherhood
and President Morsi in Egypt, caused the GCC states to
bolster their security diplomacy. A Shia crescent was added
into the region’s geopolitical lexicon (by the Jordanian King
Abdullah), based on threat perceptions of Iran’s political
ambitions; a fear invoked due to Iran’s constant appeal for
regional prominence (as communicated by its previous
President Ahmadinejad as well as its Ayatollah), and despite
the Western sanctions imposed on it due to its nuclear
program.
Iran still continues to be considered a formidable threat;
particularly since the diplomatic opening overseen by the
previous US President, Barack Obama. In the context of the
UAE, Iran has refused to meet the Emirates’demand to
vacate its three islands, which it forcibly occupied in 1971
when the British colonial forces withdrew from the Gulf
region. Although Dubai has considerable commercial ties
with Iran due to Western sanctions on Tehran—the death of
King Abdullah of Saudi Arabia and succession of King
Salman and influence wielded by his son, Crown Prince
Mohammad bin Salman, as well as the backdrop of the Arab
uprisings, emergence of ISIS in Iraq and Syria, and growing
religious extremism in the region—has changed diplomatic
and foreign policy objectives for the UAE.
Increasingly, and more publicly, the Emirate of Abu
Dhabi and Saudi Arabia seek to fill the region’s leadership
vacuum, more so in the context of America’s strategic retreat
from the region under erstwhile President Obama. After the
visit of the new US President Donald Trump to Saudi Arabia
in May 2017, the UAE retook the initiative, and with Saudi
Arabia, launched an activist foreign policy that resulted in
two situations of recent note. First, it joined Saudi Arabia’s
intervention on behalf of the Yemeni regime in Sana’ato
fight Houthi rebels and the armed forces swearing allegiance
to the ousted President Saleh. Second, it engineered the
diplomatic alienation of Qatar over the country’s perceived
support of enemy actors such as the Muslim Brotherhood
and Iran. This led to somewhat closer ties with President
Trump’s USA. Nevertheless, the challenge facing the con-
duct of diplomacy by any state in the region is to keep apace
of the multiple and parallel role of external and non-state
forces and their influence.
Currently, the UAE enjoys stable and thriving relation-
ships with the EU and India. The UAE remains focused on
building its strategic depth, fostering ties with security allies
like Saudi Arabia and Egypt, and establishing a diversified
and technologically advanced economy—all of which have
reshaped its international and bilateral relationships. It
appears that the UAE’s political and strategic position is
much better under the new circumstances.
6 Conclusion
The transformative changes to the internet and its enabled
technologies present an array of threats and opportunities for
the field of diplomacy. This is also the case with the UAE,
where, in addition to the general impact of the internet
ecosystem on diplomacy, it confronts geopolitical challenges
as well. These political and security threats can adopt
internet-based tools to further test Emirati diplomatic
imperatives, such as through external media propaganda
shared online. Nevertheless, the developments in ICT will
not move backwards, and diplomats in today’s corps need to
be trained or retrained in the use of internet-enabled
92 M. M. Cyrill and A. K. Pasha
technologies to minimise their exposure to various online
threats, such as fake news, hacking attacks, unaccounted
facts, and extremist views masquerading as legitimate
opinions. Finally, geopolitics is always in a state of flux, and
the Arab world is unfortunately a tragic entanglement of
states as well as non-state actors at odds with each other.
The UAE, with its striving towards a progressive national
character and being an oasis of calm, will need to adopt
sophisticated diplomatic techniques, such as online civic
engagement to ensure that its public image stays true to the
narrative intended by its government.
References
1. Gunter, B., Elareshi, M.: The significance of social media in the
Arab world. In: Gunter, B., Elareshi, M., Al-Jaber, K. (eds.) Social
Media in the Arab World Communication and Public Opinion in
the Gulf States, p. 7. I.B. Tauris, London (2016)
2. Schryer, M.: GCC mobile markets. TechPolis Res. Note 7,2–7
(2015)
3. Internet World Stats: Usage and Population Statistics, http://www.
internetworldstats.com/emarketing.htm, Last accessed 20 Mar 2017
4. Constantinou, C.M.: On the Way to Diplomacy, 1st edn.
University of Minnesota Press, Minneapolis (1996)
5. James, A.: Diplomacy and international society. Int. Relat. 6(6),
931–948 (1980)
6. Bjola, C., Kornprobst, M.: Understanding International Diplo-
macy: Theory, Practice and Ethics. Routledge, London (2013)
7. Salem, F.: The Arab social media report 2017. MBR School of
Government, Vol. 7, Dubai (2017)
8. The National: http://www.thenational.ae/uae/technology/uae-youth-
addicted-to-social-media—graphic, Last accessed 20 Mar 2017
9. UAE Ministry of Cabinet Affairs: http://www.mbrsg.ae/
getattachment/0162a279-89b3-466b-bf1d-c9544b68fc3d/From-Majlis-
to-Hashtag-The-UAE-National-Brainstorm.aspx, Last accessed 20
Mar 2017
10. Akdenizli, B.: A snapshot of how foreign ministers in the gulf use
twitter. USC Center on Public Diplomacy Blog (2017), https://
uscpublicdiplomacy.org/blog/snapshot-how-foreign-ministers-gulf-
use-twitter, Last accessed 29 May 2017
11. Introduction to web 2.0 technologies: http://www.ictliteracy.info/
rf.pdf/Web2.0_Introduction.pdf, Last accessed 23 May 2017
12. Castells, M.: Networks of Outrage and Hope Social Movements in
the Internet Age, 1st edn. Polity Press, Massachusetts (2015)
13. Kittilson, M.C., Dalton, R.J.: The Internet and virtual civil society:
the new frontier of social capital, http://escholarship.org/uc/item/
2cj1c67k, Last accessed 2017/8/2
14. Siegel, P.C.: Perception management: IO’s stepchild. In: Armis-
tead, L. (ed.) Information Warfare: Separating Hype From Reality,
p. 28, 1st edn. Potomac Books, Inc, Nebraska (2007)
15. Obar, J.A., Wildman, S.: Social media definition and the
governance challenge: an introduction to the special issue.
Telecommun. Policy 39(9), 745–750 (2015)
16. Powers, S., Hensman, C.: Can public diplomacy survive the
internet? USC Center on Public Diplomacy Blog (2017), http://
uscpublicdiplomacy.org/blog/can-public-diplomacy-survive-internet,
Last accessed 22 Aug 2017
17. Parris, M., Bryson, A.: Parting Shots, 1st edn. Penguin, London
(2010)
18. Smith, R.F.: The Craft of Political Analysis for Diplomats, 1st edn.
Potomac Books, Dulles, VA (2011)
19. Allcott, H., Gentzkow, M.: Social media and fake news in the 2016
election. J. Econ. Perspect. 31(2), 211–236 (2017)
20. The Wire: https://thewire.in/158962/foreign-relations-diplomacy-
social-media/, Last accessed 19 July 2017
Diplomacy in the Internet Age—Challenges and Opportunities …93
Enterprise Product Management
in the Digital World
Zornitsa Nikolova and Roumiana Antonova
Abstract
In the digital era, businesses in any industry are being
transformed fundamentally to stay competitive. Innova-
tion is increasingly shaped by changes in technology,
development methodologies, and the ways in which
consumers make purchase decisions, demanding changes
throughout the entire lifecycle of a digital product. The
lifecycle of digital products becomes more and more
complex with the need to embrace new business models
for creative businesses, including the increasing role of
business networks and collaboration to offer related
products and services. Product management in the digital
world is thus transformed to include data-driven decision
making, collaborative ownership, incremental thinking,
and continuous learning.
Keywords
Strategic management Innovation Intrapreneurship
Creative business Enterprise product management
1 Introduction
This paper discusses the impact of the digital transformation
on enterprise product management, particularly in product
companies that adopt digitalization to transform their busi-
ness models, or are offering products that help other com-
panies in their digital transformation journey. In this process,
innovation is increasingly shaped by changes in technology,
development methodologies, and the ways in which con-
sumers make purchase decisions, demanding changes
throughout the entire lifecycle of a digital product from its
conception, through creating product vision, strategy, road-
map, implementation plan, to its pricing, positioning and
ongoing innovation. The lifecycle of digital products
becomes more and more complex with the need to embrace
new business models for creative businesses, including the
increasing role of business networks and collaboration to
offer related products and services.
Yet, enterprises that have been on the market for years
seem to be managing their products using traditional para-
digms, which have worked previously but are not suited to
serve companies in their way forward. The questions that are
discussed in this paper are:
1. What are the changing requirements of the digital world
to product management in enterprises?
2. What are the methods, tools and frameworks that need to
be put in place in enterprises to enable the intrapreneurial
development of successful products for the digital era?
2 Digital Transformation and Implications
on Product Management
The term “digital transformation”has become widely used,
yet to understand the impact that it has on every aspect of the
organizations operations, we need to look at its definition.
A good definition is provided by IMD:
“Digital Business Transformation is Organizational
Change through the use of Digital Technologies and Busi-
ness Models to Improve Performance”[1].
This definition implies that the transformation enabling
business to use technology for achieving better results is also
related to profound changes of processes and business
models changes that require also building different mindsets
and behaviors in the people who work for the organization.
It is a transformation happening in the context of high
dynamics on the market and in the technological sphere,
Z. Nikolova (&)
Leanify Ltd., Sofia, Bulgaria
e-mail: zornitsa.nikolova@leanify.com
R. Antonova
Faculty of Mathematics and Informatics, Sofia University, Sofia,
Bulgaria
e-mail: dr.Antonova@t-online.de
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_13
95
which imposes the need for high-speed innovation and
delivery. Furthermore, the change of business models affects
how products and services are defined and managed
throughout their entire lifecycle, and this is an implication
that we are discussing next.
2.1 Rethinking the Product Lifecycle Model
for Digital Products
A traditional product lifecycle model, as described in
research literature comes from a product sales perspective
and reflects the life of the product in the marketplace (see
Fig. 1). It starts at the point when the product is first intro-
duced to the marketplace as a complete product offering, and
goes through a phase of market growth until it reaches its
peak at the product maturity level.
In this model, product development is not considered part
of the product (sales) lifecycle. However, in this paper, we
argue that it is a rather reactive model serving only partially
to the concept of product management, as it addresses
mostly launch and post-launch activities in a more or less
traditional business model for digital products. We believe
that a technology product that may be delivered as a com-
ponent of different business models, such as on-demand
offering, or as part of a full-service delivery, actually starts
its life much earlier. This is further emphasized as the pro-
duct development discipline evolves to include customer
co-creation paradigms, where customers are exposed to the
product in its early stages, and actively participate in its
creation.
Furthermore, the lifecycle of a product may not follow a
linear flow, as the product might be enhanced or offered
through a changed business model later in its lifecycle,
which may actually change the line of its lifecycle devel-
opment. A proactive model requires that we discuss the
product lifecycle from a broader perspective starting with the
product discovery phase, which requires identification of
opportunities, and shaping the product as a solution to a
discovered problem. We also need to reflect the opportuni-
ties that technology and new business models provide for
extending the maturity line and opportunities on the market
for this product. Hence, a redefined product lifecycle concept
looks as depicted in Fig. 2.
Through an extended product lifecycle model the goal is
to extend the period of the product lifecycle, during which
the product actually generates value (by introducing it as
early as possible, already in the development phase, and by
extending the maturity phase with sustaining innovation, as
defined by [2]), and optimize investment during the product
lifecycle, so that return on investment is maximized, and the
enterprise can free up resources for subsequent innovation.
2.2 Implications for Product Management
in Enterprises
Product management is a discipline that is not very strictly
described and understood. As we are talking about digital
products, we would like to leverage the framework defined
for software product management by the International
Software Product Management Association (ISPMA) [3]—
see Fig. 3.
The ISPMA product management framework describes
the key areas where product managers operate and take
decisions—these are partially strategic management (mostly
for market analysis and product analysis), product strategy
and product planning. The other activities required for a
successful product development, marketing, sales and dis-
tribution, service and support, the product manager is an
orchestrator, a central figure that directs and aligns all
stakeholders in the process. Defined like this, the product
manager shall take on mostly strategic decisions, while
navigating and supporting operational activities.
A recent survey conducted by [4] however, shows that in
more than 50% of the cases product managers are primarily
tactical players, rarely engaged in real strategic decisions.
The extended product lifecycle model that we discussed
Fig. 1 Traditional product lifecycle model Fig. 2 Extended product lifecycle
96 Z. Nikolova and R. Antonova
above, creates a few implications on how the product manager
shall engage and navigate the product lifecycle particularly, it
puts a lot more focus on the product discovery and develop-
ment phase, which is now part of the value generation curve as
well, combined with a change of major decision-making
paradigms used to manage product lifecycle.
While traditionally, investment decisions have been made
based on forecasts about market realization and engineering
cost, and a go decision typically results in a development
project, during which the organization is focused to produce
the product without caring to check or challenge the previ-
ously made forecasts, extending the lifecycle means being
able to check and adapt assumptions and forecasts much
earlier, before major investments have been made. These
approaches transform the subsequent product development
steps from a linear into an iterative model, which requires a
change in how the lifecycle is being managed. Furthermore,
they put more focus on the strategic role played by the
product manager from the very start of the product lifecycle.
In addition, the possibilities to extend the product life-
cycle through maturity define a longer engagement for the
Product Manager in sustaining innovation activities. Being
often referred to as mini-CEO [5], the Product Manager
becomes a true owner and long-term strategic thinker when
it comes to taking the maximum out of the product.
Product management in the digital world is thus trans-
formed from a plan-driven, carefully organized process to an
experiment and learning-driven, iterative work, which
requires a change in organizational culture and mindset to
enable collaborative ownership, incremental thinking, and
continuous learning. Such a culture is characterized by:
•Data-driven decision making empowered by technolog-
ical advancements, such as big data, machine learning,
and artificial intelligence
•Customer proximity and ongoing stakeholder collabora-
tion, as well as early participation of technology experts
in strategic-level initiatives
•Rapid innovation through iterative road mapping, plan-
ning, and development based on feedback loops, com-
bined with end-to-end orchestration of product-related
activities throughout the entire product lifecycle.
Fig. 3 ISPMA product management framework
Enterprise Product Management in the Digital World 97
2.3 Data-Driven Decision Making
Enterprises are in the favorite position of having a lot of
customer data already gathered, and also having the
resources to enable gathering even more targeted data.
According to an MIT research [6] however, companies lack
the capabilities and skills to use big data for their purposes.
At the same time, [7] has published a number of case studies
that show the opportunities with respect to using data to
enhance opportunities for business.
In a product management context, such opportunities can
transform into identifying now unmet needs of existing
customer base, and addressing them with new products, or
adding more value streams to existing business models. For
example, the business model for a platform solution might
be extended with additional product assets, such as content
delivered as a separate add-on based on analysis of the use
cases of existing customers with the help of collected and
analyzed usage data. Alternatively, an extension of the
business model might involve collaborating with third-party
vendors to create ecosystems and thus more attractive value
proposition.
2.4 Collaboration
The increased focus on achieving market fit as early as
possible further stresses upon the role of the PM as an
orchestrator of various product-related activities, and pushes
towards early inclusion of different stakeholders into the
product lifecycle activities to prevent unnecessary iterations,
increase information at any point, and minimize wasted
effort. This means that roles such as development or mar-
keting, that are typically engaged much later in the process,
in the new setup will need to get involved early and provide
their knowhow to design and run meaningful experiments.
For example, including marketing and sales experts in pro-
duct discovery activities, including market and competitive
product analysis brings additional perspective that is valu-
able for creating a viable and desirable product offerings.
These stakeholders can provide valuable input and feedback
during product development phase, and also bring important
insights from the market in subsequent product innovations.
2.5 Iterative Work
Adopting the mentality of fast experimentation aimed at
getting the product on the positive sales curve as early as
possible, easily excludes the idea of plan-driven product
activities in any part of its lifecycle. Product discovery is a
naturally iterative work, as it requires that a lot of experi-
ments are planned, executed, and run in short periods of
time. Incremental thinking needs to be kept in subsequent
phases though, as it enables transparency into the value
buildup to the point when the product is marketable and can
start delivering value. A plan-driven approach here means
locking this opportunity into a relatively long and linear
product development process, which is counterproductive to
the goal of minimizing time-to-market and kicking off value
generation. When applied to the overall way of planning and
managing the product lifecycle, iterative work means setting
a long-term vision for the value that the product shall create,
and working towards this vision with a series of shorter-term
operational goals defined in an iteratively developed and
re-assessed product roadmap, which focuses on specific
desired outcomes and metrics to assess success rather than a
plan for specific features to be implemented in the product.
3 Methods, Tools and Frameworks
Methodologies, such as Agile software development, Lean
Startup, and Design thinking are already largely familiar and
applied in a number of companies, including large enter-
prises. Their application however is often localized to
specific departments and specific phases of the product
lifecycle. For example, Agile methods are being used in the
product execution phase to speed up delivery, while design
thinking and lean startup concepts are applied in the initial
phases of product discovery, and might be done by separate
“innovation”departments. Thus inn ovation creation and
product management remain separated as the product dis-
covery phase is separated from the rest of the lifecycle
(creative as opposed to execution phases). These applica-
tions focus mostly on the project management aspect while
product management implications remain partially addressed
and understood. In this paper, we look at the potential that
these methodologies bring to product management from the
perspective of the entire product lifecycle and the required
orchestration by product management. A holistic approach,
incorporating product conception phase into the overall
product lifecycle, and taking advantage of development
methodologies supported by technological advancements
such as big data, will reshape the product management role
into a more entrepreneurial and strategic paradigm, consis-
tently integrating execution into an iterative model of pro-
duct development and launch.
The concepts that we discuss in this paper, applied sys-
tematically and consistently throughout the product lifecycle,
support the needs of product managers for a learning-driven
process. They are based on collaboration and inclusion of all
major stake-holders in the process—hence, the role of the pro
duct manager as a driver and an orchestrator of different
activities is additionally strengthened.
Let’s look at the separate concepts briefly.
98 Z. Nikolova and R. Antonova
3.1 Lean Startup
Lean Startup [8] is a methodology that has evolved around
the specific management needs of starting businesses. It
builds on 5 key principles:
1. Entrepreneurs are everywhere
2. Entrepreneurship is management
3. Validated learning
4. Innovation accounting
5. Build-measure-learn
The build-measure-learn loop (Fig. 4) is related to the
concept of Minimal Viable Product (MVP)—a minimal
subset of the product and its features needed to run a specific
experiment and collect data, so that we can proceed to the
next step of learning.
A publication from 2014 [9] presents a review of com-
panies that apply Lean Startup methods and suggests as key
benefits the formation of entrepreneurial culture within the
enterprise, as well as the creation of products customers
love.
Lean Startup is mostly associated with disruptive innova-
tion and completely new products. Hence, its application in the
product discovery phase is essential to support the organiza-
tion into identifying products that are worth investing in.
Many traditional organizations face the challenge of finding
truly innovative ideas while filtering out projects that do not
satisfy the innovation criteria for viability, desirability, and
feasibility. Lean Startup is a model that addresses these chal-
lenges. In companies applying these principles, product
managers work with their teams early on to analyze the mar-
ket, and start experimenting with it to find a problem/solution
fit, and later a market fit as well. In some organizations, this is
done in specific innovation teams that work on ideas and then
hand over for delivery to other departments.
This approach works when we are talking about new
products. However, we consider Lean Startup a necessary
philosophy for any product development, even in established
markets and domains as a way to focus product managers on
optimizing return on investment throughout the entire life-
cycle of the product. Applying a validated learning mecha-
nism through the already established channels of the
enterprise can benefit the sustaining innovation of existing
products, so that better investment decisions are made. One
example of such application is a product, which has reached
a plateau of sales. The product manager uses data collected
through the existing customer base to identify major use
cases and identify major investment opportunities for the
next releases. An MVP is then created for the new capa-
bilities that are planned for the product, and further experi-
ments are run to collect data from the customers and make
decisions as to which are the next features with expected
significant return on investment that shall go into the
roadmap. This requires that product managers in the orga-
nization are familiar with the approach and have access to
the data they need to run experiments and take decisions.
The Lean Startup movement has spurred the creation of a
series of tools and practices that can find their way into how
enterprise products are being created and extended. The
Lean Canvas [10] is an instrument that can be used for initial
mapping of product-related ideas, but it is also a helpful
instrument when it comes to extending features and devel-
oping the product further along its maturity line. The canvas
is also a valuable tool for identifying potential business
model changes that can impact the product lifecycle as well,
such as offering additional services or product supplements
through a business network. One example is identifying
business content as part of the value proposition of an
already existing enterprise business system, and finding
partners in the ecosystem who can provide such content.
3.2 Design Thinking
Design thinking is a process for creative problem solving. In
the context of product management, it is an instrument that
combines very well with the Lean Startup and Agile para-
digms and provides a structured approach to examining the
problem domain and providing tested solutions—that is, it is
an excellent approach that can be applied when looking for
solution and market fit.
The process goes through five steps (Fig. 5), and we can
iterate between any two steps as long as we have identified
Fig. 4 Lean startup cycle
Enterprise Product Management in the Digital World 99
the need to go back and change our starting point. This is
done until the problem is well-defined in a Point of View
(POV), and a prototype is successfully tested with the target
potential users. Design Thinking uses a toolbox that supports
the development of empathy and shared understanding in the
team about the problems being solved and the added value
provided with the solutions, such as personas, customer
journey maps, storyboards, and so on.
As with Lean Startup, Design Thinking is primarily used
in the initial phase of product discovery. However, it can be
applied at a later stage too for examining specific problems
that the product needs to address with its subsequent inno-
vation. For example, a decision about investing into a mobile
application or a desktop application for a specific function of
an enterprise product requires good understanding of the
need and potential users. This is a good use case for applying
design thinking, and it may come at a relatively late stage
from the product lifecycle, for example when considering
sustaining innovations that can keep the product competitive
on the market, thus extending its maturity phase. Further-
more, the artefacts created as part of the design thinking
process, such as customer personas or journey maps, are
valuable instruments for addressing sustaining innovation
through enriching customer experiences and extending value
propositions. Both Lean Startup and Design Thinking are
concepts that focus product managers on fast learning
through experimentation and testing.
3.3 Agile Methodologies (Scrum)
Complementing knowledge of Lean Startup and Design
Thinking concepts with understanding of Agile processes
creates a framework for execution of the product manage-
ment functions in an iterative way. Scrum is a framework for
complex project execution. It defines 3 roles, a few rules,
and a simplified process model, which can be applied to any
type of activities that require team work in a dynamic
environment. It is based on iterative incremental approach,
which facilitates the process of designing and running
experiments, and building up a validated product [11].
Using Scrum as a methodology for governing the product
development phase is already a standard. According to
recent surveys conducted by Version 1, the majority of
surveyed companies apply Scrum or a modification of
Scrum for product delivery.
Scrum however, does not explicitly cover the point of
product discovery, and therefore needs to be combined with
the previously discussed methods, so that we can cover the
end-to-end product lifecycle. The product discovery work,
based on the principles of Lean Startup and following the
Design Thinking process, can however be organized and
executed according to Scrum rules. For example, experi-
ments related to identified product risks can be planned and
run in weekly iterations [12]. Subsequent product manage-
ment work on clarifying detailed requirements and preparing
them for execution can also run in iterative mode.
Work in iterations with frequent feedback cycles enables
product managers to transform their work completely and be
much more flexible with respect to changes in the market. It
enables inspection and adaption for all major artifacts related
to the product lifecycle—roadmap, backlog, marketing and
sales material. An iterative approach to road mapping is
described by [13] with the Goal-Oriented (GO) roadmap
framework. It integrates the principles of validated,
metrics-based learning from the Lean Startup model with the
idea of iterative development from Agile, to define a new
road mapping model based on setting product goals, rather
than specifying features.
This leaves space for experimentation and adaptation
according to results, and leads to products that are designed
to respond to identified needs and achieve the market targets
set by the organization. Product backlogs are filled and
prioritized according to these goals and the learning done in
each iteration. Last but not least, marketing and sales
Fig. 5 Design thinking process
100 Z. Nikolova and R. Antonova
activities and materials can be iteratively designed based on
iterative product roadmaps to achieve better results as well.
With marketing and sales stakeholders involved in the pro-
cess as early as product discovery and development, learning
for them happens also throughout the entire lifecycle,
bringing marketing and sales much closer to product man-
agement and aligning communication across the
organization.
3.4 Putting Tools Together
The tools and methods discussed above have evolved around
specific needs discovered with respect to creating and
managing products but they are mostly seen as product
development tools. Looking from the perspective of the
extended product lifecycle and the Product Management
needs thereby, those tools can be applied throughout the
entire lifecycle and support the creation of culture that
empowers experiments, learning, and value discovery at any
point of the product manager’s journey. Figure 6outlines
the potential for such applications.
3.5 Examples of Application
Examples of how these concepts are applied can be found in
large enterprises such as SAP. The company has been using
Agile methods to manage its development processes for
more than 7 years, and in the past years has complemented
its toolset by applying design thinking in the product dis-
covery phase, as well as throughout the process of creating
its products. These are also complemented by Lean Startup
concepts to create a build-measure-learn cycle [14]. Design
thinking combined with Lean and Agile principles lies
behind the evolution of the latest SAP products, innovating
core ERP offerings and delivering more value to new and
existing SAP customers [15].
The author of this paper has several personal examples of
applying these concepts in a large enterprise. One of them
comes from a product that was assessed as reaching the
decline phase and being considered for sunsetting. Road-
maps were being developed for replacing it by a third-party
solution. While testing the direction with current product
users, product management received a very negative reac-
tion, and considered a different approach. Using the tools
provided by Lean Startup, namely Lean Canvas, the product
was reassessed against its major target users and the prob-
lems that were being solved. New opportunities were spotted
for extending the solution with new mobile capabilities, so
that it becomes competitive and can generate additional
revenue. These opportunities were further developed and
assessed through a series of experiments, using Design
Thinking approaches to refine personas and come to a
desirable, viable, and feasible product offering. The experi-
ments were based on data collected previously from the
current users, as well as additional data, collected in testing
with new potential users of the product. As a result, an add
on was created, which triggered new revenue streams and
effectively extended the legacy product lifecycle while
adding value to the organization as a whole.
A similar example from a different domain involved
rediscovering the needs of current customers and providing a
new generation of an already existing solution that is better
targeted to support clients into their changing business
environment. Applying design thinking as a starting point to
understand the target customer domain, and identify per-
sonas and their specific needs, the team working on the
product managed to establish a point of view that helped in
designing a first beta version of the product. It was then
tested with a selected group of customers, so that the team
can measure the prototype against specific criteria for suc-
cess. The beta version, as well as subsequent development of
the product was executed in iterative Agile mode, so that
frequent deliveries can be ensured and constant feedback can
be collected. As a result, first customers were recruited
already during the development phase, and implementation
project started immediately after the MVP was released.
4 Conclusion
We believe that enterprise product management in the digital
world is faced with different requirements that stem from a
product lifecycle, which is extended and develops itera-
tively. With respect to the main questions that we set in the
beginning of the paper:
1. What are the changing requirements of the digital world
to product management in enterprises?
Fig. 6 Tools and methods
Enterprise Product Management in the Digital World 101
Product management in the digital world is transformed
from a plan-driven, carefully organized process to an
experiment and learning-driven, iterative work, based on
data-driven decision making, customer and stakeholder
collaboration, iterative and incremental development with
quick feedback loops. Product managers need to be engaged
more with strategic decisions based on experimentation and
learning throughout the entire product lifecycle.
2. What are the methods, tools and frameworks that need to
be put in place in enterprises to enable the intrapreneurial
development of successful products for the digital era?
Product management in enterprises can leverage a set of
methodologies that have emerged to serve the needs for
innovation and customer-driven development, such as Lean
Startup, Design Thinking, and Agile methodologies. They
need to be applied systematically throughout the entire life-
cycle to enable a learning-driven iterative process and opti-
mize investment decisions at any point in the product lifecycle.
References
1. Wade, M.: Digital Business Transformation. A Conceptual Frame-
work. IMD website, http://www.imd.org (June 2015)
2. Christensen, C.: The Innovator’s Dilemma: When New Technolo-
gies Cause Great Firms to Fail (Management of Innovation and
Change). Harvard Business Review Press, Boston (2000)
3. ISPMA: www.ispma.org (2017). Last accessed 11 Sept 2017
4. 280 Group Website. https://280group.com/landing-pages/signup/.
Last accessed 20 Aug 2017
5. Gnanasambandam, G., Harrysson, M., Srivastava, S., Wu, Y.:
Product Managers for the Digital World. McKinsey Website.
http://www.mckinsey.com/industries/high-tech/our-insights/
product-managers-for-the-digital-world (May 2017)
6. LaValle, S., Lesser, E., Shockley, R., Hopkins M.S.,
Kruschwitz N.: Big Data, Analytics and the Path From Insights
to Value. MIT Sloan Management Review, Winter 2011
7. Gourevitch, A., Faeste, L., Baltassis, E., Marx, J.: Data-Driven
Transformation: Accelerate at Scale Now. BCG Website. https://
www.bcg.com/publications/2017/digital-transformation-
transformation-data-driven-transformation.aspx (May 2017)
8. Ries, E.: The Lean Startup: How Today’s Entrepreneurs Use
Continuous Innovation to Create Radically Successful Businesses,
1st edn. Crown Business, New York (2011)
9. Gaffney, S., Lin, S., Miller, K., Nilsson, H., Ravala, S., Unnikr-
ishnan, M.: Lean Startup Methodology for Enterprises: How
Established Companies Can Leverage Lean Startup Methodology
for Sustaining and Disruptive Innovation. Engineering Leadership
Professional Program, UC Berkley (2014)
10. Maurya, A.: Running Lean: Iterate from Plan A to a Plan That
Works, 2nd edn. O’Reilly, CA (2012)
11. Scrum Guide Website. http://www.scrumguides.org/. Last
accessed 29 Aug 2017
12. Knapp, J., Zeratsky, J., Kowitz, B.: Sprint: How to Solve Big
Problems and Test New Ideas in Just Five Days. Simon & Schuster
(2016)
13. Pichler, R.: Strategize: Product Strategy and Product Roadmap
Practices for the Digital Age. Pichler Consulting (2016)
14. Reynard, R.: Medium.com, https://medium.com/sap-tools/
continuous-design-thinking-9a7c2530f6e0. Last accessed 22 Oct
2017
15. O’Donnell, J.: TechTarget.com, http://searchsap.techtarget.com/
feature/SAPs-Sam-Yen-on-how-the-design-thinking-process-
drives-innovation. Last accessed 23 Aug 2017
102 Z. Nikolova and R. Antonova
ERP Security, Audit and Process
Improvement
Roumiana Antonova and Georgi Georgiev
Abstract
The ERP systems have rapidly increasing role for the
success of modern business. They are subject of rapid
development process and rapidly spreading with increas-
ing rate. In now days the typical ERP system has a much
better functionalities than its predecessors and also relays
on complex it infrastructure, frequently combining a wide
set of IT technologies. Security of the ERP system is an
important aspect of the entire system and must be
properly maintained in order to achieve reliable and
secure operation of the entire system. The security of an
ERP system should not be regarded as a summary of the
security of its components, but as a complex ecosystem
comprised of multiple different layers, which also have a
complex dependencies and relations between each other.
There are also the processes of user identity and rights
management that are a considered as an integral part of
the overall security. Once configured, the security of the
ERP systems could not be regarded as constant but
evolves along with the challenges caused by increased
numbers, severity and complexity of security threats
present into the digital world. In order to mitigate the
effects of such threats the security ecosystem of an ERP
solution and its components should be a subject of regular
audit and reviews to be able to be maintained at sufficient
level.
Keywords
ERP system Security Multilayer Policy
Deployments User rights Identity management
1 Introduction
The dynamics of modern business causes the need for vir-
tually every company, regardless of its size and business
area to use a variety of ERP systems. The successful
implementation and operation of the ERP system nowadays
become a critical factor for fail or success for the company
using it.
Along with the explosive growth of IT systems and
software technologies during the last decade, it is also wit-
nessed a dramatically increase with the number, severity and
complexity of the global cyber-attacks and threats.
Generally, the ERP systems tend to be vulnerable as a
potential victim of such threats, which makes mandatory the
integration of sophisticated and versatile security manage-
ment solutions and processes for all ERP components and all
layer of the ERP system. As a consequence, problems with
product integration and compatibility often arise, there might
be significant increase with the costs of implementation of
the ERP systems and overall increase with the Total Cost of
Ownership (TCO). It also occurs the need for centralized
management of the entire protection system via
well-structured and documented process.
Seeking to mitigate the effects of such problems, many
companies stand up before the choice: to simpler and
cheaper, but less functional security approach (that inevi-
tably provide lower levels of security and cost less) or
implement high-end solution with complete security cover-
age. The attempts to save by the cost of security solutions
can later cause serious financial losses for companies’core
business and/or impact their reputation.
The optimal security solution should be an introduction
of a unified security platform, incorporating state-of-the-art
technologies and tools to build comprehensive protection of
all IT infrastructure layers with centralized management
capabilities.
A well implemented and operational ERP system is
considered as a key tool for each business to allow efficient
R. Antonova (&)G. Georgiev
Faculty of Mathematics and Informatics,
Sofia University St. Kliment Ohridski, Sofia, Bulgaria
e-mail: Dr.antonova@t-online.de
G. Georgiev
e-mail: j.y.georgiev@gmail.com
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_14
103
management of the entire business process lifecycle. Along
with the increasing complexity of existing ERP systems, the
challenges and importance of ERP systems security are also
growing. An effective ERP system must not only meet the
requirements in terms of functionality, performance and
reliability but must be also secure, providing both internal
security and integration with external security solutions.
2 The Holistic Approach to ERP Security
When it comes to the security of an ERP system, the tradi-
tional and most common approach is to evaluate the security
of the core ERP components (databases, application servers,
user access) mostly. Such approach is outdated and due to
this not possible to completely respond to the increasing
challenges of the present reality and needs to evolve.
When evaluating the security of a modern ERP, a more
holistic approach need to be implemented. Such approach
will cover the entire ecosystem of ERP software, the mul-
tiple layers of its underlying IT infrastructure, network
communication, user identity and rights management and the
complex relations/dependencies existing between them, as
illustrated on Fig. 1.
Due to the complexity of the relations of multiple com-
ponents affecting the overall ERP security, it is reasonable to
introduce an abstract multi-layer model representing the
security ecosystem (similar to the OSI Network Layers
model). This abstract model is illustrated on Fig. 2.
A certain ERP system can be implemented/delivered
using different scenarios: On-premises, Cloud based (private,
public or hybrid cloud), Software as a Service (SaaS) plus
multiple additional combinations are available.
Regardless of the delivery scenario, all the ten security
layers participating within the ERP system security model
are present and the need to be properly managed is illus-
trated. In some situations certain layers might not always be
directly exposed or not being easy to distinguished.
Into this security model, the different layers are also
grouped into 3 main groups, in order to make more convenient
matching them with the main implementation scenarios.
2.1 Managing Physical Security
The requirements for achieving a good level of physical
security for the premises hosting physical components of
ERP underlying infrastructure are pretty well defined and
conservative:
•Physical Access restriction: the premises must be secured
with a solid locked door, having electronic lock capable
to read biometric data or access cards. The list of
personnel authorized for access must be maintained up to
date and each access event recorded, plus a diary record
added for the actions taken during each visit. An alarm
system must be operational and warn for an unauthorized
access events. It is not considered a good practice such
premises to have windows.
•Power supply: according to best practices, there must be
present at last two different power supply sources, linked
to different suppliers. In addition, an uninterruptable
power supply (UPS) must be connected to all equipment,
with a properly calculated capacity to power up all
consumers for a short period (typically several minutes.
•Heat management: the premises hosting equipment must
have air cooling system operational and with sufficient
capacity to cool the equipment even when operating at
maximum power and maintain a constant temperature.
•Environmental control: a constant control must exist for
some important environmental parameters like sur-
rounding temperature and humidity
•Fire safety: the premises must be equipped with
fire/smoke detectors connected to an alarm system and an
automated fire distinguishing system must be also
available, which system is triggered upon fire detection
and uses reagents which are non-aggressive for the
electronic equipment.
For the implementation scenarios, when Cloud hosting or
SaaS are used, typically the physical security is maintained
by the Hosting company and could be easily proved if the
provider’s data center has passed a standard certification
process.
2.2 Infrastructure Network Security
The Infrastructure Network security is considered as one of
the most important layers in terms of overall application
security, due to it directly affects and is a foundation of the
security of several other layers (Servers, Operating system,
Database, ERP Application). The infrastructure network is
also one of the layers which are most frequently a subject of
cyber-attacks. The network design must be carefully planned
as a part of ERP implementation design and strategy, in a
way to maximize the security and provide sufficient capacity
and performance. There are some core points that need to be
considered:
•Network segregation: involves developing and enforcing
a ruleset, controlling which computing devices connected
to the network are permitted to communicate with which
other computing devices
•Network segmentation: logically partitioning the network
IP addresses into a small segments, which later is used
104 R. Antonova and G. Georgiev
for dedicated function. For instance the servers must
communicate to storage arrays using separate network
subnet, not visible/available from the other subnets.
The correct implementation of network segmentation and
segregation are minimizing the method and level of access to
sensitive information and significantly reduce the perimeter
for potential cyber-attack. It can be achieved using some
common methods and techniques to ensure the security of the
network:
•Implementing demilitarized zones (DMZ) and gateways
between networks nodes with different security
requirements
•Implementing server and domain isolation using Internet
Protocol Security (IPsec)
•Implementing storage based segmentation and filtering
using technologies such as encryption Logical Unit
Number (LUN) masking
2.3 Server Hardware Security
Based on ERP implementation scenario, the infrastructure
servers might be physical ones (box) or virtual (hosted on
virtualization platform, based on physical servers). In both
cases there must be some requirements that need to be met in
order to have a good level of security:
Fig. 1 ERP system security relations
ERP Security, Audit and Process Improvement 105
•Choosing the proper hardware: since it is expected the
equipment to be used for a long term period with a
minimum failures, it is reasonable to be used hardware
produced by reputable vendors. The same hardware must
be accomplished with the proper warranty and on-site
service contract. It is also important to track the
remaining warranty for available server hardware and
plan its replacement before warranty expiration.
•Capacity planning: used server hardware must be a
subject of capacity planning and checks. Only keeping
the systems with enough capacity in terms of system
resources available can be ensured flawless running of
the ERP system and its good performance and stability.
•Storage containment: no matter if the server hardware is
hosted on premises or in Data Center, it is a good prac-
tices to store it into locked racks.
2.4 Server Operating System Security
There are recently two most popular operating systems
families—Windows and Unix/Linux. Regardless which of
the families is used to host the ERP system, there are 3 main
prerequisites to be met in order to be able to maintain proper
security for the entire ERP solution:
Proper version/distribution selected: both Windows and
Linux come into variety of versions, distributions and sys-
tem architecture. When selecting the proper OS, there are
some basic rules to follow:
•OS Version: the most recent (stable) version/release
should be used
•A proper OS architecture: 32/64 bit must be used, to
correspond to the architecture of the CPU of the hard-
ware. With the increasing popularity of virtualization and
rapid evolution of CPU architectures, the 64 bit archi-
tecture has the dominating position.
•Most OS are released in different editions: the edition
matching best for ERP system requirements and used
hardware capabilities should be installed
•OS security hardening applied: there are a set of common
practices referred as “hardening”, which are considered
to ensure a sufficient level of security by OS perspective:
•Programs clean-up: by maintain the minimum set of
installed programs (only that are explicitly needed for
OS/ERP proper functioning), the number of backdoors
and perimeter of potential attack are slightly reduced
•Use of service packs: keeping the OS updated to the
latest version
•Patches and Patch management: plan, test, implement
and audit the released OS patches on regular basis is an
important part of security management
•Policy/group based authentication: for highly privileged
(Admin) access to the OS—the list of users having such
access must be kept limited and the access should always
be provided based on certain user group membership, not
directly. There is also must to properly track and audit
each admin logon
•Security Templates: groups of policies that can be applied
to the OS in automated manner
•OS Firewall active: by keeping the OS firewall active
(both for inbound/outbound traffic) is allowed only for
explicitly authorized programs and processes to com-
municate, using predefined list of network ports. The OS
Firewall acts as supplement of active Networks Firewalls
and allow to gain additional security
Usage of Antivirus Software: specifically for Windows
based operating systems (but not limited to) is a highly
desirable to have deployed a comprehensive Antivirus
solution. Such solutions if are well designed and properly
setup, provide not only a protection against the well-known
security threats like viruses, but also can implement a
heuristic algorithms to detect and prevent zero day attacks
Fig. 2 ERP system security layers model abstract
106 R. Antonova and G. Georgiev
and malware spread. Some of the more advanced AV
solutions also provide capability for centralized, policy
based management and have some capabilities to perform
network traffic inspection and control the execution of sys-
tem processes and applications.
2.5 ERP Databases
Each modern ERP system embeds into its design a
single/multiple Database(s) to store and process the data and
business logics. Regardless the technology and type of the
Database Engine used, there are common requirements for
the ERP databases to provide a sufficient security.
•Restrict User Access: under no any circumstances should
be allowed the ERP users to have direct access to the
databases. Instead, the access to database must be
available only for ERP program components (application
services, client applications) via dedicated DB connec-
tions, in secured manner.
•Limit and Control Admin access: it is inevitable to have
some highly privileged accounts active, for maintain and
administer the databases. The usage of such accounts
must be strictly controlled and audited via group based
policies.
•Proper hosting: the database(s) must be hosted onto a
dedicated DB instances/DB cluster, which have a suffi-
cient resources present to meet the database requirements
in terms of CPU power, RAM volume, storage space and
especially storage performance.
•Service accounts usage: all processes related with data-
base services must be ran under the credentials of spe-
cially created Service Accounts, having applied
additional security setting, like strong passwords rules
and interactive logon prevention.
2.6 ERP Application Services
Application services a core ERP components. They are
responsible to communicate with the underlying ERP data-
bases at one side and ERP client applications (Thick or WEB
based) at the other. Application services are also responsible
to process the data stored into the databases, apply the
business logic and present it in a proper format for the
clients. Since Application Services have both front end
(clients) and back end (databases) connections, the security
challenges are quite significant and are considered as one of
the most critical component of the entire security schema.
There are some common security measures to be imple-
mented for ERP application services:
•Additional hardening: the servers where application
services are running must have precise security harden-
ing, at the maximum possible level. This include a
detailed list of the allowed applications, processes and
also access lists for the devices/IPs allowing to commu-
nicate via front end connections (client side).
•Encrypted communication: the communication with back
end (Database side) must be performed in an encrypted
format and via secured network channel.
•Service accounts usage: a dedicated service accounts
must be used to run the different services, based on their
purpose and running into dedicated workspace. These
service accounts must have additional security applied,
like strong password policy and limit interactive logon.
•Performance and availability monitoring: in a typical
ERP setup, the application services are the most common
bottleneck for the entire ERP system performance. These
services process a large volume of concurrent requests
and are responsible to manage a large transaction queues.
Such high load tends to cause frequent failures of the
services and their availability and performance must be
monitored in automated way, to make possible the
detection of potential failures and rapid restoration of
services operational status (either manually or automati-
cally). Only this way the security of ERP system oper-
ational status could be maintained at desired level.
2.7 Identity Management
Each ERP system is composed of number of components
and even a greater number of communication transactions
between these components. To achieve that ERP operates in
a secure way, it is important to have the identity of com-
munication participants properly managed:
•User identity: the secure approach requires a 2 factor
authentication (2FA) to be performed for users, accessing
the ERP resources. In most typical scenario the 2FA
requires the user to provide a combination of pass-
word + electronic certificate (alternatively might be a
security token + PIN code) in order to prove its stated
identity.
•Component identity: there are various type of compo-
nents participating within the ERP internal communica-
tion. To have a desired high levels of security, each
component must have its identity confirmed, the same
manner as users should. For the components like servers,
network devices, client devices etc., the identity is proven
by using electronic certificates, installed on each device.
All certificates must be issued by Certificate Authority,
which are trusted by all other components. In some
ERP Security, Audit and Process Improvement 107
scenarios (larger implementations) the organization has
its own Public Key Infrastructure (PKI) used to issue and
manage the certificates, while for smaller organizations
there might be used certificates issued by 3rd party
security providers.
2.8 User Rights and Access
The main purpose of an ERP system is to provide a set of
services for its users. Some of the large scale deployments
are used by hundreds thousands of users and this makes the
management of user rights and access to the system an
extremely important components of the overall security.
After a certain user identity has been proven, he is autho-
rized to access the system and gains a certain set of per-
missions to interact with it. There are a well-known sets of
practices, available to maintain good security levels:
•User access policy: the authorization for certain user
account to access the ERP system must be controlled via
structured and clearly defined process. Each step of such
process must be documented and a written evidence be
present. The process is started with a filled request form,
submitted by the user. Later, the request is reviewed by
an authority, described by the process structure. Finally
the approved request is submitted to the Application
Administrator to create the identity and allow the user to
access the system.
•The revoke of access: an operation which needs to be
initiated when a user no longer needs access, regardless
the reason. The revoke procedure typically is initiated by
the user’s direct manager/supervisor. To ensure that there
are no unnecessary active users, a periodical audit must
be performed over the users list and passwords be set to
expire on certain period.
•Role based permissions: the ERP is used by users having
various needs and responsibilities. Based on needs and
responsibilities, the users must to have permissions to
access different parts of ERP data and authorization to
perform certain actions. Due to the typically large num-
ber of users and rich ERP functionality, the proper
management of user permissions is a complicated process
and if improperly managed, this might impact the level of
overall security.
To be able to handle efficiently the permissions, it is
required to introduce the user roles—this is an application
specificdefinition and it is a reflection of the user’s job
function/role by ERP perspective. After a roles are defined
into the ERP, a set of permissions should be created and
associated with this role. The good practices include to
configure roles as a group, capable to contain a list of user
names. Later assigning a user account to this group grants
this account the associated set of permissions and vice versa
—removing an account form the group revokes the corre-
sponding permissions.
Some ERP systems support natively the capability to
manage internally role groups and associated set of per-
missions, while some other don’t—for these not supporting
the function the list of roles and associated permission must
be managed externally, as a part of structured process.
2.9 External Network
This is the network used by ERP clients to access the sys-
tem. Depending of the specific setup, this network could be
an office LAN, an inter-site VPN connection, an internet
based VPN or even non secured external connection. This
external network is one of the components most exposed to
cyber-attacks and various other threats. To keep maintaining
a good security levels, there are 2 main prerequisites to be
met:
•Reliable 2 factor authentication for users: due to user
passwords are vulnerable to be captured and compro-
mised, it is again reasonable to use 2FA for proving user
identity. It is also against the good practices to allow
sending user passwords trough external network in plain
(non-encrypted format)
•End-to-end encrypted data exchange: all the information
exchanged between the ERP system and ERP client
applications must be performed using encryption. The
most common methods achieving this goal are by using
end-to-end VPN connection and encrypting data content
prior to be delivered vie the network. For achieving
optimal security, the 2 methods could be combined.
2.10 Client Access Devices
Into this category fall all devices which have ERP client
software installed or are used by end users to connect to ERP
using WEB interfaces. As a complementary security mea-
sures for these implemented for External Network commu-
nication, it is reasonable that devices be also secured
enough, by applying some well-known techniques:
•Restrict user rights: the users should have the minimum
required set of privileges (non-admin) for the device they
use to access the ERP system.
•Reliable Antivirus and Antimalware solution installed:
since this type of systems are usually connected to
108 R. Antonova and G. Georgiev
Internet, to reduce the risk of infections spread via the
global network, it is mandatory to be present an antivirus
solution with advanced capabilities and desirably with
central management capabilities.
•Machine identity proof: the presence of electronic cer-
tificate issued to the machine and installed verifies the
machine identity when connection is established and is a
very reasonable security measure within this context.
•Regular OS and Applications patching: the workstations
and mobile devices like laptops and tablets, used as client
access devices tend to have a desktop or mobile version
of Operating System installed. These OS versions are
more vulnerable to security breaches and the OS
patches/fixes are released more frequently and these
systems need to be a subject well planned and controlled
patch installations, on regular basis.
3 Security Process Documenting and Audit
Due to the security ecosystem of an ERP application is quite
complex and involves multiple layers, which not only hav-
ing their own security considerations but also possess
dependencies by some other layers, the process of managing
and documenting the security of such application is neither
easy nor simple process.
In order to be able to manage the security process effi-
ciently, one of the main prerequisites is the existence of
well-structured and documented process framework. Such
framework will describe in details the security related
properties of the application components, the details how to
achieve the desired security levels and the appropriate doc-
uments created and roles assigned for each security config-
uration change.
3.1 Security Administration Roles
There is a set of roles participating within the security
administration, which can be assigned to individuals or
teams:
•Identity administrator: this is the main role responsible to
create and manage an identity for user of
device/component. The role requires highest possible
privileges and is typically assigned to higher levels IT
staff or managers.
•Application administrator: this role is responsible to
setup the ERP components, including application
updates, fixes and user rights assignment inside the
application. The role requires proficiency with applica-
tion operations and is assigned to mid/high levels IT staff.
•Infrastructure administrator: this role covers the
administration of General IT services or infrastructure,
like servers, operating systems and platform. Typical
representative of this role is the System
Administrator/Support Engineer
•Database administrator: a role which is authorized to
administer manage and support the normal operational
status for ERP underlying databases. Must possess and
advanced knowledge for the administered database
solution. Typically assigned to level 3 Database
Administrators.
•Network/security administrator: this role is reserved for
the people/teams which administer the infrastructure
network and/or external network and connectivity
between the ERP infrastructure components and services.
This role also has the responsibility to perform periodi-
cally security audits and detect and eliminate proactively
any possible vulnerability. Depending on the scale of the
certain organization, the role could be handled by a
single or two different teams.
3.2 Security Documentation
The entire security of an ERP is not something static but is
more like a continuous running process, which responds to
the environment changes and attempts to update proactively
the security routines avoiding the new occurring security
threats. To be possible the process to be ran and managed
efficiently, all aspects and changes from security perspective
must be properly documented.
Documenting the process starts along with the ERP
deployment design document, by describing the security
baseline routines into the High Level Design (HLD) and
Low Level Design (LLD) documents.
Later, during the ERP acceptance phase, the existing
security is evaluated in details and gap analysis is performed
between the designed and existing security setups. At the
post go live phase, the final ERP deployment is documented
into Solution Build Document, and the entire security setup
is an integral part of this document and represents the initial
version of security baseline for the certain ERP system.
During the stabilization and optimization phase of an
ERP solution, there are frequently pop up needs to perform
changes for some security related settings—these changes
must be documented, following the standard ITIL process
for Change Management (as best practices usage).
Another security related changes that are common part of
ERP system operations are these requesting to add, remove
users and change the user’s permissions for using certain
ERP resources. This documents are processed as User
Authorization Request forms, typically filled by users
ERP Security, Audit and Process Improvement 109
themselves, approved by the respective authority and finally
submitted for execution to the appropriate administrators.
3.3 Security Audits
Security audits are tasks that need to be performed, either
periodically on regular basis or on demand, as a response to
newly identified potential security threat. During the audit,
the complete security state of the ER and its underlying
components is evaluated and documented. Later the audit
output is analyzed by expert IT staff and if concluded that
some changes are needed to improve the existing security
routines, these changes are planned and implemented under
the standards of Change Management process.
Since the security audit process evaluates multiple aspects
of ERP system, a members of different Administration teams
are involved and work in collaboration to cover all per-
spectives and complex relations.
Some of the market leading ERP solutions have inte-
grated tools for internal security audit, which tools
significantly reduce the efforts and time needed for per-
forming audits.
4 Conclusions
Managing the security of an ERP system is a complex
process, involving multiple layers, components, dependen-
cies and interactions that need to be taken under consider-
ation. The importance of proper security management must
not be underestimated due to a partially or completely failed
ERP system might have an enormous impact over the
company business and/or finance. Within security manage-
ment process are involved several different Administrator
roles, which need to work in close collaboration to achieve
optimal results. Maintaining an overall good level of security
is not a one-time effort, but is continuously running process.
As a part of this process there must be maintained a precise
documentation for each activities performed.
110 R. Antonova and G. Georgiev
Evaluating the Strength of Middle Eastern
Monarchies and Republics
Khulood Jamal
Abstract
In the wake of the Arab Spring, several states have faced
turmoil, instability and a gradual overthrow of the regime.
Interestingly, the states affected by the Arab Spring were
largely republics including Syria, Tunis and Egypt. Both
Egypt and Tunis witnessed an overthrow of the regime
while the situation in Syria continues to deteriorate, as the
Al-Assad regime shows no sign of willingness to give up
power. Two monarchies, Jordan and Bahrain, faced
demonstrations and protests but were able to withstand
any regime change. Given the realities of the Arab Spring,
scholars question the applicability of Samuel Hunting-
ton’s notion of the king’s dilemma and his skepticism
about the future of monarchies. This paper seeks to prove
that Middle Eastern monarchies are generally stronger
than Middle Eastern republics because of institutional
flexibility, the ability to exploit financial and political
resources in order to encounter the challenges faced with
rapid social change and geopolitical realities.
Keywords
Monarchy Republic The divide and rule tactic
Institutional flexibility Geopolitical power
Strong and weak states
1 Introduction
In the wake of the Arab Spring, several states have faced
turmoil, instability and a gradual overthrow of the regime.
Interestingly, the states affected by the Arab Spring were
largely republics including Syria, Tunis and Egypt. Both
Egypt and Tunis witnessed an overthrow of the regime while
the situation in Syria continues to deteriorate as the Al-Assad
regime shows no sign of willingness to give up power. Two
monarchies, Jordan and Bahrain, faced demonstrations and
protests but were able to withstand any regime change.
Given the realities of the Arab Spring, scholars question the
applicability of Samuel Huntington’s notion of the king’s
dilemma and his skepticism about the future of monarchies.
This paper seeks to prove that Middle Eastern monarchies
are generally stronger than Middle Eastern republics because
of institutional flexibility, the ability to exploit financial and
political resources in order to encounter the challenges faced
with rapid social change and geopolitical realities.
2 Literature Review
Primarily, Middle Eastern monarchies enjoy greater institu-
tional flexibilities than their republican counterparts. Legit-
imacy is one of the key aspects of such flexibility. The right
to rule of monarchies does not stem from the so called divine
right of kings but rather due to a “combination of individual
and family virtues, including noble lineage, honoured deeds,
qualities of leadership and, in the case of the kings of Jordan
and Morocco, descent from the Prophet Muhammad him-
self”[1]. Because legitimacy stems from various sources,
monarchs are not bound by impersonal policies and regu-
lations of bureaucracies and legislatures unlike their repub-
lican counterparts who are required to abide by such policies
[2]. The interplay between the traditional virtues and modern
qualities is another aspect of institutional flexibility. The
ruling families of monarchies hold a nomadic tribal past with
traditional customs yet, contemporary rulers are able to
acquire the skills and knowledge necessary in order to meet
the requirements of modern times [1].
A tactic that monarchies are able to employ unlike their
republican counterparts is the divide and rule tactic.
Waterbury explained this tactic by providing the example of
the Moroccan monarch who “acts as the consummate arbiter
K. Jamal (&)
American University in the Emirates, Dubai, UAE
e-mail: 162410041@aue.ae
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_15
111
who is constantly dividing and balancing his opposition and
playing off sides”[3]. In order to employ this tactic,
monarchies promote social and political pluralism. In terms
of social pluralism, monarchies accept the differences
between various social groups within a given society and
emphasize such differences unlike their republican counter-
parts who merely create a standardized “new Arab socialist
man”[3]. In addition to accentuating social differences,
monarchies adopt policies to not only protect those differ-
ences but also to encourage individuals to be independent of
their choices whether in religious or linguistic terms. In
general, monarchies do not force a uniformed identity but
rather promote numerous identities. For example, the Jor-
danian monarch protects the culture and traditions of Bed-
ouins as well as other minorities including the Chechen
minority. In terms of political pluralism, monarchies enable
various political forces to exist and in some cases within the
parliament and in other cases within labor unions. Their
republican counterparts, on the other hand, developed a
single party system. Applying the divide and rule tactic, the
toleration of different social groups and political forces
enables monarchs to “play off sides and stave off the
cyrstallisation of broad-based coalitions against their rule…
the monarch is then able to play the role of arbiter between
the various factions”[3].
In addition to institutional flexibility, Middle Eastern
monarchies are capable of exploiting financial and political
resources in order to encounter challenges faced with rapid
social change. Oil is the primary resource that generates
wealth and income for monarchies. According to the BP
Statistical Review issued in 2009, 64.7% of the world’s oil
reserves are situated in the Middle East and the states within
the Middle East are responsible for 37.3% of the production.
Monarchies, in particular, hold 39.5% of those oil reserves
and are responsible for 22.6% of the production. The wealth
and income generated by oil ultimately enabled monarchies
to develop the modern state system. Prior to the advent of
oil, the state structure of monarchies was under developed
and power was institutionalized within the royal court. The
system was also simple as the monarch ruled by decree and
met with oligarchs frequently. The monarch was surrounded
by selected advisors whom he delegated specific tasks. The
influx of oil revenues enabled monarchs to expand the state
apparatus and bureaucracy. For instance, monarchs began to
initiate projects to increase modernization and development.
Monarchs also invested in Western military equipment, arms
systems and intelligence to compete on the international
level [4].
In addition to the development of the modern state sys-
tem, oil revenues enabled monarchs to distribute welfare
among their citizens. An important aspect of monarchial rule
is the special relationship between the monarch and his
citizens. The monarch distributes welfare both social and
economic to the citizens in exchange for their political loy-
alty. This is particularly the case in the monarchies of the
Gulf region. Citizens in the Gulf enjoy various opportunities
and services including free access to educational and health
facilities as well as housing amongst other amenities. For
instance, citizens of the United Arab Emirates are given free
land for their houses, scholarships and various job oppor-
tunities. The distribution of socio-economic welfare ensures
monarchs that citizens will remain loyal and those who
oppose the monarchial rule or even question the legitimacy
of the royal family face heavy sanctions including detention
and deportation.
Furthermore, oil revenues have enabled monarchs to
integrate any potential rival into the state system by issuing
responsibilities. Such integration ultimately transforms
potential rivals into clients of the state. Economic develop-
ment, for instance, enables the monarch to issue responsi-
bilities by granting concessions to families of local
entrepreneurship. Thus, the monarch secures the loyalty of
the family because now the family has an interest in pro-
tecting the monarchial rule as a means to ensure that they
will continue to be given concessions. The political systems
in the Gulf region also incorporate traditional authoritative
structures within the modern state system including religious
institutions and tribes. The integration of social groups also
strengthens the patron-client relationship [4].
Moreover, oil revenues have shaped geopolitical realties
which in turn ensure the regime stability of the monarchies.
Middle Eastern monarchies have formed coalitions with the
United States and other Western powers. The Western
powers intervene in the monarchies when the ruling family is
threatened by political forces. For instance, Great Britain
protected the Omani monarchy and helped to overthrow the
Dhufari rebellion in the 1970s [5]. Protection is granted to
monarchies because it is in the strategic and economic
interest of the Western powers to maintain the stability of the
regime. As mentioned earlier, monarchies are home to a
large supply of oil reserves; therefore, Western powers view
monarchies as a means to gain access to the oil reserves and
ultimately to exert power through its strategic location. In
addition, monarchies provide the United States support and
help in its war against terror. Monarchies do not allow any
Islamic movements or groups that have suspicious terrorist
aims to operate within their territorial rule [4]. Middle
Eastern monarchies have not only formed coalitions with
Western powers but also regionally most notably the GCC,
Gulf Cooperation Council.
Monarchies have created an efficient network in which
support and solidarity is provided in times of crisis. This
112 K. Jamal
network is beneficiary to the monarchs as it also strengthens
their supply of resources [6]. Geopolitical realities came into
play in Bahrain in 2011 when the monarchial rule was
threatened by the Shiite protests. GCC forces led by Saudi
Arabia were deployed to Bahrain to help shut down the
protests [7]. In addition to the military aid, GCC foreign
ministers also vowed to provide $20 billion to both Bahrain
and Oman [6]. An interesting point to mention is that the
United States failed to voice its concern with human rights
abuses inflicted on the protesters by both the GCC forces and
the Kingdom’s army. The lack of inaction reflects the
geopolitical realities as the US has an interest in maintaining
stability in both the Bahraini monarchy and the region at
large [7].
Although Middle Eastern monarchies are generally
stronger than Middle Eastern republics, the question remains
whether or not monarchies can be identified as strong states
and republics as weak states. In order to determine the
strength of a state three indicators are used including “(1) by
their ability to control their own territory, (2) by their
capacity to perform core functions, and (3) by their vulner-
ability to challenges to their legitimacy”[8]. Strong states
are able to efficiently and effectively exert power and control
over their own territory while weak states have a low degree
of control over their territory and cannot prevent various
actors from entering their territory and intervening in affairs.
Strong states are able to efficiently and effectively perform
core functions which include providing security and more
specifically protecting the human security of civilians as well
as exerting monopoly over the use of force. Weak states, on
the other hand, lack a uniform state performance and contain
large populations of disadvantaged people.
Lastly, strong states are largely not vulnerable and prone
to challenges, both internal and external, to their legitimacy.
Legitimacy entails that the state has the legal and moral right
to rule and exert power and that the international arena
recognizes such right. Weak states, on the other hand, are
not capable of exerting complete control over their territory
or performing core function; therefore, they lose legitimacy
and face internal and external challenges to their rule [8].
3 Discussion
Having discussed the indicators of strong and weak states, it
becomes evident that monarchies maybe identified as strong
states if not states gradually reaching that status while
republics are identified as weaker states. Taking the Arab
Spring as a case study, republics such as Syria and Egypt
both were prone to internal and external challenges to their
legitimacy and were not able to effectively perform core
functions hence the public unrest and dissatisfaction.
The Syrian government has long relied on robust coercion in
order to rule; however, it is not able to successfully repress
the protests and challenges to its rule. In terms of territorial
control, the Syrian government has lost some control as
various actors have entered since the advent of the uprising.
Given the institutional flexibility, monarchies are seen more
legitimate in the eyes of their people; therefore, they have
faced fewer challenges to their rule.
With the exception of Jordan and Bahrain, monarchies
have not experienced the Arab Spring. Although Jordan and
Bahrain faced challenges to their monarchial rule, both were
capable of overcoming of the protests in a short period of
time. In terms of performing core functions, monarchies
such as the United Arab Emirates and Qatar ensure the
protection of human security and distribute welfare to their
citizens. Of course the degree of performance varies amongst
different monarchies yet, with the exploitation of oil the
standard of living is higher for citizens in monarchies than in
republics. Monarchies also have a relatively high degree of
control over their territories compared to republics.
4 Conclusion
To conclude, Middle Eastern monarchies are generally
stronger than Middle Eastern republics because of institu-
tional flexibility, the ability to exploit financial and political
resources in order to encounter the challenges faced with
rapid social change and geopolitical realities. With the
advent of the Arab Spring, it is easier to evaluate the strength
of the states in both monarchies and republics. Given the
current political situation, monarchies are relatively stronger
and have maintained security and legitimacy within their
territories.
References
1. Owen, R.: State, Power and Politics in the Making of the Modern
Middle East. Routledge, NewYork, NY (2004)
2. Anderson, L.: Dynasts and nationalists: why monarchies survive. In:
Kostiner, J. (ed.) Middle East Monarchies: The Challenge of
Modernity, pp. 53–69. Lynne Rienner Publishers, Boulder, Colo
(2000)
3. Frisch, H.: Why monarchies persist: balancing between internal and
external vulnerability. Rev. Int. Stud. 37(1) (2011). Retrieved from
http://search.proquest.com.ezproxy.aus.edu/docview/874921867/full
textPDF?accountid=16946
4. Meyrick, J., Selvik, K., Stenslie, S.: Stability and Change in the
Modern Middle East. I.B. Tauris & Co. Ltd., London (2011)
5. Gause, F.G.: Kings for all seasons: how the Middle East’s monarchies
survived the Arab spring. In: Brookings Doha Center, p. 8 (2013).
Retrieved from http://www.brookings.edu/*/media/research/files/
papers/2013/09/24%20resilience%20arab%20monarchies%20gause/
resilience%20arab%20monarchies_english.pdf
Evaluating the Strength of Middle Eastern Monarchies …113
6. Friedman, B.: Battle for Bahrain: what one uprising meant for the
Gulf states and Iran. World Aff. 174(6) (2012). Retrieved from
http://www.worldaffairsjournal.org/article/battle-bahrain-what-one-
uprising-meant-gulf-states-and-iran
7. Yom, S.L. Understanding the resilience of monarchy during the
Arab Spring. Foreign Policy Res. Inst. (2012). Retrieved from http://
www.fpri.org/articles/2012/04/understanding-resilience-monarchy-
during-arab-spring
8. Hanlon, Q.: State actors in the 21st century security environment.
Nat. Strategy Inf. Cent. (2011). Retrieved from http://www.
strategycenter.org/wp-content/uploads/2011/07/State-Actors-21st-
Century.pdf
114 K. Jamal
Exploring the Opportunities and Challenges
of Open Source Software and Its Economic
Impact on the Cybersecurity Market
Ismail Alsharif and Adel Khelifi
Abstract
Organizations today face IT security challenges on many
fronts. These include controlling user access to systems,
resources, and data security issues that encompass secure
storage, secure transmission, data authenticity and data
integrity. These requirements are met by establishing the
right policies, controls, and mechanisms that are put in
place to effectively protect sensitive data. Therefore, this
research aims to see if open source software has the
potential to influence the cybersecurity market that is
currently dominated by proprietary software. However, in
order to accomplish such a task, certain conditions must
be met. Such as understanding of the history behind open
source software, the positive and negative influences it
carries when dealing with this type of software. As well
as compare and contrast current proprietary solutions with
open source solutions, in order to grasp the potential
economic impact of open source software leading
onwards into the future. The ideal findings would be to
outline the factors that are holding back open source
software, and whether these factors are adjustable or
correctable over time. Another aim is to highlight the
potential financial benefit that comes from switching to or
prioritizing OSS security solutions. As well as come up
with any recommendations that would help aid businesses
and organizations when it comes to obtaining suitable
OSS security solutions.
Keywords
Open source software Cybersecurity Challenges
1 A Glimpse into the World of Cybersecurity
1.1 Background
In a world where information technology security is quickly
becoming a prioritized concern at the forefront of every
small, medium and large enterprise as well as in any
government institution. Which is a given based on how
everything has moved towards a digitalized landscape in the
past decade.
Ever since organizations started depending on informa-
tion technology in order to run their day to day business
practices, they in turn were slowly creating openings in their
processes that malicious attackers wanted to exploit and take
advantage of. Which inevitably led to government institu-
tions and organizations alike to protect their assets and
communication mediums from these bountiful threats as
well as attempted to manage all of the risks by studying their
infrastructure and processes involved. However, this was a
very difficult task to accomplish because whenever security
mechanisms were introduced simplicity was sacrificed in the
process.
Therefore, there was a need to balance security against
complexity which was a daunting task depending on what
processes, assets, communication mediums were being
looked into. That was not all; as there was also the topic of
risk management at hand. This meant that risk managers
would have to plan almost every possible scenario that is
related to an event or a scenario and then look at the net loss
or net gain from implementing a security mechanism in
place to reduce or minimize the risk versus accepting the
risk.
These studies were done in order to not waste money on
protecting a system if the value of it being exposed or stolen
is less than implementing the security mechanism itself (IE:
protecting $200 worth of equipment by implementing a
$5000 security mechanism). One of the main reasons for
implementing cybersecurity also stems from the fact that the
I. Alsharif A. Khelifi(&)
College of Computer Information Technology,
American University in the Emirates, Dubai, UAE
e-mail: adel.khelifi@aue.ae
I. Alsharif
e-mail: 121120006@aue.ae
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_16
115
e-commerce sector saw incredible growth in the past few
years, which in turn made cybersecurity a core component in
many of the world’s economies. Securing safety critical
systems is also a top priority, which helped bolster the need
for cybersecurity, due to the reliance of these systems for
responding to emergencies or protecting a country’s infras-
tructure (utilities) from any terror related threats.
Due to the ever-evolving digital landscape, many
organizations took to leverage the power of the internet in
order to help reach more customers on the web and further
solidify their relationships with their partners by using VPN
tunneling in order to enable internetworked organizations for
enhanced collaboration. However, they had to harden their
systems properly before they could leverage the power this
type of medium. One of the main reasons for hardening
one’s system was to protect their asset or assets from
cybercrime. Protection from outside threats was not the only
concern as more and more attacks are carried from the
inside. Whether it is a remote malicious attacker that gained
access to data through a protected and privileged system or a
rogue employee that is accessing and leaking confidential
data for monetary reasons.
1.2 Various Components that Require
Protection
Numerous components require protection, but it depends on
what type of services or processes an organization aims to
provide. Whether it is a healthcare, education, manufactur-
ing, or a federal industry, the same principles are to be
followed when discussing the components that need constant
protection.
The network, considered to be the essence of communi-
cation in any organization. Protecting it from threats and
risks is the priority of the information technology security
team. But in order to accomplish that, several tools need to
be used in unison in order to yield the proper monitoring
capabilities. These tools can range from intrusion detection
systems, intrusion prevention systems, vulnerability scan-
ners, and packet sniffers.
Application security is a large concern that sometimes
requires both hardware and software methods in order to
protect applications from possible external threats. Some
tools are also used for their ability to perform on the spot
attack simulations in order to probe for potential vulnera-
bilities or test certain security mechanisms that were previ-
ously implemented. Monitoring applications and keeping a
tab on the performance levels can help triangulate possible
threats.
Data is considered to be a quintessential asset and is
sometimes referred to as the lifeblood of an organization,
have encryption mechanisms set in place as well as some
form of file transfer management. Databases of course come
to mind discussing data, and it is necessary to have the right
tools in place that enable continues monitoring and auditing.
In addition to using encryption which would add an extra
layer of protection when it comes to sharing information
between clients.
Another component that comes to mind are the users,
considered to be one of the weakest links in any organiza-
tion. As was shown in the past decade where attacks would
target and prey on users as a way to infiltrate a system. In an
ideal situation, it would be wise to have some form of user
classification in place. User monitoring as well as privileged
user monitoring, in addition to using a multi-factor authen-
tication method would aid in safeguarding sensitive data
from malicious users.
1.3 Cybersecurity Solutions Today
Since there are numerous areas that require constant pro-
tection, monitoring, and logging capabilities. A need for IT
security solutions that were able to perform these functions
rose considerably. The need for these services created a
demand that had to be met, therefore a considerable amount
of companies with some expertise in the field wanted to
capitalize this opportunity and create IT security solutions
that would inevitably help organizations and enterprises
protect their domain.
Today, hundreds of IT centric companies are creating and
distributing their own specialized IT security software that
aims to protect the ever-growing needs of every enterprise.
The competition is striving within these companies as they
add feature after feature in an attempt to outdo one another
and create more value for their products. They also tend to
benchmark their capabilities against other competitor’s
products in order to send the message that they are the
leaders in the market when it comes to value, as they attempt
to cement their image as the “go to”brand when it comes to
IT security needs.
However, due to the ever-increasing amount of IT secu-
rity solution providers that are trying to offer more and more
security solutions, that promise to deliver the highest level of
protection that is available in the market. Although great for
the market and the growing IT security industry, a negative
side effect is introduced. This side effect being the intro-
duction of complexity. Because of 30 information technol-
ogy security solution providers offering the same solution,
only differing in the performance levels and in the extra
features they may support. Businesses tend to spend time
trying to decide which solution to go for and how each
solution differs from the other. Which in turn constraints
resources in terms of the time it takes to figure out which
solution would best fit the organization.
116 I. Alsharif and A. Khelifi
1.4 Open Source Software
After establishing some background information at the topic
at hand. It makes sense to delve into how introducing the
open source model into the realm of IT security solutions
could help invigorate the industry in an unprecedented
manner. As open source allows the participation and
collaboration of many individuals in creating or developing
a piece of software or a complete solution. This is made
possible by making the code itself public; meaning the
program instructions that are kept hidden when running is
now visible to everyone. Effectively opening the source code
to the public, which is often accompanied by the program
that is also open to any entity that seeks to use it. However,
the caveat here being that open source programs are not to be
sold, but shared, most of the time.
In contrast to open-source software, proprietary software
has its source code hidden. This is done in an attempt to keep
the program’s instructions unknown to the public. The dis-
tinction between OSS and free software should also be
explained; as OSS can be even have a price tag attached to it
if the developer deemed it necessary.
An example of one of the most successful open source
software’s available today is Linux. Unbeknownst to most,
Linux is an operating system that is currently being main-
tained by volunteers that are located across the globe. It
garnered quite the reputation and is now considered one of
the leading operating systems powering more than 30% of
all the servers worldwide. Another open-source software that
has shared a similar success story is Apache, an open source
software that is powering more than 75% of web servers
globally. MySQL also comes to mind when talking about the
advent success of open source software, as it is used today
for relational database management purposes.
1.5 Open Source Software Challenges
Opponents of open source software argue that by creating
something open source, they are handicapping themselves
from a security standpoint. It is argued that because the
source code of the program is openly visible for anyone to
see that they are effectively putting themselves at a security
risk.
According to Levy [1] a technical director with the
CESG, a department of the United Kingdom’s government
communications headquarters intelligence agency. He
argues that open-source software is no different from pro-
prietary software when it comes to security. That although
open-source software is open for everyone to see, it does not
directly correlate to being any less secure than proprietary
software that has its source code hidden. He states that
because it is openly visible for anyone to view that it in turn
creates this atmosphere where developers would go over
each line with much more scrutiny in place. Whereas in the
case of proprietary software, due to it being hidden from the
general public, it is subject to less scrutiny and that would
eventually lead to the release of a program that could be
open to some nasty vulnerabilities.
Nonetheless, this does not mean that open-source soft-
ware is free from its fair share of problems. It has been
widely known that the distribution of open-source software
has been a challenge for quite some time. As there have been
many concerns regarding the fact that it is possible to replace
the original files of the software with fake files that contain
malicious lines of code embedded into the files themselves.
As seen in the past, there were multiple instances where
distribution servers are attacked, replacing an original file
with an infected one. Ultimately allowing a threat to bypass
several layers of security and cause havoc.
1.6 Problem Statement
Today one of the largest costs for any organization is
implementing the required security mechanisms and main-
taining the correct controls and policies. Organizations are
spending millions on products and services instead of
looking for open-source alternatives. Organizations aren’t
properly searching the market and trying to look for open-
source alternatives that are just as capable as their propri-
etary counterparts. Therefore, through actively looking into
the challenges and misconceptions that OSS currently
struggles with, a more diverse market could potentially
flourish, one driven by the notion of financial savings.
1.7 Objectives
The objective is to investigate the current scene of IT
Cybersecurity, its solutions, both proprietary and open-
source. In an attempt to draw some form of conclusion that
would help clear up whether or not it is feasible to go
towards an open-source model in the coming future.
2 Literature Review
The aim of the literature review was to try and accumulate as
much information as possible from similar studies that were
conducted in the past that focused on comparing and con-
trasting open source security solutions and proprietary
security solutions with one another. As well as discuss the
growing need to meet compliance requirements.
Exploring the Opportunities and Challenges of Open Source …117
2.1 Study Number 1
A study that was published recently by Carman [2] high-
lighted some interesting points. The issue being whether
companies and organization alike implemented endpoint
security solutions with the intention of safeguarding their
enterprise and mitigating risk in the best manner possible or
merely implementing the solutions in order to meet some of
the imposed regulatory compliance requirements.
The study believes that from the data that they had
gathered around this area, that enterprises leaned towards
meeting regulatory requirements rather than focus on having
strong controls in place. The study talks briefly about how IT
security professionals today are somewhat out of touch on
which data should be protected or classified as confidential,
and therefore end up applying various security solutions to
some of the data unnecessarily.
2.2 Study Number 2
Another study that was done recently by Nigelow [3], which
wanted to understand or comprehend what IT professionals
are looking for in security products and what their prefer-
ences are. Some of the highlights that resulted from this
study was the fact that over 90% of the respondents made it
clear that they believe that their overall security posture
would improve in the coming months. However, when asked
about how much heavily does compliance and governance
requirements played a role in influencing the overall security
effort, over 70% of the respondents recognized that com-
pliance would play a large role in security planning and
decision making in general.
Also, some interesting findings that should be pointed out
is that more than 65% of respondents believed that IT pro-
fessionals cared the most about the overall security posture
while the rest believed that CEOs and upper managements
were more concerned about security.
Respondents were also questioned on their confidence on
which security programs they believed to be performing well or
above average. With the majority believing that intrusion,
detection and prevention as well as data protection have the best
overall security implementation in place. It is also mentioned
that security professionals felt that thearea that lacked the most
attention and awareness to be the user education security pro-
gram due to the fact that human factor is hard to fortify and
control unlike other sets of data or applications in place.
2.3 Study Number 3
A study that was conducted by Xing [4] in the Journal of
Industrial Engineering and Management. Xing wanted to
find out just how much would commercial open source
software affect proprietary software from a market share
perspective and a financial perspective as well. It aimed to
achieve this by analyzing the impact by using complex
differentiation models in a scenario where a proprietary
software product was competing with an open source
software product.
Some of the findings that were discussed was the finan-
cial effect it had on the market. It turns out that with the
presence of an open source software, there was an overall
decrease in both the price of the software as well as in the
profit that was being made from said software. However,
with the introduction of OSS came many positive outcomes,
some of the ones that were highlighted were how much more
consumers were active on the market and how social welfare
increased dramatically over time.
2.4 Study Number 4
One study that was conducted by De [5] a Hewlett-Packard
Chair Professor that sought to understand the economic
impact of free and open source software. The study was
based on 20 different case studies from varied organizations,
such as educational institutes and commercial firms as well
as governmental departments. The goal was to replace the
currently used OS of windows with an open source OS
called FOSS.
They gradually replaced the windows software from over
50,000 desktops from schools spread across the state of
Kerala, which translated into costs savings that were esti-
mated to be around $10 million. The next target was a
commercial firm that adopted the FOSS OS for their servers,
which translated into cost savings of up to $70,000. But the
largest costs savings they had recorded was $16 million
when an insurance firm replaced their proprietary software
with open source software on over 8000 of their devices.
Ultimately the study concluded with the fact that open
source software dramatically changed the economy in an
unprecedented way by saving millions in potential costs.
2.5 Study Number 5
A study that was conducted by Peeling and Satchell [6]
which aimed to predict the future of OSS by analyzing the
current trends in the software infrastructure marketplace.
They gathered and analyzed an extremely large amount of
data in order to come up with the patterns that would be used
to predict the future growth or decay of open source
software.
They attempted to look at alternatives for functional
software that is widely used today. For example, they looked
118 I. Alsharif and A. Khelifi
for alternative OSS that would replace Microsoft word,
Microsoft Outlook, Microsoft Excel, as well as Microsoft
PowerPoint.
The conclusions that were derived from performing this
study was that it would be possible that within the coming
future that OSS would take over 50% of the software
infrastructure marketplace. And that governments around the
world would benefit greatly from this change, but that
implementing them would the true challenge.
3 Materials and Methods
3.1 Replacing Proprietary Security Solutions
with Open Source Security Solutions
In this section, open source and proprietary security solu-
tions will be compared in each of their respective categories.
The categories that will be looked into are endpoint security,
unified threat management, application firewall, anti-spam,
encryption, intrusion detection, network firewalls, user
authentication, network monitoring, risk management,
forensics, anti-spyware, and mobile device management and
intrusion prevention.
The areas that were selected were based on IT security
requirements that each organization should uphold regard-
less of which industry is involved, and should at the very
least employ some, if not all of the listed solutions.
It is also worth noting that one of the areas that require a
solution is risk management, and it will outweigh most if not
all of the other areas in terms of how expensive it is. This is
due to the nature of how the risk management solution
operates, as it consolidates data from a large number of
interfaces/solutions and attempts to correlate various sets of
data that are coming in from different areas, processes them,
and presents it in a manner that the IT Security team can
make use of.
The solutions that were selected were based on their
popularity and their reputation for having solid, working
solutions that are considered to be reliable. Various sources
of information, including Gartner were used to compile the
list of solutions (Tables 1and 2).
Open Source Anti-Spam solutions versus Proprietary
Anti-Spam solutions. The OSS solution nominated in this
category is Anti-Spam SMTP Proxy, also commonly known
as ASSP. The goal of the product is to stop spam from going
through SMTP servers connected to the organization. ASSP
functions well with popular SMTP servers such as Micro-
soft’s Exchange and others as well. This OSS is intended to
replace Barracuda Spam and Virus Firewall. Which func-
tions just as ASSP would, however it delivers its capabilities
through hardware appliance unlike ASSP’s software based
solution.
Open Source Anti-Virus/Anti-Malware solutions ver-
sus Proprietary Anti-Virus/Anti-Malware solutions.
The OSS solution nominated in this category is ClamAV’s
which is considered to be one of the top open source security
solutions currently available. Its reputation in the domain of
AV protection has risen considerably in the past couple of
years. Which has allowed it to rival the capabilities of top
proprietary security products in the market. It intends to
replace various propriety solutions including, Kaspersky
Anti-Virus, McAfee Antivirus, Norton Anti-Virus, and Virus
Scan Enterprise.
Open Source Anti-Spyware solutions versus Propri-
etary Anti-Spyware solutions. The OSS solution nomi-
nated in this category is Nixory which written in Python/
PyGTK. Its aim is preventing any form of data-mining or
any spyware related activities, including key logging
attempts. The proprietary software that it aims to replace is
Webroot’s Spy Sweeper which offers the same functionality.
Open Source Application Firewall solutions versus
Proprietary Application Firewall solutions. The OSS
solution nominated in this category is ModSecurity which
enables the logging and monitoring of web application
activity in real-time. As well as enables web application
hardening. The proprietary software that it aims to replace is
Barracuda Web Application firewall, and NetScaler Appli-
cation Firewall.
Open Source Risk Management versus Proprietary
Risk management solutions. The OSS solution nominated
in this category is Eramba, which is an open enterprise class
IT Governance, Risk and Compliance application. It helps
aid compliance management and ensures that each and every
change on a system is validated and approved before being
pushed into a live environment. The proprietary software
that it aims to replace is MetricStream.
Open Source Encryption solutions versus Proprietary
Encryption solutions. The OSS solution nominated in this
category is AxCrypt. An open source software that is cap-
able of encrypting files on the fly and in a simple yet elegant
manner. Designed primarily for windows users, AxCrypt
aims to make encrypting files an easy process that is
accomplished simply by right clicking on the file or folder
that needs to be protected. The proprietary software it aims
to replace is McAfee Anti-Theft, and Cryptoforge. As for the
Linux counterpart, Gnu Privacy Guard would replace
Sophos Safeguard Encryption.
Open Source Forensics solutions versus Proprietary
Forensics solutions. The OSS solution nominated in this
category is ODESSA. Which is an acronym for “Open
Digital Evidence Search and Seizure Architecture”it
includes a great number of tools that help collect and
organize digital data that can later be diagnosed and ana-
lyzed. The proprietary software it aims to replace is EnCase
Forensics, and X-ways Forensics.
Exploring the Opportunities and Challenges of Open Source …119
Open Source UTM solutions versus Proprietary UTM
solutions. The OSS solution nominated in this category is
Endian Firewall. Which turns any functional computer into a
fully-fledged Unified Threat Management appliance. It is
capable of protecting a network through a slew of tools,
including firewall capabilities, anti-virus capabilities, spam
and content filtering, and application filtering as well. The
proprietary software that it aims to replace is Check Point
Security Gateways, and McAfee UTM Firewall.
Open Source Intrusion Detection solutions versus
Proprietary Intrusion Detection solutions. The OSS
solution nominated in this category is AFICK. It functions as
afile integrity checker that can report any changes that are
made to any of the systems on a network to the
administrators in charge. The proprietary software that it
aims to replace is Tripwire. Works on both Windows and
Linux.
Open Source Network Firewall solutions versus Pro-
prietary Network Firewall solutions. The OSS solution
nominated in this category is IPCop. Which offers the ability
to turn any functional computer into a firewall appliance.
Therefore, saving the trouble associated with getting a
device that functions solely as a firewall appliance. The
proprietary software it aims to replace is Barricuda NG
Firewall and Check Point Appliances. As for the Linux
based systems, pfSense would be the OSS used.
Open Source Network Monitoring solutions versus
Proprietary Network Monitoring solutions. The OSS
Table 1 OSS replacements for a
Windows operating system
environment
Type of solution Proprietary solution Open source solution
Endpoint security Kaspersky anti-virus ClamAV
Unified threat management Check point security gateways Endian firewall
Application firewall Barracuda application firewall ModSecurity
Anti-spam Barracuda spam and virus firewall ASSP
Encryption Cryptoforge AxCrypt
Intrusion detection Tripwire AFICK
Network firewalls Barricuda NG firewall pfSense
User authentication Entrust IdentityGuard WiKID
Network monitoring Omnipeek Wireshark
Risk management MetricStream Eramba
Forensics EnCase forensics ODESSA
Anti-spyware Webroot’s fpy fweeper Nixory
Mobile device management MobileIron Miradore
Intrusion prevention Cisco IPS Snort
Table 2 OSS replacements for a
Linux operating system
environment
Type of solution Proprietary solution Open source solution
Endpoint security Kaspersky anti-virus ClamAV
Unified threat management Check point security gateways Endian firewall
Application firewall Barracuda application firewall AppArmor
Anti-Spam Barracuda spam and virus firewall ASSP
Encryption Sophos safeguard encryption Gnu privacy guard
Intrusion detection Tripwire AFICK
Network firewalls Barricuda NG firewall IPCop
User authentication Entrust IdentityGuard WiKID
Network monitoring Omnipeek Wireshark
Risk management MetricStream Eramba
Forensics EnCase forensics ODESSA
Anti-spyware Webroot’s spy sweeper Nixory
Mobile device management MobileIron Miradore
Intrusion prevention Cisco IPS Snort
120 I. Alsharif and A. Khelifi
solution nominated in this category is Wireshark. To come to
be known as one of the most detailed packet inspectors that
greatly aid in the process of network monitoring. Due to its
ability to filter specific packets into categories, and record
traffic in real-time. The proprietary software that it aims to
replace is Omnipeek.
Open Source User Authentication solutions versus
Proprietary User Authentication solutions. The OSS
solution nominated in this category is WiKID. A solution
that enables two-factor authentication so that people can
access sensitive applications remotely and safely. Which is
widely used for online banking. As well as employees can
access their work servers from their own homes remotely.
The proprietary software that it aims to replace is Entrust
IdentityGuard.
Open Source Mobile Device Management solutions
versus Proprietary Mobile Device Management solu-
tions. The OSS solution nominated in this category is Mir-
adore, a solution that enables businesses to secure and
manage their devices appropriately. It also provides the
ability to automatically identify devices that are entering the
premises, as well as configure them remotely if required. The
proprietary software that it aims to replace is MobileIron.
Open Source Intrusion Prevention solutions versus
Proprietary Intrusion Prevention solutions. The OSS
solution nominated in this category is Snort. Which is highly
regarded for its ability to analyze packets in real time as well
as log them in order to find and prevent possible threats from
causing any damage, it accomplishes this by correlating
specific information with one another. The proprietary
software that it aims to replace is Cisco IPS.
3.2 Survey Outlook and Discussions
Two different surveys were conducted in order to properly
measure opinions of the public. This was done in order to
come up with any findings that would help aid in furthering
the research. It would have been possible to go with one
survey, but in order to properly gauge the results in an
effective manner, each survey had to have specific questions
that were targeted at a specific audience. This was done in
order to add more accuracy and depth to the findings. The
first survey was targeted at the general population. While the
second survey was aimed towards more IT centric people
with some form of expertise surrounding the topic.
Survey 1: General Public Survey
Question 1: How much money do you believe is spent on
information security products and services on an annual
basis?
In Fig. 1, respondents seem to underestimate the amount of
money that is being spent on security solutions and services,
with the majority agreeing on $1–$25 billion being the answer.
However, it is far from the actual number that was spent during
2016’s timeframe, with turns out of be just over $71 billion.
The results give us some insight in that the general population
underestimate the amount spent on these solutions.
Question 2: Do you believe that there exists a single solution
that is capable of addressing all of an organization’s security
requirements or concerns?
In Fig. 2, most of the respondents believe that there does
not exist a single product that is capable of handling an
organization’s many security needs. Although some notable
companies in the market are getting close to creating a single
product that is capable of addressing all of an organization’s
security needs by merging different security components and
interconnecting them into a single environment.
Question 3: Do you believe organizations are properly
researching the market for security solutions before deciding
on selecting one, or just getting the popular solution that
everyone else is using?
In Fig. 3, interestingly enough, most respondents seem to
believe that organizations today are dedicating the proper
amount of resources in deciding which product/solution to
purchase. While it is true that a large number of companies
do end up selecting the market leading solutions, a majority
of organizations are carefully outlining their needs and
choosing the appropriate solutions that can accommodate the
specified needs.
Question 4: Do you believe open source software to be
generally more dangerous than proprietary software?
In Fig. 4, respondents seem to be under the impression
that open source software is more dangerous than proprietary
software. Although this statement has been proven to be
incorrect, it seems as if several false claims throughout the
years hampering the reputation of open source software has
attributed to the result that is now seen. It would take some
time as well as a different approach in order to correct the
incorrect perceived notions that the public holds towards
open source software.
Question 5: Do you believe that paid software solutions are
always superior to software solutions that are free?
In Fig. 5, most of the respondents agreed on the notion
that paid solutions are always going to be more superior to
their free counterparts. This is quite the revelation as it shows
how most people’s mindset function. Because it has a price
tag associated with a product/solution, it will not always
outperform a free solution. It can be argued that in most
cases, a paid solution might perform better than a free alter-
native, but that is not always the case. The results shed some
light into how most people think about solutions in general
and how their value would seem to increase with their price.
Exploring the Opportunities and Challenges of Open Source …121
Fig. 1 Survey question
No. 1 and its results
Fig. 2 Survey question
No. 2 and its results
Fig. 3 Survey question
No. 3 and its results
Fig. 4 Survey question
No. 4 and its results
122 I. Alsharif and A. Khelifi
Survey 2: IT Background Survey
Question 1: How flexible is your organization towards the
annual budget that is dedicated towards purchasing or
maintaining IT security solutions?
In Fig. 6, the results that were gathered portrayed that
respondents believe organizations should a somewhat flexi-
ble budget allocated towards maintaining and purchasing IT
security solutions. What this means is that most of the
organizations aren’t properly planning out the annual budget
and in turn have to adjust their budgets depending on their
needs. This possibly showcases that the individuals that are
responsible for creating these yearly budgets aren’t calcu-
lating the needs and factoring in the overhead required for
possible altercations.
Question 2: How many years of experience would a IT
security solution provider need to have before you would
consider purchasing or licensing their software/hardware?
In Fig. 7, the results showcase that most of the respon-
dents believe a minimum of 2 years of experience is required
for a solution provider before opting to purchase an IT
security solution from them. This indicates that organiza-
tions tend to lean towards a company that has built some
form of reputation for itself rather than go with a newly
founded company that is offering a similar IT security
solution. While prioritizing reputation is a good thing, it
could ultimately hinder the search for an optimal solution by
emphasizing reputation over functionality.
Question 3: Do you believe open source software lacks
proper enterprise-grade support?
In Fig. 8, most of the respondents leaned towards OSS
not having the proper amount of support. Which was odd, as
OSS solution providers do indeed provide enterprise-grade
support. However, it is usually exclusive to customers that
pay a subscription fee in order to access that level of support.
That’s not to say that all OSS solution providers follow suit
with this form of support, as many have fantastic support
through other channels such as community support.
Question 4: Do you believe that open source software is
secure?
In Fig. 9, interestingly enough, respondents seem to
believe the OSS is not as secure as it may seem. Which is
one of the common myths behind OSS, as it has been proven
to be an untrue assumption. Because of how OSS is boasted
as being one of the most secure forms of software due it
naturally being…well…open. Which basically translates to
any possible vulnerable piece of code being patched up by
the community in no time.
Question 5: Do you believe that open source software is
reliable?
Fig. 5 Survey question
No. 5 and its results
Fig. 6 Survey question
No. 1 and its results
Exploring the Opportunities and Challenges of Open Source …123
In Fig. 10, the majority of respondents believe that open
source software is reliable, and it is. There are several
examples of OSS lasting for a long time and outliving other
proprietary solutions. A good example to showcase this
would be to talk about how Linux has been maintaining its
strength and success for all these years since its 1991 debut.
4 Results and Discussion
Many organizations and companies are trying their best to
follow and maintain industry standards and rules that are set
in place in order to be in compliance. This responsibility is
Fig. 7 Survey question
No. 2 and its results
Fig. 8 Survey question
No. 3 and its results
Fig. 9 Survey question
No. 4 and its results
124 I. Alsharif and A. Khelifi
shared among many industries today. Hence it is wise to
consider the financial footprint of such solutions as they are
prone to compounding one another and in turn end up
raising the required IT security budget immensely. There-
fore, the initial proposition is to calculate cost difference that
can be achieved by replacing a number of proprietary IT
security solutions with open source solutions.
In order to estimate the potential cost that is required,
certain criteria had to be established, one of which was to
decide how many employees were currently working in the
enterprise for the sake of obtaining accurate results. In the
end, the most common size was selected, which is the small
to medium sized enterprises or SME for short. SME’s
typically contain between 50 and 250 employees, but for the
example at hand 200 was the number that was chosen.
However, another goal was to measure the potential
savings for a large enterprise that boasts around 5000
employees. Therefore, four tables would be constructed
detailing the estimated savings for both the SME and the
large enterprise. While also keeping in mind the different
operating system environments that are present in different
enterprises. Consequently, it was decided that Windows, and
Linux would be selected.
In Table 3, the total financial savings that can be
observed from using OSS security solutions instead of
proprietary solutions in a Windows environment that is
comprised of 200 employees/users is $195,664 (+$17,000
yearly). The total financial savings that can be observed from
using OSS security solutions instead of proprietary solutions
in a Linux environment that is comprised of 200
employees/users is $206,589 (+$17,000 yearly). As is
determined from Table 3.
In Table 4, the total financial savings that can be
observed from using OSS security solutions instead of pro-
prietary solutions in a Windows environment that is com-
prised of 5000 employees/users is $4,890,350 (+$425,000
yearly). The total financial savings that can be observed from
using OSS security solutions instead of proprietary solutions
in a Linux environment that is comprised of 5000
employees/users is $5,182,100 (+$425,000 yearly). As is
determined from Table 4.
As seen from the tables above, there indeed exists a
significant financial benefit from replacing proprietary
solutions with open source solutions. However, there are
some caveats that tend to be linked with the use of open
source software. Which is that some of them do not offer free
support, as in some of the OSS solutions will have a certain
annual fee attached to them if having a functional support
channel with the developers is required. This could be
considered a downfall to OSS although not all of the solu-
tions follow this practice.
Another factor that is difficult to quantify is that switching
to OSS solutions will require some form of training for the
current workforce in order to gain the necessary skillset to
operate these solutions. Which might take time as well as
cost money. However, the financial benefit from switching
to an overall OSS focused platform will heavily eclipse the
potential cost of training required to use said solutions.
It is also important point out that some of the proprietary
solutions operate on a yearly license that needs to be
renewed, in this case, the yearly required amount is added
next to the total cost, as a way to simplify the amount of
money required and to generate a more accurate estimate.
5 Conclusions and Recommendations
In conclusion, whilst recent trends seem to be indicating that
open source security solutions seem to be thriving, now they
are considered to be realistic alternatives for various orga-
nizations in the cybersecurity field. To have a glimpse into
the world of cybersecurity, the article presented the various
IT components that require protection and the existing
cybersecurity solutions. Five studies are discussed here to
introduce the OSS opportunities and challenges. In addition,
the open source and proprietary security paradigms are
compared in thirteen distinct categories to show the possi-
bility of considering OSS as a reliable alternative to com-
mercial software. These categories are endpoint security,
unified threat management, application firewall, anti-spam,
encryption, intrusion detection, network firewalls, user
authentication, network monitoring, risk management,
forensics, anti-spyware, and mobile device management and
intrusion prevention. Two different surveys were conducted
to properly measure opinions of the public to compare the
two software paradigms. As seen from the research, there
indeed exist financial benefits from replacing proprietary
solutions with open source solutions. However, there are
some caveats that tend to be linked with the use of open
Fig. 10 Survey question No. 5 and its results
Exploring the Opportunities and Challenges of Open Source …125
source software. Which is that some of them do not offer free
support, as in some of the OSS solutions will have a certain
annual fee attached to them if having a functional support
channel with the developers is required. This could be
considered a downfall to OSS although not all solutions
follow this practice. Another factor that is difficult to
quantify is that switching to OSS solutions will require some
form of training for the current workforce to gain the nec-
essary skillset to operate these solutions. Which might take
time as well as cost money. However, the financial benefit
from switching to an overall OSS focused platform will
heavily eclipse the potential cost of training required to use
Table 3 Estimated costs for 200 employees
Area of solution Proprietary license cost (windows
environment)
Proprietary license cost (Linux
environment)
Open source license
cost
Endpoint security $8000 (yearly) $8000 (yearly) $0
Unified threat
management
$5193 $5193 $0
Application firewall $4749 $4749 $0
Anti-spam $730 $730 $0
Encryption $1475 $12,400 $0
Intrusion detection $1199 $1199 $0
Network firewalls $2399 $2399 $0
User authentication $1600 $1600 $0
Network monitoring $9230 $9230 $0
Risk management $115,500 $115,500 $0
Forensics $3594 $3594 $0
Anti-spyware $9000 (Yearly) $9000 (Yearly) $0
Mobile device
management
$28,000 $28,000 $0
Intrusion prevention $21,995 $21,995 $0
Estimated cost $195,664 + $17,000 Yearly $206,589 + $17,000 Yearly $0
Table 4 Estimated costs for 5000 employees
Area of solution Proprietary license cost (windows
environment)
Proprietary license cost (Linux
environment)
Open source license
cost
Endpoint security $200,000 (yearly) $200,000 (yearly) $0
Unified threat
management
$129,825 $129,825 $0
Application firewall $118,725 $118,725 $0
Anti-spam $18,250 $18,250 $0
Encryption $35,625 $310,000 $0
Intrusion detection $29,975 $29,975 $0
Network firewalls $59,975 $59,975 $0
User authentication $40,000 $40,000 $0
Network monitoring $230,750 $230,750 $0
Risk management $2,887,500 $2,887,500 $0
Forensics $89,850 $89,850 $0
Anti-spyware $225,000 (yearly) $225,000 (yearly) $0
Mobile device
management
$700,000 $700,000 $0
Intrusion prevention $549,875 $549,875 $0
Estimated cost $4,890,350 + $425,000 yearly $5,182,100 + $425,000 yearly $0
126 I. Alsharif and A. Khelifi
said solutions. The implementation of the replacement of
propriety software by OSS as indicated in this paper can be
an interesting future research to validate the study with
concrete solution.
References
1. Levy, I.: Government Systems: How Much Security is Enough?
From http://security.governmentcomputing.com/features/2011/oct/
25/cesg-information-assurance-government. (2011)
2. Carman, A.: Study: ‘High Priority’Issues Hamper Endpoint
Security Solution Implementation. From https://www.scmagazine.
com/endpoint-security-survey-illuminates-issues-for-it-profession
als/article/539374/. (2014)
3. Nigelow, S.J.: Security Channel Survey: What Security Clients
Want from Solution Providers. From http://searchitchannel.
techtarget.com/survey/Security-channel-survey-What-security-
clients-want-from-solution-providers. (2008)
4. Xing, M.: The Impact of Commercial Open Source Software on
Proprietary Software Producers and Social Welfare. From http://
www.jiem.org/index.php/jiem/article/view/1260/631. (2014)
5. De, R.: Economic Impact of Free and Open Source Software Usage
in Government—A Report. From http://icfoss.in/news/economic-
impact-of-free-and-open-source-software-usage-government-a-
report. (2009)
6. Peeling, N., Satchell, J.: Analysis of the Impact of Open Source
Software. Retrieved from http://www.eurim.org.uk/activities/oss/
0110qinetiqoss.pdf. (2001, October 1)
Exploring the Opportunities and Challenges of Open Source …127
Feasibility Analysis of Blockchain
for Donation-Based Crowdfunding
of Ethical Projects
Nida Khan and Rachid Ouaich
Abstract
Donation is a necessary social tool that is plagued by
many inherent shortcomings. A novel model in the form
of a decentralized app was designed in the Ethereum
blockchain to solve the challenges present and optimize
the process of Zakaah donation. Load and stress tests on
the prototype of the smart contract in the public testnet of
Ethereum were analyzed to gauge the feasibility of mass
usage. Similar tests were done in Hyperledger to conclude
on the optimum blockchain platform for Zakaah. An
anomaly was detected during the testing phase of the
decentralized app in the public testnet of Ethereum and it
was exploited to propose a novel strategy to enhance the
throughput of Ethereum. The testing is a pioneer in
evaluating the throughput and feasibility of a blockchain
based financial product and provides a benchmark to
validate the business and technical hypotheses of other
similar financial products and services.
Keywords
Blockchain Feasibility Donation Throughput
Zakaah Smart contract Fintech
1 Introduction
The world presently houses 795 million hungry people [1]
with approximately 4.95 billion people living on less than
$10 a day [2]. Zakaah is an obligation on Muslims to give
2.5% of their accumulated wealth annually for charitable
causes. $125 million donated by Zakaah and Sadaqah
(charity) helped 8.3 million people in 2015 [3]. The amount
$125 million represents 0.063% of the lower threshold of the
total Zakaah collected annually [4]. The process of donation
is ridden with several problems. There exists reliance on
third parties for donation-based payments [5], absence of an
easy and transparent way to donate and an inefficient dis-
tribution of money depriving the one’s in need [6]. The
charities presently are always under scrutiny for the dis-
charge of money made available to them while the end
receivers remain at the mercy of charities. There are pre-
sently 1.7 billion Muslims with no transparent service to aid
in the discharge of the religious obligation of Zakaah.
The enumerated problems and the compelling need for a
transparent donation system motivated the development of
the Ethereum decentralized app, Zakaah dapp that forms the
foundation of this paper. The dapp is designed to protect
against third party fraud, ensure auditable [7] transactions
and execute real-time donations directly to the receivers.
A smart contract was coded to optimize the zakaah collec-
tion, distribution and impact documentation process through
the dapp. Blockchain is a nascent technology and there does
not exist another similar usage of smart contracts that could
have aided in the design and development process. Zakaah
dapp is a pioneer in this respect.
The paper is organized to give the relevant background in
Sect. 2. The functional architecture of the Zakaah dapp is
discussed in Sect. 3. Section 4of the paper highlights an
anomaly detected during the testing of dapp on the public
testnet of Ethereum and exploits the anomaly to analyze
submission of transactions and mining times independently
in Sect. 5.4. Zakaah is mostly discharged in the month of
Ramadhan, when Muslims observe fasting. Therefore, the
application has to be resilient to the extra load during this
month. In Sect. 5, the paper also elaborates the test results of
three different strategies employed to measure the through-
put of Ethereum during periods of extra load on the dapp and
discusses the feasibility of the different approaches adopted.
The paper also depicts in Sect. 5.5 the test results of ser-
vicing the requests of multiple users through a single node
N. Khan (&)
University of Luxembourg, Luxembourg City, Luxembourg
e-mail: nida.khan@uni.lu
R. Ouaich
ConexCap, Luxembourg City, Luxembourg
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_17
129
functioning as an Ethereum client in comparison with setting
up a single dedicated node per user.
An analysis of the private networks of different block-
chains has already been conducted [8]. Therefore, a com-
parison of stress test results on the public Ethereum testnet
network and the private Hyperledger development environ-
ment was dealt with to aid in the proposition of an optimum
scalable blockchain-based solution to the problem. Related
work is highlighted in Sect. 6. Conclusions drawn and future
work is discussed in Sect. 7together with the proposition of
a novel strategy to improve the throughput of Ethereum and
increase the probability of transaction inclusion in the
blockchain. The decision was reached as a conclusion of the
tests conducted, which spans 0.3 million transactions suc-
cessfully submitted on the public Ethereum testnet, Ropsten
over a duration of 57 days and includes 3 contract creations
on the blockchain.
2 Background
Blockchain is a public ledger of transactions that consists of
a peer-to-peer network and a decentralized distributed
database. It is a decentralized ledger that is used to exchange
currency and perform deals and transactions without trusted
[9] intermediaries. The data structure in blockchain is a
continuously growing chain of blocks, with the latter refer-
encing the former. Each block is a record of individual
transactions that are secure against tampering. Ethereum is a
blockchain platform that provides the users with the service
to run smart contracts [10]. It is a decentralized technology
that aims to guarantee the outcomes for any user for his
interactions with any other individual or system [11].
Smart contracts are written in the programming language,
Solidity [12], which is similar to a JavaScript-like language
and are compiled down to the bytecode for the Ethereum
Virtual Machine (EVM) [13]. Smart contracts are any con-
tracts that are capable of automatic enforcement without the
need of a third party. They are computer programs that can
define rules and consequences in an equivalent manner as
legal contracts [14]. A dapp is a decentralized app that
enables users to interact through a HTML/JavaScript web
application using a JavaScript API with the blockchain. The
dapp has its own business logic encoded in a smart contract
or several smart contacts deployed in Ethereum to ensure
persistent storage of data and transactions [15].
Hyperledger is hosted by the Linux Foundation and it is a
collaborative effort to develop blockchain-based distributed
ledgers. IBM provides blockchain solutions and services like
Hyperledger Fabric, leveraging on Hyperledger technologies
[16].
3 Functional Architecture
Zakaah dapp is conceptualized to fulfill the obligation of
Zakaah according to a subset of categories defined in the
Shariah, Islamic Law, and aid in achieving some of the
Sustainable Development Goals of United Nations Devel-
opment Programme (UNDP) [17]. A charitable endowment,
waqf [18] is responsible for reviewing the verification of the
authenticity of the projects before exchanging the cryp-
tocurrency, Zakaah Coins, into physical currency. The ver-
ification of the projects hosted on the Zakaah dapp is done
by charities, where the addition of the latter is done by the
waqf. The entire architecture is built on donors and receivers
as the primary agents. Charities function solely as autho-
rizing entities and waqf is the body that triggers the
exchange into physical currency for the digital currency.
The donors and charities register through the smart contract.
A donor on registration can see a list of all the projects with their
respective charities, funding goal and category. The donor
purchases Zakaah Coins, a cryptocurrency, by transferring cash
to the bank account of the waqf. The exchange rate and the third
party payment integration in the dapp to facilitate the bank
transfer is to be determined by the business venture using the
dapp. When the donor has Zakaah Coins in his wallet, he can
donate these coins to any project he deems fit. Once the funding
goal of a project is reached, the project can request the charity
for exchange of coins into physical currency.
Charities willevaluate the impact of the project. For example
if a project wants to build a well for providing drinking water
then they would have to upload on the blockchain the gov-
ernment permission to utilize that property for the said purpose.
This can be done through a function provided in the smart
contract. It is envisaged thatimages of receipts, documents and
the like will be uploaded on platforms like dropbox and the link
shared on the dapp. All the donations and all other data are
publicly available. The identity of the donors is private and can
be seen only by the donor himself and the waqf. The smart
contract ABI of the prototype of this dapp, which is deployed in
Ropsten [19] can be accessed together with the deployed
address from a GitHub repository (see [20]), facilitating public
usage of the smart contract for testing purposes.
Figure 1depicts the functional architecture of the
dapp. The design goals were accomplished keeping in mind
the need for transparency, auditability [21] and security.
4 Anomaly Detection in Dapp Testing
The implementation of the smart contract was done by using
Truffle[22] with Webpack [23]. A live demo (see [24]) of
the main functions of the smart contract in the testnet
130 N. Khan and R. Ouaich
environment ethereumjs-testrpc [25] has been done. Testnets
simulate the Ethereum network and EVM (Ethereum Virtual
Machine). ethereumjs-testrpc is a local testnet used for early
stage testing in Ethereum. Figure 2depicts a screenshot of
Zakaah dapp.
After the development and testing of the dapp on ether-
eumjs-testrpc, testing on the Ethereum public testnet, Ropsten
[19] was accomplished. In order to connect to Ropsten, Geth
[26] is used, which is useful for connecting to public net-
worked testnets. Connecting to Ropsten through Geth simu-
lates the real Ethereum network. This testing was done through
one node connected to a wireless network and the other to an
Ethernet wired connection to simulate the behavior of both
kinds of users. The behavior of the dapp was studied in case of
no Internet connectivity. It is a good design practice to test the
behavior of any application when Internet connection fails.
When Internet connectivity is non-existent or fails intermit-
tently a user might press “Enter”multiple times when he sees
nothing is happening [27]. It is essential to ensure the response
of the application for this kind of user behavior.
Everything that Geth persists is written inside it’s data
directory stored on the local node [28]. It was observed that
any transaction that is submitted in the absence of network
connectivity gets stored in the local node’s data directory for
Geth and is broadcasted to the transaction pool when net-
work connection is restored. Transactions in the dapp are
being submitted using web3.eth.sendTransaction [29] and
not web3.eth.sendRawTransaction [29]. The latter is used
for broadcasting transactions signed offline. Essentially both
the signing of the transactions and their submission with the
return of the hash of the transaction is being done in the
absence of network connectivity. This anomaly is demon-
strated in a video, which was recorded during testing (see
[30]). Transactions were submitted with no Internet con-
nectivity through the Zakaah dapp and through a bash script
programmed to simulate the user in sub-mitting transactions
through the prototype to Ropsten.
5 Load and Stress Testing
Zakaah is an obligation which is discharged majorly during
the month of fasting, Ramadhan. Any application targeting
Zakaah donors should be able to handle the increase in load
during this time. It was therefore essential to do stress tests
on the Ethereum blockchain through the Zakaah smart
contract. A prototype of the smart contract was used to do
stress testing on the testnet, Ropsten. The prototypes of the
smart contract (Ethereum) and chaincode (Hyperledger), the
scripts used and the test results can be accessed through the
GitHub repository (see [20]).
The tests on Ropsten were conducted through 11
accounts [20]. The tests were run on two virtual machines, a
Windows-based operating system and another on Proxmox
Fig. 1 Functional architecture of Zakaah Dapp
Feasibility Analysis of Blockchain for Donation-Based …131
Virtual Environment [31]. Geth version 1.6.7-stable [26]on
linux-amd64 and Go version 1.8.1 [32] were used for the
tests. The prototype of the Zakaah smart contract was
deployed on Ropsten [20]. All transaction hashes and
timestamps can be verified through Ropsten [19]. The gas
price used in the transactions varies linearly between 30
gwei and 31 gwei and has a Transfer Wait time of 0.5 min
and a transaction Confirmation Time of less than 1 s [33].
The stress tests on Hyperledger were done on Fabric v0.6
[34]. Vagrant development environment was used with
security and privacy disabled. A single node private network
was used to complement the already available higher limit of
the throughput, 3000 transactions per second [35] of a single
node Ethereum private network in Parity [36].
5.1 Throughput Comparison of Synchronous,
Asynchronous and Offline Submission
of Transactions
Transactions in counts of 10, 100, 1000 and 10,000 were
submitted on Ropsten through the deployed smart contract
through a single account per node. It was observed that not
all transactions were mined even after a period of 24 h.
Three different mechanisms were used to submit transac-
tions. After conducting multiple tests with a single account,
10 accounts were created to submit transactions in parallel
through a single node to study the servicing of requests by a
node functioning as an Ethereum client connected to the
blockchain. Tests with 10 accounts were repeated to get an
adequate number of samples consisting of a large number of
transactions (15,000 and 40,000) to calculate the standard
deviation, margin of error, mean and confidence interval
with 95% confidence level on normalized data for success-
fully mined transactions to reach an unbiased conclusion on
the throughput. The value of z critical is 1.96.
Synchronous A stream of 1000 transactions was sub-
mitted to the blockchain. The test was repeated 15 times and
the results can be seen in Fig. 3. The shaded region repre-
sents the confidence interval 0.538–0.818, ris 0.277, µis
0.678 and margin of error is 0.140.
Asynchronous Batches of 10 transactions were submitted
after a delay of 80 s to the blockchain through the Ethereum
client. In each test, 1000 transactions were submitted and the
test was repeated 15 times. The test results can be seen in
Fig. 4. The delay of 80 s was found to give the maximum
throughput in the network conditions the tests were con-
ducted. Other delays of 10, 12, 15, 70 s among others were
tried but failed to give an optimum throughput. Figure 4
depicts that the confidence interval is comparatively smaller
0.937–0.961 accompanied by an increase in throughput with
aµof 0.949. The margin of error is 0.012 and ris also much
less at 0.024.
Offline Transactions were submitted to Geth with no
Internet connectivity and post network connection estab-
lishment they were broadcasted automatically to the trans-
action pool for mining. The results can be seen in Fig. 5.
Both the margin of error 0.045 and r0.089 are small
Fig. 2 Screenshot of Zakaah Dapp
132 N. Khan and R. Ouaich
Fig. 3 Synchronous: r= 0.277,
µ= 0.678
Fig. 4 Asynchronous:
r= 0.024, µ= 0.949
Feasibility Analysis of Blockchain for Donation-Based …133
compared to synchronous but are more when compared to
asynchronous. The confidence interval also is also wider
than asynchronous accompanied by a 1.6% increase in
throughput as compared to asynchronous.
5.2 Plausible Explanation for Increase
in Throughput for Asynchronous
Submission
Ethereum operates in an asynchronous environment, the
Internet. The command used to submit the transaction
through the JavaScript Console in the dapp and Geth, web3.
eth.sendTransaction is with a callback and this is also
asynchronous in nature. Therefore, an asynchronous sub-
mission of transactions gives improved throughput. If bat-
ches of data are transmitted, at periodic timeouts the
transactions that get mined increases by 27.1% in a small
population size (see Fig. 4) and 29.9% in a large population
size (see Fig. 6). The size of the batch and the timeout can be
determined by the prevailing network conditions.
5.3 Summary of Testing
Offline test was conducted using 10, 1000 and 10,000
transactions from a single account first. Both 10 and 1000
transactions were mined without any transactions being
dropped off by Geth as per heuristics and age. However
when 10,000 transactions were submitted only 4598 were
mined and the rest were rendered invalid. The size of the
local cache was increased from 128 to 1024 MB and the
tests were repeated with 10 accounts as mentioned before
and the total number of transactions that were mined
increased from 4598. However it still remains to be tested if
the increase in the number of transactions mined was due to
increase in the cache size of Geth on the Ethereum client or
the increase in the number of slots in the transaction pool for
multiple accounts (4096 transactions with 1024 in queue
were the transaction pool statistics for Geth on the Ethereum
client for multiple accounts with each account permitted to
have 16 executable transactions and 64 transactions in queue
[37]). It was also observed that during offline submission,
the mined transactions were in blocks, which had more
transactions than found normally in the testnet. Hence, an
increase in the number of transactions in a block was
witnessed.
Throughput was also seen to be affected by whether the
network connection to the blockchain is through wireless or
an Ethernet cable. The wired Ethernet used had a download
speed of 814.59 Mbit/s and an upload speed of 498.60
Mbit/s. The wireless had a download speed of 14.12 Mbit/s
and an upload speed of 1.51 Mbit/s. Wireless was from a
distance of 13.97 km from the best server and reported a
network latency of 43.824 ms. The wired Ethernet was from
a distance of 14.86 km from the best server and recorded a
Fig. 5 Offline: r= 0.089,
µ= 0.965
134 N. Khan and R. Ouaich
latency of 4.687 ms (tests conducted using [38]). The load
testing was done on both the environments whereas the
stress tests to get the standard deviation were executed on
the wireless in the wake of a larger number of users using the
wireless to access the services on the Internet [39].
100 synchronous transactions were mined in an Ethernet
connection but the throughput decreased by a considerable
percentage over a wireless connection. Asynchronous sub-
mission of transactions with the delay of 80 s gave a
throughput in the range of 92.9–94.9% in both Ethernet
wired and wireless connections in all ranges of the transac-
tions sent and came across as the most suited mechanism for
submitting transactions to the Ethereum blockchain.
5.4 Analysis of Submission and Mining
Functions
The anomaly detection during dapp testing provided the
opportunity to study the submission of transactions sepa-
rately from the mining. A test was conducted by sending
1000 transactions in offline mode to measure the submission
and mining times separately. The test was repeated 6 times
resulting in an average time of 357.67 s for submission and
an average mining time of 294.67 s. The throughput in the
case of 10,000 transactions was extremely poor in offline
mode and hence only one sample data was chosen which
recorded a throughput of 94.9% (see the data used in [20]).
The submission time for 10,000 transactions was 4240 s
whereas the mining time was 10,619 s. It was thus observed
that mining time increases at a much larger rate than sub-
mission time and is much higher than submission time when
there is network congestion by a lot of pending transactions.
However, mining time is less or equivalent to the submission
time for periods of low network traffic. It was also observed
that transactions are mined within seconds after being
broadcast from the Geth node. However, on account of
network congestion, they remain pending in Geth node and
their broadcast is delayed. Therefore, a larger cache size
would affect the throughput but more validation by testing is
needed.
5.5 Effect on Throughput by Serial and Parallel
Submission of Transactions
The throughput of Ethereum can be increased if the number
of transactions that are submitted to the blockchain increa-
ses. Ethereum has a flexible gas limit for the blocks and
thereby the gas limit will increase with the increase in the
number of transactions [40], resulting in an increase in the
throughput. A test was done by submitting 100 2 syn-
chronous transactions in parallel from two nodes from two
accounts and then submitting 200 synchronous transactions
from a single node from one account over an Ethernet wired
connection. There was a difference in the total time taken by
serial and parallel submission in this case. When parallel
submission of transactions was done from two different
Fig. 6 Comparison for 40,000
transactions
Feasibility Analysis of Blockchain for Donation-Based …135
nodes, then the submission time was much less and there
was an increase in the throughput. In parallel submission of
transactions, all 200 were mined and in serial submission
only 143 were mined, hence there was a decrease in mining
time observed in serial submission. This is also because of
the limit on the transactions by a single account in the
transaction pool [37]. Tests were repeated for 1000 trans-
actions from a single account on a node and 10 accounts
submitting a total of 1000 transactions in parallel from the
same node. It was observed that the serial submission had an
average normalized mean throughput of 0.579 as compared
to 0.717 in parallel submission for 6 samples, each of 1000
transactions. This led to the conclusion that utilizing a single
node for an individual user is both infeasible technically and
practically.
5.6 Comparison with Hyperledger
The load and stress tests in Hyperledger were done on the
same pattern of 10, 100, 1000 and 10,000 transactions
submitted in a synchronous stream. The test results show
that the throughput of Hyperledger is very high compared to
the public Ethereum testnet. No transactions failed in
Hyperledger but a more thorough evaluation needs to be
done by increasing the number of nodes in the private net-
work to see the reduction in the transactions handled per
second and come up with an appropriate number of nodes in
which a reasonable throughput is obtained. A similar eval-
uation should be done for Ethereum private network by
altering relevant parameters like block gas limit to include
more transactions. Such data would help in setting up private
networks in different geographical regions similar to the
offices of Islamic Relief, UK that function in different
countries to administer the collection and distribution of
Zakaah [3].
There is already data on comparison of private networks
of Hyperledger and Ethereum [8] but no such comparison
was available between the public Ethereum network and
Hyperledger to complete the research on different options
available. Further, the cost incurred is higher in setting up a
private network and in Ethereum, security features are not
built-in like in Hyperledger. This precludes a higher
investment of capital. Tests were repeated 6 times for a batch
of 1000 transactions from a single account per node and
Ethereum recorded an average mining time of 605.33 s with
Hyperledger at 300 s for 6000 transactions in total. The
mean throughput of Ethereum was 57.95% and Hyperledger
was 100%. The results (calculations and data can be seen in
[20]) are good for setting a base for deciding which block-
chain to use but they do not do justice to the real throughput
of the blockchain platforms. This is because as seen in
Sect. 5.5 Effect on Throughput by Serial and Parallel
Submission of Transactions, the throughput of Ethereum
increases with increase in the number of nodes sending
transactions until it reaches a certain maximum limit [8],
whereas it decreases in Hyperledger [8].
6 Related Work
Ethereum is amongst the most popular blockchain platforms
and emerges as the leader because of its smart contract
functionality. It is thus surprising that there are rare studies,
if any, having been conducted on analyzing the platform
outside formal models. Gervais et al. [41] introduce a novel
blockchain simulator to analyze the security and perfor-
mance of proof of work blockchains like Ethereum. The
present work differs in being an analysis of the performance
of the Ethereum public test network, which is active and
being used globally. In [42] Anderson et al. categorize the
transactions in Ethereum into currency transfers and contract
creations. This is different from the work accomplished in
this paper where transactions have been critically evaluated
for throughput enhancement and used to perform stress tests
on the blockchain. In [8] a benchmarking framework has
been proposed to analyze private blockchains focusing on
the performance metrics of existing blockchain platforms.
Similar work in Ethereum has been accomplished in [35] for
analyzing throughput of transactions in private network and
in [43] for benchmarking full blockchain processing time.
[44] negates the assumption that information dissemination
in the Bitcoin blockchain network is directly received by the
nodes. [45] attempts to explain the factors resulting in the
probability of transactions being mined in Ethereum as 70%.
The work accomplished in the present paper comes very
close by providing a transaction inclusion probability range
of 63–67.8% with a 95% confidence level for transactions
submitted synchronously (see Figs. 3and 6). In [46] Ahmed
et al. propose a decentralized smart contract system to pre-
serve transactional privacy on the blockchain. The work in
the literature so far does not embark on any analysis of a
dapp and a smart contract use case. Additionally the test
results in the paper obtained are the product of submitted
transactions and not simulations. This work is a pioneer in
many respects including providing a validated solution to
increase throughput and probability of transaction inclusion
by 92.9–94.9%.
7 Conclusions and Future Work
The mechanism of asynchronous submission of transactions
and the offline collection of transactions for broadcasting
later on can be merged to realize a practical methodology to
submit transactions in the blockchain. Asynchronous
136 N. Khan and R. Ouaich
submission can be impractical depriving the users of
accessing the blockchain during the timeouts. A combination
as stated above of asynchronous with offline mechanism can
be more realistic from the perspective of providing a good
user experience for the dapp and can be seen in Fig. 8.
During the timeout for the combination methodology, the
read requests by the users can still be returned by Geth
searching the local copy of the blockchain. A new block is
created every 15 s in Ethereum [45] and to ascertain it’s
inclusion in the main chain at least 3 block confirmations are
needed [47] so a timeout of even 45 s would be able to fetch
relevant data for the read queries by the users if they are
present in the recently added blocks. The transactions sub-
mitted would get stored in the local cache for Geth.
In the implementation governing asynchronous transac-
tion submission, the throughput has already been evaluated
and tested to lie in the interval 92.9–94.9% and this imple-
mentation can be visualized as in Fig. 7. The tests for a
combination of the two above mentioned mechanisms were
carried out by selecting random timeouts. A timeout of 30 s
was chosen in which there was no Internet connectivity and
this was followed by a period of 30 s in which the node was
connected to the blockchain. A bash script was run in par-
allel throughout the time transactions were submitted to
repeat this timeout persistently. A mean throughput of
64.76% was recorded. The second test was conducted with a
timeout of 10 s of no Internet connectivity followed by
Internet connectivity for 80 s. A mean throughput of 53.04%
was obtained. The tests were repeated for a total of 40,000
transactions. It is thus observed that the choice of timeout
has a major impact on the throughput.
Another peculiar observation during testing for the
propositions was that the first batch of 10,000 transactions
had a throughput of 94.53%, which was followed by another
batch with 64% and then it dropped drastically in the sub-
sequent two batches to 25.47 and 25.83% respectively. The
possible explanation for this is that blockchain is presently
not able to handle a high load. The throughput will be good
for low loads and fall sharply for a high load on the
blockchain network. Asynchronous divides the load through
the timeouts. In the wake of the improvement in throughput
asynchronous transaction submission offers, it is imperative
that more work be done on Proposition II (see Fig. 8)to
provide a continuous access to the blockchain service, while
retaining the throughput increase recorded in Proposition I
(Fig. 7).
Stress test results reveal that maximum throughput is
obtained in asynchronous submission of transactions and it
is the most stable in terms of performance. Scalability issues
exist in both Ethereum and Hyperledger. The ideal
throughput evaluation in this paper might decrease when an
extremely high number of transactions are submitted in
parallel from different nodes in Ethereum on account of
network congestion. In Hyperledger too the performance
would deteriorate because of increase in the number of nodes
[8]. As per test results better throughput would be obtained
when multiple users interact with the blockchain through a
node. A business organization can set up several nodes as
Ethereum clients, distributed globally based on the number
of potential users and target markets. It was computationally
expensive to mine for the requisite ethers to submit more
than 0.3 million transactions on the public testnet and the
Fig. 7 Proposition I
Feasibility Analysis of Blockchain for Donation-Based …137
tests conducted provide a real benchmark of the performance
of the blockchain through a dapp and a smart contract.
Zakaah dapp to implement a donation-based crowd-
funding platform on blockchain would be a better proposi-
tion presently to avoid the costs of setting up a private
network. No reliable data is available on the total number of
Zakaah donors and the average donations made by them
annually or during Ramadhan enabling an estimation of the
average number of transactions needed per donor. The
importance of such an application can be realized from the
fact that if an amount equivalent to Zakaah, $192.5 billion
[48] is taken from the total wealth of $7.7 trillion dollars of
2043 billionaires in the world [49] then this has the potential
to help 12.3 billion people. This is equivalent to 1.77 times
more than the world’s population [48]. Considering the
future implications and in the absence of requisite data, the
optimum approach is to use the Zakaah dapp in a small
geographical region limiting the number of users to gather
usage statistics by employing the proposed asynchronous
transaction submission mechanism until an optimization for
Proposition II is reached.
Acknowledgements This work is funded by the Luxembourg
National Research Fund under it’s AFR-PPP Programme, which is
aimed at providing Ph.D. and Post Doc grants for innovation and
industry partnerships. The work came into execution by the efforts of
Anass Patel from ConexCap [50] under the able guidance of Dr. Radu
State from Services and Data Management in Distributed Systems
Research Group [51].
References
1. 2016 World Hunger and Poverty Facts and Statistics: http://www.
worldhunger.org/2015-world-hunger-and-poverty-facts-and-
statistics/
2. Luhby, T.: 71% of the World’s Population Lives on Less Than $10
a Day. CNN Money ’15. http://money.cnn.com/2015/07/08/news/
economy/global-low-income/
3. Islamic Relief, UK: http://www.islamic-relief.org.uk/
4. Global Humanitarian Assistance: Understanding the Role of Zakat
in Humanitarian Response
5. Soghoian, C., Friedrichs, O., Jakobsson, M.: The threat of political
phishing. In: Proceedings of the Second International Symposium
on Human Aspects of Information Security and Assurance,
HAISA (2008)
6. NPR - National Public Radio: Special Report: The American Red
Cross - Red Cross Spent 25 Percent of Haiti Donations on Internal
Expenses. http://www.npr.org/2016/06/16/482020436/senators-
report-finds-fundamental-concerns-about-red-cross-finances
7. Snow, P., Deery, B., Lu, J., Johnston, D., Kirby, P.: Business
Processes Secured by Immutable Audit Trails on the Blockchain
(2014)
8. Dinh, T.T.A., Wang, J., Chen, G., Liu, R., Ooi, B.C., Tan, K.-L.:
BLOCKBENCH: A Framework for Analyzing Private Block-
chains. SIGMOD’17
9. Singh, S., Singh, N.: Blockchain: Future of Financial and Cyber
Security. IEEE (May 2016)
10. Ethereum: Homestead Release: Blockchain App Platform. https://
www.ethereum.org/
11. Wood, G.: Ethereum: A Secure Decentralized Generalized Trans-
action Ledger. EIP-150 Revision
12. Solidity Documentation. https://solidity.readthedocs.io/en/develop/
Fig. 8 Proposition II
138 N. Khan and R. Ouaich
13. Bhargavan, K., Delignat-Lavaud, A., Fournet, C., Golla-mudi, A.,
Gonthier, G., Kobeissi, N., Rastogi, A., Sibut-Pinote, T., Swamy,
N., Zanella-Beguelin, S.: Formal Verification of Smart Contracts
(August 2016)
14. BBVA Research: Smart Contracts: The Ultimate Automation of
Trust? Digital Economy Outlook (2015)
15. Ethereum Homestead: Contracts and Transactions: Dapps. http://
ethdocs.org/en/latest/contracts-and-transactions/developer-tools.
html
16. IBM Blockchain Based on Hyperledger Fabric from the Linux
Foundation: https://www.ibm.com/blockchain/hyperledger.html
17. Sustainable Development Goals, SDG’s: http://www.undp.org/
content/undp/en/home/sustainable-development-goals.html
18. Puad, N.A.B.M., Rafdi, N.B.J., Shahar, W.S.S.B.: Issues and
challenges of waqf instrument: a case study in MAIS. In:
E-proceedings of the Conference on Management and Muamalah
(CoMM 2014), 26–27, Synergizing Knowledge on Management
and Muamalah (E-ISBN: 978-983-3048-92-2) (May 2014)
19. Ropsten Revival Testnet: https://ropsten.etherscan.io/
20. Blockchain Stress Testing Scripts and Results. https://github.com/
nidakhanlu/blockchain-stresstests
21. Maupin, J.A.: Blockchains and the G20: Building an Inclusive,
Transparent and Accountable Digital Economy. SSRN, 17 Mar
2017
22. Truffle Development Framework. http://truffleframework.com/
23. Webpack Module Bundler. https://webpack.js.org/
24. Demo of the Zakaah Dapp. https://www.youtube.com/watch?v=
Bh3Pkg_UU0k
25. Testrpc - Node.js Based Ethereum Client for Testing and
Development. https://github.com/ethereumjs/testrpc
26. Geth: go-ethereum: https://github.com/ethereum/go-ethereum/
wiki/geth
27. Hewlett Packard Enterprise: Designing Always-on Apps That
Don’t Crash When the Internet Connection Fails. enterprise.nxt
(May 2017)
28. Ethereum: Backup and Restore. https://github.com/ethereum/go-
ethereum/wiki/Backup-&-restore
29. JavaScript API. https://github.com/ethereum/wiki/wiki/JavaScript-
API
30. Demo of the Offline Submission of Transactions in Ethereum:
https://youtu.be/oHVCQvaUbxo
31. Proxmox Virtual Environment. https://www.proxmox.com/en/
32. The Go Programming Language. https://golang.org/
33. ETH Gas Station. http://ethgasstation.info/. Info that existed before
Ethereum’s Byzantium Hard Fork, 16 Oct 2017
34. Writing, Building and Running Chaincode in a Development
Environment. http://fabricdocs.readthedocs.io/en/origin-v0.6/
Setup/Chaincode-setup.html
35. Internal Testing for Parity-only Network. https://blog.ethcore.io/
onwards/
36. Parity, Ethereum Browser. https://parity.io/
37. Transaction Pool Go File. https://github.com/ethereum/go-
ethereum/blob/master/core/tx_pool.go. Lines 125–145
38. https://raw.githubusercontent.com/sivel/speedtest-cli/master/
speedtest.py
39. Tech: NTIA survey: More Americans Using Wireless Internet at
Home. https://www.fedscoop.com/ntia-survey-more-americans-
welcome-wireless-internet-into-their-home/
40. Ethereum Whitepaper. https://github.com/ethereum/wiki/wiki/
White-Paper
41. Gervais, A., Karame, G.O., Wst, K., Glykantzis, V., Ritzdor, H.,
Capkun, S.: On the security and performance of proof of work
blockchains. In: ACM Conference on Computer and Communi-
cation Security (CCS). (2016). https://eprint.iacr.org/2016/555.pdf
42. Anderson, L., Holz, R., Ponomarev, A., Rimba, P., Weber, I.: New
Kids on the Block: An Analysis of Modern Blockchains. CoRR
abs/1606.06530: n. pag. (2016)
43. Ethereum Benchmarks. https://github.com/ethereum/wiki/wiki/
Benchmarks
44. Gervais, A., Ritzdor, H., Karame, G.O., Capkun, S.: Tampering
with the delivery of blocks and transactions in Bitcoin. In:
Proceedings of the ACM Conference on Computer and Commu-
nication Security (CCS) (2015)
45. ETH Gas Station: Current Dynamics of Transaction Inclusion on
Ethereum. (April 2017). https://medium.com/@ethgasstation/
current-dynamics-of-transaction-inclusion-on-ethereum-
ae8912edc960
46. Kosba, A., Miller, A., Shiy, E., Weny, Z., Papamanthou, C.:
Hawk: The Blockchain Model of Cryptography and Privacy-
Preserving Smart Contracts
47. Coinbase Support: How do I Send Digital Currency? https://
support.coinbase.com/customer/portal/articles/971437
48. Islamic Relief Annual Reports: Calculations Done from Data in the
Annual Reports. http://www.islamic-relief.org.uk/about-us/annual-
reports/
49. Forbes: The World’s Billionaires. https://www.forbes.com/
billionaires/#55eb261d251c
50. ConexCap: Building Financial Trust With and For Communities.
http://www.conexcap.com/
51. SEDAN, Services and Data Management. https://wwwen.uni.lu/
snt/research/sedan
Feasibility Analysis of Blockchain for Donation-Based …139
Foreign Policy of the United Arab Emirates
(UAE): Continuity and Change
Mariam Alzaabi
Abstract
This paper analyzes how the United Arab Emirates
(UAE) foreign policy was built, developed, and evolved
by exploring the state’s foreign policy tools throughout
two major periods of time; the Zayed era (1971–2004)
and the post-Zayed era (2004–today). It utilizes various
theoretical methods, concepts, and frameworks of inter-
national relations such as ‘small states’and ‘soft power.’
The paper examines the role of changing leadership, and
the effects of regional and international events—such as
the Arab Spring—and globalization on the UAE foreign
policy in the post-Zayed era. By comparing different
aspects of continuity and change in the state’s foreign
policy tools across the Zayed and post-Zayed eras, the
paper concludes that UAE’s foreign policy in the
post-Zayed is a dynamic period that did not pivot away
from the original foreign policy goals and principle of the
Zayed era. The paper finds that the UAE foreign policy in
the post-Zayed era is a mere progressive continuation of
the Zayed FP goals and principles.
Keywords
UAE foreign policy Foreign policy tools
Small states Soft power Hard power
1 Introduction
In the past two decades, the UAE grew as one of the most
assertive and dynamic forces of the Middle East and North
Africa (MENA) region. The UAE is no longer holds the
image of a small rentier state of the Arabian Gulf as it
progressed into a key regional player with soft power, eco-
nomic and military might. For instance, the Economist
magazine has referred to the current UAE administration as
one that functions like a ‘Little Sparta,’emphasizing on the
UAE’s growing hard power capabilities [1]. On the other
hand, Dubaization [2] is now an actual term that is used to
describe ‘the process of urbanizing a city with futuristic,
pioneering architecture,’which speaks volumes to the
UAE’s soft power and vision of transforming itself into a
global hub and a brand for development and prosperity. The
UAE’s current outlook is a huge transformation considering
the fact that the UAE was only born four decades ago (1971)
in the turbulent and hostile MENA region. It was a small
monarchic federation, with a small population, a reinter oil
wealth and most importantly a tribal society that lacked the
experience of statehood. Today, oil is no longer the only
driver for UAE’s prosperous ambitions as the country has
moved away from the conventional way of doing things,
adopting a new style of foreign policy (FP) orientation and
application tools.
In this paper, we look at the UAE FP by identifying two
separate Eras of FP behavior, the Zayed era (1971–2004)
and the Post-Zayed era (2004–Today). First, we will
examine the UAE FP goals, principles and tools during the
Zayed era. Second, we will explore the emergence of a new
age of FP during the Post-Zayed era by examining three
different domestic, regional and international factors to
explain the FP orientation of the UAE in the Post-Zayed era.
These factors include the change in UAE leadership, the
Arab Spring and the process of globalization. Finally, we
will showcase different examples of UAE FP tools in the
Post-Zayed era to understand the aspects of continuity and
changes in the UAE FP, and to answer the main question
behind this paper of ‘did the UAE FP in the Post-Zayed era
pivot away from the original FP goals and principles of the
Zayed era?’
M. Alzaabi (&)
College of Security and Global Studies, American University
in the Emirates, Dubai, UAE
e-mail: mmaalzaabi@gmail.com
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_18
141
2 Literature Review
2.1 UAE Foreign Policy (1971–Today)
There are several prominent books on the subject of UAE
FP; the majority of them were published during the Sheikh
Zayed era (1971-2004). Several authors such as [3–6], have
suggested that there are five major objective conditions that
affected how the UAE FP was constructed during the Zayed
era (1971–2004). These objectives are: the country’s rentier
wealth, its strategic position, small citizen population, Arab
and Muslim identity and finally the tribal connections
between the small Gulf States. [7] also points out similar
attributes by exploring how the UAE came into existence
with a remarkable wealth, a small population that grew to
encompass a large number of foreigners, and federal form of
government in a tribal society like the Arabian Peninsula.
According to [3,5–7], the UAE’s FP during the first
30 years was majorly in the hands of the late Sheikh Zayed
AlNehyan. This is important to note, as it’s unlikely for the
president in most federal states to be the primary source of
authority on FP. They all suggest that Zayed’s charismatic
personality has played a major role in him consuming such
position and dominating the arena of decision-making.
In regards to the UAE foreign policy during the
Post-Zayed era, there are several important works on the
subject that must be highlighted. For instance, [8] provide an
interesting look at the UAE foreign policy during the Zayed
era and the Post-Zayed era. According to [8], the change of
leadership and its effect on UAE FP identity, for instance,
the author clearly points out that Zayed was known for his
wisdom and charisma to mediate issues, while Sheikh
Khalifa bin Zayed (current UAE president) is known for his
emphasis on cooperation and coordination to achieve the
shared goals of the GCC block. Moreover, [8] points out that
the UAE FP during the Post-Zayed era have witnessed three
major changes, all of which are in relation to the new
leadership of the state, which includes the rising role of H.H.
Sheikh Mohammed Bin Zayed, Crown Prince of Abu Dhabi.
Also, [8] emphasizes that the UAE is no longer heavily
invested in Arab and Islamic matters, it’s now more outward
looking in its relations with the west, and consuming a role
of heavily pressuring Iran through the international sphere
and its organizations. Moreover, the author identifies two
major tools used by the UAE in its FP, diplomatic ones and
economic tools affirming the concentrated efforts of UAE
foreign aid policy in its international relations.
In addition, [9] stresses on the new realities of the region
by looking into the effects of the Arab Spring on the different
GCC States. The different chapters of the book [8] highlight
major themes such as effect of regional contexts on the UAE
internal structure and political system change. For instance,
[9] referred to Sheikh Khalifa’s era as an anticipated ‘gen-
erational change’and highlighted the new interests of the
UAE foreign policy because of the changing balance of
power in the region. [9] underlined the important view that
the UAE in the Post-Zayed era is a state that plays a major
role on the Arab front, citing examples of UAE participation
in the Libya No-Fly Zone and Bahrain uprisings.
An interesting view on the development of the UAE FP
after Zayed is provided by an Emirati author [10], who
makes the clear distinction that the UAE FP can be analyzed
through two stages or eras: The Zayed era (1971–2004) and
the Post-Zayed era (2004–Current). Concerning the
post-Zayed era, [10] points out that the UAE have grown
more assertive and dynamic in nature highlighting the cur-
rent active endeavors by the UAE on the international arena.
According to [10], while Zayed’s FP was ‘ideal’consuming
the natural role of a small state, the post-Zayed FP is taking
the international or global direction but totally remaining
realistic in its approach. [10] emphasizes that the economy is
what mobilizes this international approach of UAE FP,
pointing out that other aspects such as security and state
identity are less influential.
Soubrier [11] provide another thought-provoking view
about the Post-Zayed era UAE FP, which studies the
UAE FP through the lens of the country’s domestic and
external environment. The author offers his own under-
standing of the UAE FP orientation throughout both eras, the
Zayed era and The Post-Zayed era. According to [11],
Sheikh Khalifa’s succession had no effect on the overall
direction of the UAE foreign policy. In fact, he looks at the
current UAE foreign policy as a continuation of Zayed’s
legacy in terms of goals, commitments and FP tools. In
addition, [11], emphasizes that the country has ‘re-emerged’
on a regional scale and is more active in the Arab issues,
citing its efforts in the ‘Arab Quartet.’
Moreover, [12] focuses on the fallout of the Arab Spring
on the UAE FP in comparison to Qatar’s FP. According to
[12], the Arab Spring created a power vacuum that forced
GCC states to compete amongst each other to take charge of
the Arab World. Ulrichsen [12] Emphasizes on how the
Arab Spring drove the UAE to pursue a security policy that
stresses on the credibility of the ruling family. Furthermore,
[12] highlights that UAE post Arab Spring is no longer
‘armed neutral,’the UAE is now projecting actual hard
power through its participation in several operations like
Bahrain, Libya and most importantly in Yemen. Neverthe-
less, this is not evidence that the UAE is shying away from
its core FP principles and FP continuity. In fact, [12] argues
142 M. Alzaabi
that the UAE’s participation in these military operations is in
fact serving the country’s sovereignty in terms of regime
legitimacy and survival strategy.
Finally, one of the most updated and recent insights on
UAE foreign policy is provided by Saeed [13], which focus
on displaying a perspective of how FP making in the UAE
have changed. He adds to the previous works on the
UAE FP by supporting the view that Zayed was keen on
following a FP of cooperation with the international com-
munity and utilizing diplomatic means to resolve issues. On
the matter of UAE FP change or shift, [13] indicates that the
UAE FP change in the post-Zayed era is not related to one
factor (i.e. change in leadership). Nevertheless, it’s rather the
outcome of continuous change in the UAE foreign policy
orientation since the 1990s through the internationalization
of the country and the move away from its focus on Arab
and Islamic dimension.
2.2 Foreign Policy Tools| Soft Power
and Hard Power
States utilize different foreign policy tools and instruments to
pursue achieving their goals, principals and interests
regionally and internationally. According to [6,14], these
foreign policy tools can be seen through the broad categories
of diplomatic tools, economic tools and military tools. They
explain that the diplomatic tools are one the most prominent
instruments states use in FP. According to [6], diplomatic
foreign policy tools include the exchange of resources
through embassies and consulates. He also emphasizes that
it’s also about the skills states employ to partake in the
international system, mainly by joining international orga-
nizations and institution. Close-up Foundation [14] looks at
it as the ability to negotiate terms of interests between states.
Moreover, [6,14,15], all state that economic tools are
activities states use to manage and redistribute its economic
wealth within the state or internationally, and they are usu-
ally linked to activities such as trade, tariffs, sanctions, aid
and subsidies. Finally, [15] identifies military instruments as
those activities of participating in military operations,
mobilization of troops, starting wars, and armed
interventions.
On the other hand, [16,17] point out that foreign policy
tools can be seen through the lens of power types identified
by [16] himself such as ‘Soft Power’and ‘Hard Power.’
Hard power would include tools and instruments of coercion
by threatening other states and achieving the FP goals and
interests by force. Clear examples of hard power tools would
be the use of military tools by waging a war, or the use of
economic tools of sanctions. Whereas tools of soft power, a
term coined by [16] in 1991, include actions that would
stimulate attraction based on values, culture and politics.
Soft power instruments co-opt rather than coerce, and they
would usually include diplomacy, foreign aid and public
diplomacy.
In addition, for the UAE, [14] points out that diplomacy,
economic instruments and media are the most prominent
instruments of foreign policy used during the Zayed era. In
his explanation for disregarding the military tools in Zayed’s
Foreign policy era, [14] clarifies that the UAE have disre-
garded military instruments due to the country’s‘smallness’
and its ability to successfully employ other tools to serve
protecting its national interests.
3 UAE FP: The Zayed Era
3.1 UAE FP Goals and Principles
and the Leadership Dimension
The main FP goals of all states include maintaining state
sovereignty, supporting national security, building power
capacity, increasing the level of economic prosperity,
strengthening its international standing and achieving inter-
national peace and stability [6]. For a small state like the
UAE, its minimum target of FP includes the different aspects
of maintaining its state sovereignty, protecting its national
interests and deterring outside influences [4].
However, the leadership dimension is a key part of the FP
making in most states. For the UAE, its FP was mainly the
reflection of its founder, Sheikh Zayed AlNehyan, values
and political perceptions [6]. In 1972, Zayed laid out the
main goals of the UAE foreign policy during his first ever
speech as a president [6]. He emphasized on how the UAE
foreign policy is all about resolving conflicts peacefully with
neighboring countries, supporting Arab causes, coordinating
with Arab states in all fields, and committing to the inter-
national principles of the UN Charter [6].
On one hand, Zayed’s identity as an Arab and Muslim
guided the UAE into adopting this set of FP goals. For
instance, his sense of belonging to the Arab world is what
motivated the UAE to be a great advocate and supporter for
the Palestinian case. Moreover, the Islamic value of
humanitarian support is a clear motivator for UAE’s out-
standing record in providing foreign aid for the Arabs and
the Muslim world.
One the other hand, the distinctive features that are dis-
played in Sheikh Zayed’s speech happen to also be a typical
set of behaviors that small states tend to follow. For instance,
small states tend to limit their behavior to their immediate
geography, project a lower contribution in world affairs, and
focus more on regional issues [18]. For the UAE, this
translate into a foreign policy that is focused on establishing
cardinal relations with neighboring Gulf States and limiting
their influence to the Arab and Muslim dimension [5].
Foreign Policy of the United Arab Emirates (UAE) …143
Hence, we could say that objective conditions that define the
UAE FP of the Zayed era include the different small state
attribute of size and population, but also its remarkable oil
wealth, its strategic position, and most importantly its lead-
ership. In the next section, we will showcase the different FP
tools used during the Zayed era to showcase how they’re the
reflection of Zayed’s FP perceptions and values as a leader.
3.2 Zayed FP Tools
Quiet Diplomacy: Iran and the Three Islands. Diplomacy
is often regarded as the most prominent tool in FP. As for the
UAE, it was the late Sheikh Zayed who initiated the concept
of ‘quiet diplomacy’as an important part of the UAE FP
strategy, especially with his way of handling the ‘three
islands dispute’with Iran [14]. Back in 1971, Iran was able
to utilize the British departure from the area to its benefitas
the later have controlled the area and served as a hegemonic
power for a long time [8]. Consequently, Iran occupied the
three islands known as the greater Tumb, the lesser Tumb
and Abu Mosa on the eve of the UAE independence from
the British, and Iran evicted the islands inhabits from their
homes, which led many of them to flee to Ras Alkhaima
[19]. Iran claimed that those islands are part of its territory,
and there was no power to stop it from doing so. According
to the author, Zayed had little room to act upon as his new
state was fragile with no real power or allies, and Iran was
fully aware of that [5].
Nevertheless, the UAE’s emphasis on good neighborhood
and mutual understanding is highly motivated by Zayed’s
own values, which can be clearly found in his own words
[20]:
The truth is that we always seek to have our relations with our
neighbors based on full understanding and strong brotherly ties.
We can never seek to harm our friends or neighbors. If there is
any conflict or misunderstandings between us and a neighbor,
friend or brother, we turn to God and ask him to inspire us
patience and ability to get with the friend or brother and
neighbor to an understanding that benefits the two parties
without resorting to the detriment of the interests of the two
countries or lead them to armed conflict.
As a result, Zayed used his famous ‘quiet diplomacy’
policy through protesting the Iranian claims through inter-
national platforms including the Arab League. The Emirati
claims over the islands were also showcased in a quiet
manner in the United Nations (UN) to avoid making a huge
problem out of it. Thus, diplomacy was a major tool to
establish the UAE’s historic claims over the areas and
avoided going into a war that was going to lead to ciaos in an
area that is already filled with unrest [14]. One can measure
the success of such FP tool by the fact that the UAE was able
to gain the Iranian recognition back in 1972.
Economic Embargo: The Oil Crisis of 1973. A very
distinctive feature of the UAE FP is its commitment to Arab
and Islamic affairs, especially the Palestinian case [13]. As a
result, the UAE utilized a different set of FP tools in support
of the Arabs and the Muslim world. The UAE utilized a
negative economic tool through the oil embargo of 1973,
and a positive economic tool developing a foreign aid
policy.
When the Arab-Israeli war of October 1973 broke out, the
United States (US) president Richard Nixon pushed for an
over 2 million US dollars of additional support to Israel to
support the Israelis in the war [5]. Many Arab states viewed
this as an act of ‘indirect’intervention. As result, King Faisal
of Saudi Arabia came up with the idea of an ‘oil boycott’on
states supporting Israel, and asked the same from Arab states
with oil wealth. Eventually, the Organization of the Petro-
leum Exporting Countries (OPEC) was able to reach an
agreement of cutting exports by 5% only on states sup-
porting Israel. Nonetheless, Sheikh Zayed intervened calling
for a total ban of oil export on the US, as the 5% sanctions
will not do the US any harm [5].
The UAE’s participation in the Oil Embargo was greatly
influenced by UAE’s leadership, it’s values and core
believes. For instance, Zayed made the famous line of “Arab
oil is not dearer than Arab blood,”[21] emphasizing the
importance of Arab Unity for the UAE. Thus, the UAE was
able alongside other Arab oil exporting states to maintain an
oil embargo for six months from October 1973 to March
1974. The UAE was able to cut its oil export to both US and
Netherlands due to their support for Israel during the war
[13]. For the first time in Arab history, oil was able to unify
the Arab nations to pursue an interest that they could all
agree on, rather than look at Arab unity as sharing the same
history, language and religion. Besides, the embargo was
seen as a success as it was able to pressure countries such as
Japan to withdraw its support for Israel, which resulted with
lifting the ban on Japan [6].
Soft Power: Foreign Aid Policy. Another main theme in
Zayed’s foreign policy was his focus and interest in con-
tributing to the Islamic world. One way of achieving that
was through an international foreign aid and development
policy. At the early stages of the UAE history, the Arab
states were the main target of the UAE foreign aid policy.
Many of them were countries engaged in the Arab–Israeli
conflict such as Palestine, Egypt and Syria [11].
As a matter of a fact, the Arab world received more than
half of the UAE aid in the early years of the federation [8].
So, only four years after its establishment, the UAE managed
by 1975 to provide more than 9% of its GDP in the form of
foreign assistance [8].
According to annual Abu Dhabi Fund for Development
(ADFD) of 1974–1975, the countries that received UAE
144 M. Alzaabi
foreign aid in the form of loans during that period were
Jordan, Bahrain, Tunisia, Syria, Egypt and Yemen [22]. In
1976, the annual ADFD report showed how the UAE started
expanding its foreign aid receivers to include countries from
the Muslim world such as the Republic of Mali, Rorundi
Republic, Malaysia, Bangladesh and Sri Lanka [23]. By
2003, the ADFD have provided 152 loans to 45 countries of
a value reaching 11399.85 million Dirhams with the Arab
state still getting the major share of the loans provided in
terms of values reaching a 77.18%, Asian countries received
15.78%, African countries received 4.67% and the rest of the
world 2.37% [24]. Today, just like in 1975 and 1991, the
UAE remains at the top of the countries in terms of its
foreign aid programs in relation to its GDP, which we will
discuss later in the following chapters.
We can see Zayed’s regard for the values of Islam and
humanitarian work were evident in the way he described his
foreign aid policy:
We in the Gulf are pursuing our foreign policy in two parallel
directions. In our relations with the Arab and Islamic countries,
we regard it as the relationship of the brothers in Islam imposed
by our religion. We treat these countries the way siblings would
treat each other. The other line is purely human. In this world, we
have a duty in the way we treat human beings, to respect them as
human beings in order for them to respect us as human beings,
and to be as much of a friend to them as they are to us [20].
Hence, one can’t underestimate Zayed’s role and lead-
ership, as he truly believed of sharing this wealth. It was the
Zayed factor, his charisma and words that gave the UAE the
credibility and respect of other nations.
4 The Post-Zayed Era
4.1 UAE Foreign Policy Change
and the Leadership Dimension,
the Arab Spring and Globalization
As we’ve pointed out previously, the UAE FP during the
Zayed era was the result of Zayed’s own set of believes,
personality attributes and ideology. Therefore, it’s vital to
understand the role of leadership and decision makers who
took place after Zayed to analyze and make sense of the
changes in UAE FP during the Post-Zayed era. While the
change in UAE leadership is an important ‘domestic’factor
in shaping the new Post-Zayed era FP, there are also other
factors that can explain the current orientation in the UAE FP
interests. Both the ‘Arab Spring’and the process of global-
ization have majorly acted as forces that helped push the
UAE toward a new progressive and international looking FP.
UAE President, His Deputy and the Crown Prince of
Abu Dhabi. The ‘who’factor in understanding the UAE FP
from 2004 until today is not as clear as it was back in
Zayed’s era. The UAE after 2004 did not only witness the
succession of Sheikh Khalifa Bin Zayed as a President, but it
also saw the succession of Sheikh Mohammed Bin Zayed
(MBZ), Sheikh Khalifa’s half-brother, as the new Crown
Prince of Abu Dhabi. Besides, it also saw the succession of
Sheikh Mohammed Bin Rashid (MBR) as the Vice President
and ruler of Dubai later in 2006. According to Sheikh Dr.
Sultan bin Mohammed AlQasimi, Ruler of Sharjah, descri-
bed the leadership of Sheikh Khalifa as someone who likes
to work ‘quietly,’and that he’s supported by a ‘new blood’
of young decision makers referring to both MBR and MBZ.
Hence, we identify those three personalities as key to
understanding the leadership dimension of the UAE FP in
the Post-Zayed era.
MBZ is widely known for his military grounded per-
sonality and career, which explains the realistic approach
and assertive decisions the UAE has taken in the Post-Zayed
era. According to an article in The Economist, the magazine
identifies MBZ as the driving energy behind the UAE’s
current ambitious and active FP, which is true since Sheikh
Khalifa fell ill back in 2014, and was absent from the
political scene [1]. On the other hand, MBR drives the lib-
eral strand of UAE FP. He is someone who is best described
by his own words as he aspires to put the UAE ‘to be
number one, not in the region, but in the world’[25]. MBR
consume a crusader leadership style of always being bold
and impetuous, pushing the boundaries of his context, and
having a clear vision in which he’s pursing without any
hesitation. Thus, explaining the outward looking aspect in
the UAE FP and the emphases on soft power instruments.
The Arab Spring and Globalization. The ‘Arab Spring’
or the uprising events of 2010 that took place in different
parts of the MENA region created a huge power vacuum,
which led to a furious competition among Gulf nations to
take on leadership of the Arab world [12]. To most Gulf
monarchies, the changes in the region’s dynamics were
perceived as a security threat. For the UAE, this new reality
of a reshaped Middle East meant adopting a new wave of
diplomatic and security measures to ensure the safety and
stability of the UAE, the gulf, and the region. That meant the
use of both hard power and soft power regionally and at
home with the main interest being restoring peace and
security, and ensuring the legitimacy of the ruling families.
As a result, the UAE participated in different events such as
the 2011 Bahrain uprisings, Libya No-fly Zone and dis-
mantling the Muslim Brotherhood branch at home
(Al-Islah).
Moreover, the process of globalization and the interna-
tionalization of markets had remarkable effects on the UAE
economy, society and worldwide interaction. This process
has made it possible for a small nation like the UAE to be
more proactive in the international system through trade and
investments. For instance, the different investments that the
Foreign Policy of the United Arab Emirates (UAE) …145
UAE is making in different parts of Asia and Africa are
evidence to the country’s commitment to having strategic
international partners. This is clearly stated in the UAE’s
Foreign Ministry website through a message from UAE
Foreign Minister, H.H. Sheikh Abdalla Bin Zayed AlNeh-
yan, as he points out that the goal of UAE diplomacy is to
enhance bilateral relations with different parts of the world
emphasizing that ‘The UAE holds an influential position in
several international and regional organizations, and have
many friends all over the world. We look forward to bol-
stering our relations with the fast growing countries, such as
India, Russia, China, Brazil and South Africa’[26].
4.2 Elements of Continuity and Change
in UAE FP
Continuity: The Soft Power of Foreign Aid. Foreign aid
and humanitarian assistance remains at the top of the tools
and FP priorities of the UAE in the Post-Zayed era. We can
clearly see this as the UAE pledged to continue its commit-
ment to the field of humanitarian work especially after the
dreadful terrorist attack that led to the death of the UAE
ambassador to Afghanistan earlier this year. In January 2017,
an Emirati envoy of five-aid workers alongside the UAE
ambassador of Afghanistan, Juma Alkaabi, was killed during
a humanitarian aid mission [28]. The attack was well planned
and it was mainly targeting the Emirati personals as the group
was meant to celebrate the opening of a new orphanage in
Kandahar. Since that incident, the UAE Red Crescent has
sent 37 envoys, emphasizing on the true committed of the
UAE and its leader’s[27]. Moreover, it is no secret that the
UAE is considered one of the most generous nations in the
world when it comes to foreign aid and humanitarian assis-
tance. In fact, back in 2015 the UAE was able to score as one
of the top 10 largest donating countries in terms of Official
Development Aid (ODA). It was able to land as the second
highest ODA to Gross National Income (GNI) ratio of 1.09%
with an amount of 16.1 billion dirhams in terms of ODA [29].
Elements of Change in UAE FP. While the limitation of
being a small state used to constrain UAE FP behavior in the
Zayed era, the emergence of a new UAE leadership, the post
Arab Spring status of the MENA region and the process of
globalization have all forced the UAE to adopt new interests
and achieved them through different tools of FP such as soft
power instruments and hard power tools. While hard power
is mostly known as the utilization of military tools and
means of coercion, soft power as a tool of FP is complex in
nature as it requires a long term commitment of building up
a reputation for the state in certain fields that co-opt others
into buying the state believes and values rather than the use
of force or coercion. According to [15], the old state of
power politics where states acquisition of arms and strong
economy is no longer as relevant as the new age of infor-
mation where the right type of public diplomacy can yield
more gains than a hard power instrument [30]. This is
exactly what the UAE in the Post-Zayed era strives to
achieve through state branding and tourism. This aspect of
UAE FP is an element of change as a result of its new
interest of outward looking FP. Nevertheless, the UAE was
also able to defy the rules of its smallness by investing
heavily in its hard power and showcasing to the world that
it’s a regional power with military capabilities.
State Branding and Image Creation: Tourism. A new
interest of the UAE in the Post-Zayed era is to be more
outward looking and become an internationally influence.
One way of achieving that was through adopting soft power
instruments by the new leadership of the UAE in the
Post-Zayed era. In fact, just recently in April 2017, MBR
announced the creation of a government council called the
‘Soft Power Council’that will have the mission of drafting a
nation-wide strategy to drive the UAE forward through the
tools, instruments and appeal of soft power [31].
Today, the UAE is home to the busiest airport in the
world, Dubai International Airport that receives international
passengers of over 80 million a year, overtaking London
Heathrow Airport again this year [32]. According to Dubai
Airports Strategic Plan 2020, the Emirate is pumping an
investment of over 7.5 billion US dollars to expand its air-
port and airspace program to increase the capacity of Dubai
International Airport to 90 million by 2018 [32]. In 2016
alone, Dubai was able to host over 14 billion tourists with a
5% increase from the numbers of 2015, while aiming to
target 20 million visitors by 2020 [33]. The Emirate is one of
the hottest tourist destinations, and it is the 7th most visited
city in the world according to [34].
Moreover, to prove Dubai’s exceeding success in reaping
the fruits of its soft power and creating an international
appeal as a brand, the Emirate was able to run for hosting the
World Expo 2020 and it won. That makes Dubai the first
ever MENA country to host the World Expo, which only
adds to the long-standing efforts of Dubai to position itself
on the world map. On the other hand, Abu Dhabi, the UAE
capital, has also made different efforts that complement those
of Dubai’s. Rather than focusing on the appeal of tourism,
Abu Dhabi has been heavily investing in the field of ‘sus-
tainable energy.’This is an outstanding move by an Emirate
that is greatly dependent on fossil fuels to sustain its econ-
omy. Moreover, Abu Dhabi’s efforts were put to the test
back in 2009 when it was trying to win the bid of hosting the
headquarters of the International Renewable Energy Agency
(IRENA) against two major European powers like Germany
and Austria [35]. The Abu Dhabi win was a huge diplomatic
success that speaks volumes of UAE’s soft power.
Increased Hard Power. A clear example of the UAE’s
dynamic progress in its FP can be seen through the lens of
146 M. Alzaabi
increased military actions, especially after the Arab Spring
of 2011. According to Soubrier, the Post-Zayed era wit-
nessed a change in its ‘military neutrality’policy that
focused on dispatching its military forces for mostly
peacekeeping operations. [14]. For instance, during the
Zayed Era, the UAE have been part of several international
peacekeeping operations to restore peace and security such
as in the case Kuwait (1991), Somalia (1992) and Kosovo in
1999 [36]. This legacy of participating in peacekeeping
operations has continued throughout the Post-Zayed era. For
example, from 2007, UAE troops were part of a UN mission
in Afghanistan and the UAE military was part of a search
operation in 2014 when the Malaysian airlines plane MH370
went missing [37].
Nevertheless, the Post-Zayed era has witnessed more
assertiveness in its use of military forces. For example,
we’ve seen UAE troops in major combats of this age like the
in Yemen, the fight against ISIS, Libya ‘no fly zone’and
Bahrain Uprisings. Hence, questioning whether the UAE use
of hard power in terms of army mobilization as a FP tool is a
change from the UAE FP principles and goals is important to
explore and explain. In the following section, we analyze
take the Saudi led Intervention in Yemen as an example of
increased use of force by the UAE. We argue here that the
UAE is still following its original FP goals by capitalizing
on such hard power as it is using it in the benefit of sup-
porting Arab causes and to preserve its own safety and
security.
The UAE participation in Yemen, The use of Hard
Power Tools. In March 2015, Saudi Arabia led an operation
called ‘Decisive Storm’to support the legitimacy of the
government of Yemen headed by President Abd Rabbu
Mansour Hadi, who requested the intervention of the Gulf
nations to support Yemen’s efforts of combating extremism
and terrorist factions such as Al Houthi and AlQaeda [38].
The UAE played a major role in such operation, amongst
other eight Arab nations, which mostly focused on airstrikes
[13]. However, in April 2015, phase two of the operation
was extended under the name ‘Operation Restoring Hope’
that required Emirati ground troops [13]. The fallout of the
Arab Spring sent clear warning signs to the Gulf in general.
As a result, the Saudi-Emirati front did not hesitate to
intervene in Yemen and act in a response to threat of security
and safety of the region.
The UAE’s decision to intervene in Yemen is in line with
the UAE FP goals and principles of maintaining state
sovereignty and supporting national security and supporting
Arab causes. Therefore, the UAE did not really witness a
shift in its FP by increasingly being active military; it
became more realistic in its approach to how it deals with
threatening situations in the region. In fact, [12] argues that
there are elements of continuity in UAE’s actions of
increased hard power projection as it is all working towards
achieving the FP goal of supporting national security.
Hence, the new UAE FP approach of displaying hard power
is merely to protect state sovereignty, security and survival,
which happen to be in line with the broad FP goals of the
UAE. Thus, while the Zayed era always resorted to peaceful
mediation situations, the Post-Zayed era is responding to
security threats more realistically through actual military
actions.
It’s important to highlight here that the participation of
the UAE in the Saudi Arabian led Intervention in Yemen is
not only a military based intervention. Even though the UAE
is utilizing its armed forces in this case, the country still hold
a strong belief that the only solution to the Yemeni crisis is a
political one, affirming that by supporting the UN resolution
2216 that demands Al Houthis withdrawal [12]. Moreover,
the UAE continued to consume its humanitarian role of
providing aid in parallel to its military work. Hence, this is a
sense of continuity that is still strong in the Post-Zayed era.
5 Conclusion
In conclusion, the UAE has witnessed a great change in its
FP, as it grew to become more realistic and dynamic,
changing the image that a small state can consume. In this
paper, we looked at the UAE FP by identifying two separate
Eras of FP behavior, the Zayed era (1971–2004) and the
Post-Zayed era (2004–Today). The Zayed era (1971–2004)
was mostly about how Zayed’s values, perceptions and
ideology influenced the UAE FP principles, ambitions and
tools for three decades. On the other hand, the Post-Zayed
era (2004–Today) is seen as a progressive development
phase that projects continuation elements and new elements
that portray change due to adopting new interest by the new
UAE leadership, and due to other regional and international
factors. The continuation elements are evident in the UAE’s
constant emphases on foreign aid tools. Instead, the change
elements are evident in the UAE’s new approach of
inversing in building up soft power and hard power capa-
bilities. We’ve highlighted the different efforts done by the
UAE to diversifying its FP tools by emphasizing on the
cultivation of a soft power appeal through tourism and brand
creation, but also through building up hard power capacities
in terms of military capabilities.
Finally, to answer the core question of this paper of ‘did
the UAE FP in the Post-Zayed era pivot away from the
original values and goals set by the late Sheikh Zayed or is it
a mere progressive continuation of the Zayed FP goals and
principles?’We rationalized how the progress of the
UAE FP in the Post-Zayed era should be seen as the out-
come of a new leadership in the UAE, the changing envi-
ronment of the Middle East after the Arab Spring and our
globalized world. These different factors have allowed a
Foreign Policy of the United Arab Emirates (UAE) …147
small state like the UAE to gain more leverage and project
its own voice regionally and internationally. Thus, the cur-
rent Era of UAE FP is simply progressive, dynamic and
realistic with a level of assertiveness that is changing the
image of small state behavior in the modern age of the 21st
century. Therefore, there are new UAE foreign policy
interests and response tools as a result of different domestic,
regional and international factors. Yet, they are in the line
with the general goals and principles of the Zayed era FP.
References
1. The Economist. https://www.economist.com/news/middle-east-and-
africa/21720319-driven-energetic-crown-price-uae-building-bases-
far-beyond-its. Last accessed 06 Apr 2017
2. Dubai Post. http://www.dubaipost.ae/en/stories/dubaization-gets-
the-world-talking-2017-04-26-1.1521. Last accessed 26 Apr 2017
3. Vine, P., Abed, B.: United Arab Emirates: A New Perspective. In:
Hellyer, P., Abed, I. (eds.), pp. 161–168. Trident Press, London
(2001)
4. Abdulkhaleq, A.: Initiatives and Responses in UAE’s Foreign
Policy. Center for Strategic and International Studies, Abu Dhabi
(2001)
5. Rugh, W.: Diplomacy and Defense Policy of the United Arab
Emirates. Emirates Center for Strategic Studies and Research, Abu
Dhabi (2002)
6. Obeid, N.: The Foreign Policy of the United Arab Emirates
between Theory and Practice. Al-Moassasa Al Jami’iya Lildirasat
(Majd), Lebanon (2004)
7. Heard-Bey, F.: Abu Dhabi, the United Arab Emirates and the Gulf
Region: Fifty Years of Transformation. Gerlach Press, Berlin
(2017)
8. Almezaini, K.: The UAE and Foreign Policy: Foreign Aid,
Identities and Interests. Routledge, New York (2011)
9. Ehteshami, A.: Dynamics of Change in the Persian Gulf: Political
Economy, War and Revolution. Routledge, New York (2013)
10. Abdulla, G.: The Making of UAE Foreign Policy: A Dynamic
Process Model. Emirates Center for Strategic Studies and
Research, Abu Dhabi (2014)
11. Soubrier, E.: Evolving Foreign and Security Policies: A Compar-
ative Study of Qatar and the United Arab Emirates. In: Almezaini,
K., Rickli, J. (eds.), pp. 123–143. Routledge, London (2017)
12. Ulrichsen, K.: The United Arab Emirates: Power, Politics, and
Policymaking. Routledge, Abingdon (2017)
13. Saeed, A.: The Arab Dimension in the Foreign Policy of the
United Arab Emirates, 1990–2003. Center for Gulf Studies,
Sharjah (2010)
14. Close-up Foundation. http://jeffsinn.weebly.com/uploads/4/0/2/3/
40232083/national_interest_foreign_policy_lesson_planvfinal.pdf.
Last accessed 01 Apr 2017
15. Nye, J.: Soft Power: The Means to Success in World Politics, 1st
edn. Public Affairs, New York (2004)
16. Shimko, K.: The Foreign Policy Puzzle: Interests, Threats and
Tools. Oxford University Press, New York (2017)
17. Jeanne, H.: Small states in World Politics. Lynne Reinner
Publishers, London (2003)
18. Waheeb, S.: The UAE Foreign policy. Raslan, Damascus (2012)
19. AlBayan Newspaper. http://www.albayan.ae/across-the-uae/2002-
11-24-1.1380692. Last accessed 22 Apr 2017
20. The Guardian. https://www.theguardian.com/news/2004/nov/03/
guardianobituaries.israel. Last accessed 22 Apr 2017
21. Abu Dhabi Fund for Development. https://www.adfd.ae/
Lists/PublicationsDocuments/Annual-Report-1974-1975.pdf. Last
accessed 23 Apr 2017
22. Abu Dhabi Fund for Development. https://www.adfd.ae/Lists/
PublicationsDocuments/Annual-Report-1976.pdf. Last accessed 23
Apr 2017
23. Abu Dhabi Fund for Development. https://www.adfd.ae/
Lists/PublicationsDocuments/Annual-Report-2002-2003.pdf. Last
accessed 23 Apr 2017
24. Gulf News. http://gulfnews.com/news/uae/government/mohammad-
i-want-dubai-to-be-no-1-1.95927. Last accessed 02 July 2017
25. Ministy of Foreign Affairs. http://mofa.gov.ae/EN/TheMinistry/
Pages/UAE-Foreign-Policy.aspx. Last accessed 22 May 2017
26. BBC. http://www.bbc.com/news/world-middle-east-38978886.Last
accessed 22 June 2017
27. AlDhafra Channel. https://www.youtube.com/watch?v=6t2aXyz_
PFw. Last accessed 06 July 2017
28. Wam. http://wam.ae/en/details/1395294106778. Last accessed 03
June 2017
29. Project Syndicate. https://www.project-syndicate.org/commentary/
the-new-public-diplomacy?barrier=accessreg. Last accessed 30
July 2017
30. Gulf News. http://gulfnews.com/news/uae/government/mohammad-
bin-rashid-launches-uae-soft-power-council-1.2019003. Last accessed
22 May 2017
31. The National. https://www.thenational.ae/business/dubai-airport-
remains-world-s-busiest-for-international-traffic-despite-slower-
2016-growth-1.63673. Last accessed 22 May 2017
32. Dubai Airports. http://www.dubaiairports.ae/corporate/media-centre/
fact-sheets/detail/dubai-airports-strategic-plan-2020. Last accessed
22 May 2017
33. Gulf News. http://gulfnews.com/business/sectors/tourism/14-9-
million-overnight-visitors-for-dubai-in-2016-1.1974824. Last accessed
22 May 2017
34. Forbes. https://www.forbes.com/pictures/ehlk45iehm/1-bangkok/
#2b3897521b25. Last accessed 30 May 2017
35. The National. http://www.thenational.ae/news/uae-news/uae-wins-
bid-to-house-irena-headquarters. Last accessed 22 May 2017
36. Gulf News. http://gulfnews.com/news/uae/government/uae. Last
accessed 12 June 2017
37. The National. https://www.thenational.ae/uae/uae-armed-forces-
join-search-for-missing-malaysia-airlines-flight-mh370-1.585388.
Last accessed 12 June 2017
38. UAE Embassy in US. http://www.uae-embassy.org/uae-us-
relations/key-areas-bilateral-cooperation/uae-us-security-
relationship. Last accessed 12 June 2017
148 M. Alzaabi
Framing Natural Disaster, Terrorist Attack
and Civil Unrest Crises by Egyptian
Journalist and Citizen Bloggers
Naheda Makhadmeh and Geri Zeldes
Abstract
News blogs provide the media and individuals with
analyses and information about crises. The importance of
news blogs in coverage of crises brings attention to the
importance of examining journalist and citizen bloggers,
and their coverage of three crises: natural disaster,
terrorist attack and civil unrest. The researchers looked
at the differences in using frames, topics, sources, and
modalities. A quantitative content analysis was conducted
of random-sample 441 Egyptian blog posts. Results
showed that citizen bloggers were more likely to cover a
natural disaster, while journalist bloggers were more
likely to cover a terrorist attack and use conflict frame.
The topic most frequently used and got most space by
both bloggers was politics. On the other hand, journalist
bloggers are more likely to use sources (i.e. scientists,
eyewitnesses, media) than were citizen bloggers. Accord-
ing to the modalities, citizen bloggers were more likely to
use images that looked professional and had people in
their posts than journalist bloggers, while journalists are
more likely to use video posts than citizen bloggers. The
implications of these results were discussed. Future
studies could look at the comparison between types of
bloggers in the coverage of two continuous crises or
sudden crises to make sure that the duration does not
make a difference.
Keywords
Citizen bloggers Journalist bloggers Crisis
1 Introduction
Media professionals used to be the only individuals who
could write, publish, and broadcast news through media
platforms such as print newspapers, radio, and television.
However, with the advent of the Internet, important changes
occurred in journalism. The Internet permitted anyone to
create news on online platforms at zero cost and to compete
with media organizations. News blogs are examples of
online platforms, which allow media professionals and
non-professionals to post their opinions of news and analyze
events without limitations or gatekeeping.
News bloggers have provided the media and individuals
with analyses and information about events [1], particularly
crises and disasters. The importance of news blogs in cov-
erage of crises brings attention to the importance of exam-
ining two types of bloggers, journalists and citizen, and their
coverage of three crises: natural disaster, terrorist attack and
civil unrest. The researchers looked at the differences in
frames, topics, sources, and modalities used by each type of
blogger.
Previous framing studies have overlooked the differences
between journalists and citizen writers in crises coverage and
their framing of different types of crises. It is important to
see how previous journalism experience can make a differ-
ence in framing crises. Knowing the difference in framing
crises helps the public to understand the intentions of
bloggers. This study increases understanding of how differ-
ent types of writers framed crises by looking at who was
responsible for the crisis, how a human face was used in the
coverage (personal examples), if the conflict was between
two or more parties, use of moral messages, and the eco-
nomic impact of the crisis. In addition, it helps to know the
main topics, sources, and modalities used by each type of
blogger. This research helps to understand the tasks and
goals of blogging and encourages the audience to learn the
bloggers’backgrounds and interests. The results of this
study also help predict future coverage of crises and extend
N. Makhadmeh (&)G. Zeldes
College of Mass Communication, Department of Journalism,
Yarmouk University, Irbid, Jordan
e-mail: naheda@yu.edu.jo
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_19
149
existing knowledge by identifying different types of bloggers
and their coverage of crises. In addition, this research helps
governments, crisis managers, bloggers, news organizations,
non-governmental organizations (NGOs), and the public to
know what appropriate type of blogger to read and use when
crises happen.
This study is also significant because few studies have
looked at crises coverage in Arab countries [2–4]. This is the
first study that focuses on differences in framing between
journalists and citizen bloggers (e.g., using conflict frame)
and the content of posts (e.g., using images). The researchers
selected Egypt as a case study because it has confronted
three different types of crises: natural disaster, terrorist attack
and civil unrest. The focus on Egyptian crises is up-to-date,
and the opportunity to collect data not only in English, but
also in Arabic, enhances understanding of Arab World
media, especially blogging. Egypt was the first Arab country
to acquire Internet access, which occurred in 1993 [5], and it
has the largest number of blogs in the Arabic blogosphere
[6]. These blogs consist mostly of political content that
engage the public in the political movements, and critique
the political regime [6].
Free blog services such as WordPress, Bloggers, Mak-
toob, Blogspot, and Tumblr made for an increase in the
number of bloggers. Blog engines provide bloggers with free
templates to complement their blog category and subject.
According to Technorati’s annual report, approximately 77%
of global Internet users read blogs [7,8]. The bloggers may
write about politics, women, business, technology, enter-
tainment, lifestyle, sports, and health, among other cate-
gories [9]. The Nielsen/McKinsey Company recently
estimated the global number of blogs to be more than 181
million compared to 36 million in 2006 [10]. Because of this
huge increase in the world’s blogosphere, and the effect of
blogs on the mainstream media it is important to understand
how bloggers are using blogs, to explore different types of
bloggers, and to focus communication research on blogging.
Blogs are important tools that can shape public opinion
about a crisis through framing, which could influence per-
ceptions, impressions, and emotions.
2 Literature Review and Theoretical
Framework
This section covers three parts: (1) Blogging: This part
provides a brief history of blogging, definition of blogs,
types of bloggers, blogging in the Arab World, and blogging
in Egypt. (2) Crises: This part provides definition of crises,
types of crises, and crises in Egypt. (3) Theoretical frame-
work: This part includes media framing, media framing in
the Arab World, framing crises, framing sources, modalities
in the media, and research questions and hypotheses.
2.1 Blogging
History and Definition of Blogs. In 1997, Jorn Barger
1
created the term “web log”or “weblog”to refer the process
of posting daily entries on the World Wide Web [11]. In
1999, Peter Merholz shortened this term to “blog”and
referred to the blog host as a “blogger”[12]. A blog is “a
chronologically organized website updated by an individual
(or a group of individuals) with entries/posts”[13, p. 116].
Blog entries are called “posts”and are shown in “reverse
chronological order”[14]. Each entry contains a title, body,
and date/time. The body can include different elements, such
as text, images, audio, and other types of multimedia.
In 1999, Pyra Labs
2
established Blogger.com,
3
a web
service that allows web users to create their own page and
establish trends, report news, express opinions, concerns and
emotions on any issue of interest [16,17]. This service
permitted bloggers to become producers by interpreting and
analyzing news and information [18].
Blogger.com,WordPress.com and Tumblr.com are the
most popular engines hosting blogs [10,19]. These engines
publish millions of personal, organizational and topic
specific blog posts every day. For example, Tumblr pub-
lishes approximately 28,000 blog posts each minute, or
approximately 20 million posts a day [7,20]. These engines
offer bloggers complete freedom to select unique blog styles,
content and format.
The foremost goal of blogging is to create a conversation
between the blogger and his or her readers, with the hopes of
leading to a better understanding of the information in a post
[21], and to having a conversation with the audience, which
helps to explain and analyze the information [22]. In addi-
tion, blogs are tools for expressing alternative viewpoints
and influencing social and political change. They can be fun,
gossipy, literary, and news sources. This study focuses on
news blogs, which provide their audiences with important
information and news.
Many communication researchers consider news blogs a
type of online journalism [23,24]. Another academic sees
blogs as “transforming the way news and information are
disseminated”in an intimate way [25]. News bloggers pro-
vide their audiences with important information and news,
and they are “the true pit bulls of reporting”[25, para 7].
Types of Bloggers. The types of bloggers depend on the
types of blogs. According to [26], there are four types of
blogs: (1) citizen blogs produced by people, “outside media
organizations;”(2) media blogs produced by professional
1
Jorn Barger is an American blogger whose Robot Wisdom Auxiliary,
established in 1997, was the earliest influential blog on the Web [11].
2
Pyra Labs was co-founded by Evan Williams and Meg Hourihan, the
creators of blogger.com.
3
In 2003, Google bought the Blogger Web service [15].
150 N. Makhadmeh and G. Zeldes
journalists inside media organizations; (3) audience blogs
that permit the audience to “produce on platforms provided
by the media;”and (4) journalist blogs that “journalists
maintain outside their companies”(p. 7). The latter offers
journalist bloggers the freedom to publish posts without any
control or censorship by their media organizations. In this
study, the researchers focused on two popular types of
bloggers within Egypt, journalists and citizen.
Journalist Bloggers
To define the journalist blogger, I have to give a definition of
a journalist. A journalist is a person who works or has
worked as a news writer, reporter, or editor of news in a
newspaper, radio, television station, magazine or other news
medium. In addition, a journalist can also be a person who
works or worked on pamphlets and leaflets [27]. Blogs
enabled journalists to increase their news writing and pub-
lishing activities. Therefore, a journalist blogger is a writer
with journalism background [28].
Journalist bloggers publish personal stories and articles
that they choose not to publish, or fail to publish, through the
professional media on their self-publishing spaces. These
bloggers function as journalists and incorporate the profes-
sional ethics and standards of the journalism industry.
However, not all journalist bloggers are associated with their
organizations. Some of them started blogging after they gain
experience from media organizations, and others are blog-
ging while working as journalists.
Many famous journalists are bloggers. An example of a
well-known American journalist blogger is Kevin Sites, who
covers wars and disasters for ABC, NBC, CNN, and Yahoo!
News [29]. Sites worked with CNN before the outbreak of
the war in Iraq in 2003. On the first day of the war, CNN
asked Sites to stop posting on his personal blog (kevinsites.
net, which is now kevinsitesreports.com). He chose to leave
CNN and continue his blog coverage of the Iraqi war,
freelancing for NBC [26,30].
Previous literature [31] examines why journalists create
their blogs while they are working in the media. The
researchers found that 52% of bloggers do so to analyze and
express their personal views on lead news of media, 28% for
their own creative expression, 13.1% to write about news,
and 6.3% to write about media-related news content, such as
journalistic ethics. In addition, journalist bloggers enjoy
writing when they receive feedback and comments from
readers, which encourages dialogue and continued updating
of their blogs [32]. According [33, p. 97], political bloggers
write to inform their readers, share with them media articles
and unreported news, and to “draw attention to key posts on
other blogs.”This type of blogger tends to write about local
issues [6].
Another research [34] found that 52% of bloggers consider
themselves journalists because they consider their blogs as
newspapers comprised of only op-ed pages [35]. Media workers
collect important information from blogs that are able to high-
light some important issues to the forefront of the public sphere
ignored by the mainstream media [27]. Previous research [36]
states that journalist blogs are a “vehicle for the expression of
nationalistic sentiments or hatred speech”(p. 341), which means
that these bloggers express opinions that they cannot express in
the official media, with particular regard to politics. These
journalist bloggers are using the hyperlinks to refer to the main
sources of information to increase the credibility of their blogs.
About 85% of journalist bloggers provide the links or URLs
extensively to refer to their main news sources, which are
mainly media sites and related materials [37].
Citizen Bloggers
Citizen bloggers, or ordinary bloggers, are not affiliated with
media organizations and write news without journalism
training or experience. They do not depend on the standards
of professional journalism because they are not professional
journalists [26,38]. A citizen blogger engages in news
gathering and reporting, and considers a blog to be a per-
sonal journal for writing personal opinions about events,
communicating with readers via comments, and providing
readers with news, photos, videos, etc. Citizen bloggers are
also known as amateur bloggers [36, p. 333]. They think of
their blogs as a tool for self-expression. They determine their
own editorial standards, including whether to publish under
pseudonyms that “enable the authorities to keep tabs on
potential troublemakers”[39, para 14].
Blogging in the Arab World. A large portion of Arab
bloggers write about sensitive issues such as governmental
and human rights [40] that many people read and track to get
information not readily available in the mainstream press.
Few Arab bloggers write about travel, cooking, art, and other
things. In Egypt, for example, bloggers published videos of
people being tortured in police stations, and others of police
failing to protect victims of sexual harassment [41]. The
limits of freedom of expression laws, or lack thereof in Arab
countries cause many Arab bloggers (especially females) to
write under pseudonyms, while others, such as journalists,
use their real names. However, some of anonymous bloggers
become famous, such as Zeinobia in Egypt.
Political blogs are very popular in the Arab world, and the
number of political blog readers is increasing every day [6,
42]. Political bloggers primarily discuss their local political
Framing Natural Disaster, Terrorist Attack and Civil Unrest …151
leaders, government, and elections, while a few write about
foreign political news. Arab blogs began appearing soon
after the start of the U.S. war with Iraq in 2003 as an
expression of political views, particularly in opposition to
the war and the lack of freedom and rights. Arab bloggers
have used blogs as a platform for societal change and
reform, raising political awareness in the Arab countries,
particularly in Egypt because it has the largest cluster of
blogs in the Arab blogosphere. Egyptian bloggers used their
blogs as a new platform for freedom of expression,
encouraging Internet users in Egypt to bravely share their
opinions about the political system [41,43].
The estimated number of bloggers in the Arab world in
2009 was 600,000, only 150,000 of which are active [41].
The largest number of bloggers in the Arab world is Egyp-
tian (around 33%), followed by Saudi Arabian, Kuwaiti, and
Moroccan. Politics, religion, human rights and culture are
very popular topics in the Arabic blogosphere [6]. The
Egyptian bloggers are focusing on local politics, while Saudi
and Syrian bloggers write primarily about their personal
lives [41].
Many Arab bloggers tend to use Arabic language in their
blogs [44]. However, most Kuwaiti blogs are written in
English, and many Moroccan blogs are written in Arabic and
French. Males represent 66% of bloggers in the Arab world
and nearly 45% of them are between the ages of 25 and 35
[41]. Some examples of the popular Arabic blogs that had
the highest numbers of followers and readers in 2013 were
Ahmad Wld Jedo (http://ahmedjedou.blogspot.com/) from
Mauritania, Heber (http://7iber.org/) from Jordan [45], Sami
Ben Gharbia (http://samibengharbia.com/) from Tunisia and
Manal and Alaa (http://manalaa.net/) from Egypt.
Blogging in Egypt. According to a report by Population
Reference Bureau, the 2013 population of all 25 Arab
countries
4
is approximately 371 million. Egypt has the lar-
gest population among these countries at 84.7 million [46].
With 43 million users, Egypt also has the largest number of
Internet users among the Arab World countries, and has the
second highest number in Africa, with an Internet use per-
centage of 15.5% in 2013 [47]. The Internet provided
Egyptians a place to write about events outside of news
organizations. Blogs, Twitter and Facebook are the main
online platforms used by Egyptian journalists and citizens to
write about local events because these platforms are free of
charge and are subject to little control and censorship to
which news organizations were subjected. Internet forums,
Instagram, YouTube, and other social networking sites were
also used in Egypt to post about local events. Blogs started
in Egypt in 2003. By the end of 2004, 40 bloggers began
writing and maintaining their personal sites. That number
increased to 160,000 by July 2008. More than 30% of
Arabic blogs are Egyptian, and more than 30% of blogs
written in Arabic are Egyptian [48,49], which is the biggest
cluster in the Arabic blogosphere [50].
Previous research [42] found that most Egyptian bloggers
were blogging about the need for change in the political
system, and either in support or protest of political clusters,
such as Kefaya (Enough!), a movement looking to change
the political regime. Many famous political bloggers in
Egypt became more popular after blogging as a part of the
Kefaya movement since its start in 2004, such as Wael
Abbas, Alaa Abdel Fattah, and his wife Manal, who used
their blogs to mobilize the movement’s protests in 2005
[51–53]. The slogan of the pro-democracy movement was
“enough …no to extension …no to heredity.”The pro-
testers railed against Hosni Mubarak who was re-elected for
afifth term and his son, Jamal [43]. This movement influ-
enced the Arabic press and the commentators, and gathered
the political dissidents, activists, sympathizers, and bloggers
in one union [51].
Blogs are a popular media tool for Egyptian people and
that became more visible after the Egyptian Revolution of
2011 [3]. Blogs played a significant role in the uprising,
especially in the first 20 days of the revolution when many
bloggers appeared in the Arab mainstream media to provide
news and information, such as Hossam el-Hamalawy, Wael
Abbas, Nawara Negm, and Amr Ezzat [54]. Fifty three
percent of Egyptian bloggers are young (20–29 years old),
and 73% are male. Egyptian bloggers write in different
languages, mostly in Arabic (67.8%) because it is their
mother language, then English (9.5%), nearly 21% write in
both Arabic and English, and 1.9% speak other languages
[49].
Egyptian journalist and citizen bloggers wrote about what
is happening in their country by sharing links and images of
demonstration suppression, torture of protesters, and people
who have been killed or injured. Renowned Arabian and
Egyptian journalist Mohammed Hasanayn Haykal said that
he is “the greatest reader of blogs”[42, para 2], which is one
sign of this importance as a source of information in Egypt.
Several Egyptian citizen and journalist bloggers were
arrested for blogging about pro-democracy activities,
protesting Islam, or critiquing the political regime and
pushing for change. The first Egyptian blogger, Wael Abbas,
was among them. Ahmad Anwar, another blogger, was
arrested for uploading a video to YouTube of a dancing
Egyptian policeman [55]. These examples show that blogs
can help raise local awareness about issues in the commu-
nities. Another good example of the importance of blogs
during the crises was in the first 20 days of the Egyptian
4
The Arab world consist of: Algeria, Bahrain, Comoros, Djibouti,
Egypt, Iraq, Jordan, Kuwait, Lebanon, Libya, Mauritania, Morocco,
Oman, Israel, West Bank, Gaza Strip, Qatar, Saudi Arabia, Somalia,
Sudan, Syria, Tunisia, United Arab Emirates, Western Sahara, and
Yemen.
152 N. Makhadmeh and G. Zeldes
revolution; many bloggers were stars in Arab media chan-
nels and provided the audiences with information and
analyses [54].
2.2 Crises
Definition of Crises. Historically, the term “crisis”came
from the Greek (kpinein: to separate or to shift). The sepa-
ration between two things were in the interactive community
refers to the boundary. And to explore the boundaries,
people should identify and distinguish what happened that
made this shift [56,57]. Another research [58]define a crisis
as an event that people seek to find causes and make attri-
butions. Other researchers defined crisis as “a serious threat
to the basic structures or the fundamental values and norms
of a system, which under time pressure and highly uncertain
circumstances necessitates making vital decisions”[59,
p. 10]. This definition covers a variety of crisis types, such as
civil unrest, natural disaster, and terrorist attacks. The main
three components of this definition are serious threat,
uncertain circumstances, and urgency of making decisions.
The expected values of any society are safety, health, and
welfare, if something happened that violates these values can
lead to threats and harms. These threats bring uncertainty of
the reasons, consequences and solutions of the threat by
searching for “What is happening and how did it happen?
What’s next? How bad will it be? What can we do? What
happens if we select this option? What will others do?”[60,
p. 44]. When people discuss these questions to find answers,
then it will be a crisis. The urgency of making decisions
during a crisis is also important, and time plays a big role in
facing a threat, and the sooner a decision is made, the better
[60].
Previous research [61] provided a definition of a crisis as
an unexpected or undesirable situation. This unexpected
event happens when a community, an organization, or a
nation notices big threats that may affect its ability to con-
tinue and opportunities for change. According to [60] the
crisis combines “the grave threat and the escape door: the
situation may look bad, but it is not hopeless”(p. 43). That
means that the results of a crisis can be completely negative,
or partially negative.
Types of Crises. In this study, the researchers focused on
three types of crises: natural disaster, terrorist attacks, and
civil unrest. A natural disaster is an adverse event that occurs
because of natural changes on earth. Natural disasters, such
as floods, earthquakes and storms, often cause loss of human
life and property damage, which affects the economy of a
community [62,63]. Recent natural disasters covered by the
media include flooding in Bosnia and Serbia in 2014,
Typhoon Haiyan hitting the Philippines in 2013, and Hur-
ricane Sandy battering the northeastern United States in
2012.
A terrorist attack is defined as a surprise event that uses
violence against civilians to attain political or religious goals
[64]. A historical example of this type of crisis is the
September 11, 2001 plane hijackings by the terrorist group Al
Qaeda, which caused the death of nearly 3000 civilians when
the planes crashed into the World Trade Center Twin Towers,
the Pentagon and a field in Pennsylvania [65]. Civil disorder
or unrest is a form of protest against social and political
problems in a community and is normally started by civilian
groups. This type of crisis can take place in the form of
demonstrations, parades, protests, riots or sabotage. This
research focused on these three types of crises because they
are international in scope. The natural disaster is a main crisis
because it occurs suddenly. After the 9/11 terrorist attacks,
the focus on the terrorist attack crisis became important
because it affects people’s lives and changes communities.
The revolutions in the Arab countries showed that civil unrest
could affect the political systems and communities.
Crises in Egypt. Egypt has the largest population in the
Arab world. Several crises have occurred recently in Egypt
that led Internet users to be more active than in the past.
Civil unrest in particular is a crisis that causes more online
media activity, not only in Egypt, but the entire Middle East,
and has received significant attention from media research-
ers. One of the recent civil unrest crises that occurred in
Egypt was the 2011 revolution, which began the Arab
Spring uprising. Flooding in 2010 and terrorist attacks in
2012 in the Sinai were two other recent Egyptian crises.
Below is a brief summary of each crisis.
Civil Unrest
On January 25, 2011, demonstrations started in the Egyptian
capital of Cairo as a response to an invitation launched by
youth activists on social media and in blogs, calling Egyp-
tian civilians to participate in protests demanding freedom
and human rights. Ironically, the demonstration coincided
with National Police Day. The Egyptian forces used live
ammunition against protesters, killing four and injuring
dozens. The demonstrations spread to other cities, and pro-
testers demanded that President Hosni Mubarak step down,
ending his 30-year tyrannical rule. Protesters staged a sit-in
in Cairo’s Tahrir Square, which has been the focal gathering
point for demonstrations against the regime. In an attempt to
defuse the crisis, Mubarak dismissed the government and
opened dialogue with the opposition, but the demonstrations
Framing Natural Disaster, Terrorist Attack and Civil Unrest …153
continued, eventually forcing him to resign from power on
February 11, 2011 [66]. Between January 25 and February
11, at least 846 people were killed and more than 6400 were
injured [67]. This was the first uprising that brought millions
of Egyptian citizens to gather in the streets.
Terrorist Attacks
On August 5, 2012, the Egypt–Israel border terror attack
took place in the Sinai Peninsula. Sixteen Egyptian soldiers
were killed on the Egyptian military base near the Israeli
Kerem Shalom border crossing, and no Israelis were killed
or injured. This famous attack was the largest Egyptian
operation on the Israeli border since the 1973 war and
received a significant amount of media coverage [68].
Natural Disaster
More than 1500 people died in Egypt because of natural
disasters between 1980 and 2013, and hundreds of thousands
were affected during the same period. Flooding and earth-
quakes are natural disasters that not only affect people, but
also the economy [69]. In January 2010, flooding took place
in several areas in Egypt, including the Sinai and Aswan,
killing 15 people and destroying 40 homes and 57 electrical
towers, causing the evacuation of hundreds from their
homes. This flood was the worst natural crisis in Egypt in
more than a decade, impacting the people, agriculture and
economy of Egypt [70].
2.3 Theoretical Framework
Media Framing. Framing is commonly used in communi-
cation research as a theoretical model [71]. Many framing
researchers characterize media framing as a theory (e.g., [71,
72]), while others consider it to be a method (e.g., [73,74])
or a theory and typology (e.g., [75]). Researchers who use
framing as a method look at how people understand an issue,
event, or situation. When considering framing as a theory,
researchers examine how journalists activate certain frames,
and how the audience is affected by a news frame [71]. This
study is employing framing as a theory.
Empirical literature [76]defined media framing as “subtle
alterations in the statement or presentation of judgment and
choice problems”(1991, p. 11). Iyengar refers to media
framing as a way to tell news stories. Journalists make some
changes to the news context and then present it to the
audiences in a way and shape that is more acceptable.
Entman’sdefinition of media framing is one of the most
cited in communication studies [77]. Another paper by [74]
states that media framing is “select[ing] some aspects of a
perceived reality and mak[ing] them more salient in a
communicating text, in such a way as to promote a particular
problem definition, causal interpretation, moral evaluation,
and/or treatment recommendation for the item described”
(p. 52). The significant elements in his definition are selec-
tion and salience. A journalist’s beliefs, attitude, work
environment and other factors can affect the selection pro-
cess. By making some news facets more salient, news frames
may also consciously or unconsciously interpret causes of
problems, make moral evaluations of events, and provide
treatment for problems. When the media provide people with
solutions and treatments for the problem, issue, or event, it
may affect how they perceive, evaluate, describe and think
about that problem or event, and lead them to a particular
understanding of this news.
Framing is conceptually defined as a strategy employed
by journalists to structure news stories [78] by selecting
aspects of events and creating a relationship among them
[79]. Reese states that “frames are the organizing principles
that are socially shared and persistent over time, that work
symbolically to meaningfully structure the social world”
(p. 11). The main component of Reese’sdefinition is the
organizing process of values and beliefs that are common in
society. He argues that frames have roles in developing the
structure of the social world. This concept of media framing
came from the need to organize news and information in a
form that is more meaningful for readers, which can help
them better understand the content [80].
Another research by [71], who defined frames as schemes
of how to present and understand news, compared between
media and individual frames. He observed that some prior
framing researchers look at media frames as a practical
method that allows journalists to identify information easily
and classify it quickly. Individual frames are how people or
media audiences make sense of news and categorizes them
in groups [71,81]. Also, they refer to individual frames as
“internal structures of the mind”[81, p. 74].
In his paper [82] mentioned the individual frame when he
talked about two different levels of news frames: The first is
the “information-processing schemata”or “event-specific
schema”that refer to individual frames, and the second is
when media “describe attributes of news itself”or
“event-specific schema”(p. 7). Entman explained that this
process creates frames that guide audiences to perceive and
think about the problem or the event, and also lead them to a
particular understanding of the news. In addition, the indi-
vidual frames are “mentally stored clusters of ideas that
guide individuals’processing of information”[74, 1993,
p. 52] that direct individuals to interpret information differ-
ently according to their pervious knowledge and personal
characteristics. In addition, [74] identified four types of
frames—“the communicator, the text, the receiver, and the
154 N. Makhadmeh and G. Zeldes
culture”(p. 52)—that leads to the understanding that the
creator of media frames could be the sender, the receiver, or
the culture.
According to [75], media framing is a two-level process:
frame-building and frame-setting. Frame-building is the
collaboration between journalists, media, and people of
influence, which results in frames. Frame-setting is the “in-
teraction between media frames and individuals’prior
knowledge and predispositions”[75, p. 52]. Other
researchers have found that framing is “the process by which
people develop a particular conceptualization of an issue or
reorient their thinking about an issue …having implications
for multiple values”[72, p. 104]. Chong and Druckman
agree with [74,75] that framing is a process or procedure,
but think that the goal of framing is to conceptualize the
content of a news article. Chong and Druckman argue that
framing occurs when individuals perceive an event from
many perspectives. Researchers have also mentioned various
moderators that believe framing has effects on people’s
perceptions of issues such as moral values.
Previously, I discussed two frame dimensions: media and
individual. This study puts journalist and citizen bloggers
under the individual frame dimension, which is defined as
how individuals describe attributes of news (p. 74). Jour-
nalist and citizen blogs do not have gatekeeping restrictions
or media organizations controlling what they publish. In
addition, this study provides an explanation as to why and
how a blogger’s media experience, or lack thereof, impacts
individual frames. This creates two subcategories within the
individual frame dimension.
Media Framing in the Arab World. Studies that
examined media framing in the Arab World focused on how
media framed war, terror, human rights, and civil unrest
crises; mostly about the Arab Spring, Iraq War 2003, and
Palestinian-Israeli conflict [4,83–85]. Others looked at how
media framed Arab women [86,87] and political ideology
[88,89].
As an example of framing a civil unrest crisis, previous
analysis looked at how Al Jazeera English and the BBC
framed the Egyptian revolution in 2011. The researchers
examined the use of five frames: attribution of responsibility,
conflict, human-interest, morality, and economic conse-
quences. They found that both news networks focused their
coverage in two frames: the attribution of responsibility and
conflict, and the network reporters represented the govern-
ment as the side who is responsible for the crisis. BBC used
also the human-interest frame, which showed personal sto-
ries of people affected by the crisis.
Another example of framing in the Arab world was by
[2]. They conducted another comparative content analysis to
examine frames of a crisis in the Arab World. The
researchers compared between the coverage of the Iraq War
2003 in Arab online news media (Qatar and Egypt) and the
Coalition media (United States and United Kingdom). The
study found that the US and UK media were more likely to
use the rebuilding of Iraq frame, whereas the Qatari and the
Egyptian media were more likely to use the military conflict
and violence of war frame. In addition to frames, the
researchers examined the sources of information, and they
found that both are using government representative more
than another type of source.
Al Jazeera and Al Arabia news networks are important
sources of information to analyze media framing in the Arab
World. Many research used these two sources to look at
frames in the Arab media [90–93]. These two networks are
at the top of the list of news providers in the Arab World.
Framing Crises. Prior research found common crises
frames of news: conflict, human-interest, morality, economic
consequences, and attribution of responsibility [94].
Semetko and Valkenburg developed the news frames scale
depending on previous studies [76,95–98]. The researchers
of this paper used scale as in [94] because it is the most
commonly used measure in framing crises research, and it is
the most commonly cited scale in Google Scholar.
Journalists used the conflict frame to cover crises, which
“emphasizes conflict between individuals, groups, or insti-
tutions as a means of capturing audience interest”[94]. In
this frame, a news story is presented as a discussion or
debate between persons, parties, groups, or governments.
The human-interest frame “brings a human face or an
emotional angle to the presentation of an event, issue, or
problem”(p. 95). The morality frame is used when jour-
nalists quote or cite others, and are objective and unbiased in
writing the news report [96]. The economic consequences
frame presents when a problem results in negative conse-
quences in the economy for people and society [99]. The
attribution of responsibility frame is when the writer puts the
responsibility of a problem or crisis on the government,
institution, or other individuals, and motions the reasons and
results of the problem [94].
Framing Sources. Usually, the authors of news stories
frame the event, however, the choice of news sources may
influence the interpretation of events [100]. Using sources in
the news story predicts credibility of the information and the
writer. Journalists rely on different sources to be more
credible and objective. A source is a person, organization,
document or thing that is used as a provider of information.
Different words are used to attribute information to the
sources, such as “said,”“claimed,”or other words referring
to the source, such as “confirmed,”“thinks,”or “suggests.”
Journalists select their sources according to different judg-
ments, such as credibility, accessibility, and time pressure
[101]. Credibility means trustworthiness [102], accessibility
means easy to reach any time, and time pressure means the
limited time for finding sources and publishing a story
before any other news organization. Another judgment is
Framing Natural Disaster, Terrorist Attack and Civil Unrest …155
using a knowledgeable source, which means using a source
that knows more about a topic than others. Journalists
incorporate professional ethics and standards of the jour-
nalism industry, such as revealing sources of information
[103]. Government, science, business, nongovernmental
organizations (NGO), media, and individuals can be the
sources of information for bloggers [104], in addition to
documents. Knowing the most frequently used sources by
bloggers could help to understand the relationship between
the blogger and source.
2.4 Modalities in the Media
Modalities are defined as the structural properties of a thing
[105]. Prior research found that the modalities of media (e.g.,
text, audio, picture, video, graphics, tables) affect the human
memory [106,107], and provide rich information [108,109].
Each modality has specific characteristics that make audi-
ences decode the information in different ways [110], and
each characteristic (e.g., sound, image, etc.) can make the
content of information more memorable than others [111].
The latter mentioned two theories that may explain memory
processing when having different modalities. The first is the
dual-coding theory (DCT) that predicts that the content that
has two modalities will have more outcomes than the content
using one modality. The verbal content that is presented with
a picture has a “better chance of dual coding and [will]
enhance better recall than would an item without a picture”
[112, p. 184]. The second theory is the cue summation in the
multiple-channel communication developed [113,114]. This
theory assumes that the learning process increased when
stimuli in the content increased. For example, the content
with image provides readers more learning cues than the
content without an image, and content with a colored image
provides readers more learning cues than the image in black
and white. This assumption came from [115] interpretation
of cue summation that is:
“When cues from different modalities (or different cues
within the same modality) are used simultaneously, they may
either facilitate or interfere with each other. When cues elicit
the same responses simultaneously or different responses in
the proper succession, they should summate to yield increased
effectiveness. When the cues elicit incompatible responses,
they should produce conflict and interference”(p. 78).
The cue summation in the multiple-channel communi-
cation and DCT theories provide an explanation of why
using different modalities is important in blogging and how
it can affect audiences. Knowing who is using different
modalities, journalists or citizens can predict which mes-
sages affect readers more.
In another paper [116], talked about the approach of
information- processing, and memory system that goes
through three stages: First, the sensory system, which holds
the information until the mind recognizes it. Second, the
short-term memory (STM) does not hold information like in
the sensory system but recognizes it. This stage has limited
capacity of information. Last, long-term memory (LTM) that
is more complex than the previous stages, has the permanent
knowledge the individual received from his life. Using
multimedia in the content can increase the human cognition,
which enhances the information content in the LTM process.
In addition, using different modalities in the content helps to
have better communication between the message sender and
receiver, especially if the receiver is illiterate. Using pictures,
video and audio within the text can help illiterate
5
people to
decode the messages, but not with equal ease as literate
people.
2.5 Research Questions and Hypotheses
To examine the purpose of the study, nine research questions
were asked, and two hypotheses were tested: Frames.[94,
p. 95] examined five frames of crises: conflict, human
interest, morality, economic consequences, and attribution of
responsibility. The conflict frame “emphasizes conflict
between individuals, groups, or institutions as a means of
capturing audience interest.”In this frame, a news story is
presented as a discussion or debate between people, parties,
groups, or governments. The human-interest frame “brings a
human face or an emotional angle to the presentation of an
event, issue, or problem.”While, the morality frame
appeared when the writer used quotations or cited what
others said and were objective and unbiased in writing the
news report [96]. The economic consequences frame is
present when a problem results in negative consequences for
people and society [99]. And finally, the attribution of
responsibility frame is when the writer puts the responsi-
bility of a problem or crisis on the government, institution,
or other individuals [94].
Prior studies found that the bloggers use the attribution of
responsibility frame more frequently than the other four
frames when they cover crises [94,99,117]. This study
examines two different types of bloggers and how each type
used the different frames across different crises.
•Research Question 1: How do journalists and citizen
bloggers differ in framing the Egyptian revolution in
2011?
•Research Question 2: How do journalists and citizen
bloggers differ in framing the Sinai terror attack in 2012?
5
Illiterate is a person who does not have reading or writing skills.
156 N. Makhadmeh and G. Zeldes
•Research Question 3: How do journalists and citizen
bloggers differ in framing the flooding in Egypt in 2010?
Topics. The topic of a story refers to the subject of an
essay or a discussion. Knowing the topics associated with
each type of blogger reflects their interests and provides an
evaluation of a crisis. Because of their professional experi-
ence, journalists understand the importance of the lead
paragraph of the story and know that the lead paragraph has
to include the topic that received the most space in the story.
The lead, abstract, or summary is a very important aspect
that tells the main point of the story (e.g., topic) [118]. Thus,
it’s very important to examine:
•Research Question 4: What were the most frequent topics
used in the lead within blog posts by Egyptian journalist
bloggers and citizen bloggers when covering the fol-
lowing crises:
(a) The Egyptian revolution in 2011.
(b) The Sinai terror attack in 2012.
(c) The flooding in Egypt in 2010.
•Research Question 5: What were the most frequent topics
that got the most space within blog posts by Egyptian
journalist bloggers and citizen bloggers when covering
the following crises:
(a) The Egyptian revolution in 2011.
(b) The Sinai terror attack in 2012.
(c) The flooding in Egypt in 2010.
•Research Question 6: How did the Egyptian journalist
bloggers and citizen bloggers use the topic that got the
most space in the lead paragraph when covering the
following crises:
(a) The Egyptian revolution in 2011.
(b) The Sinai terror attack in 2012.
(c) The flooding in Egypt in 2010.
Sources. Sources are the providers of information, which
include individuals, organizations and documents. Prior
studies found that journalists are using official sources more
than bloggers when they cover crises [38,119,120]. The
term official sources refer to the sources that are able to
establish “primary interpretation of the topic in question”
[121, 1978, p. 58] such as government officials and media
sources. In addition, journalists are using specialists
6
(e.g.,
scientists) and eyewitnesses as sources of information [26].
Moreover, journalists may have a better experience than
bloggers in how to reach the sources, especially government
sources.
Thus, it is very important to examine the following
hypotheses:
H1: Egyptian journalist bloggers use sources of infor-
mation more than citizen bloggers.
H2: When covering crises, Egyptian journalist bloggers
are more likely to use governmental, specialist (e.g., scien-
tists), and eyewitness sources than citizen bloggers.
Modalities. Modalities refer to the structural properties of
a thing [105], text, audio, picture, video, graphics, tables are
good examples of online modalities. Previous research found
that using modalities can affect the human memory [106,
107] and provide rich information [108]. News bloggers are
using different modalities to send their messages to all
people, literate and illiterate.
Textual posts are the most frequently used modality by
bloggers, and they are usually “brief, direct and informal”
[26, p. 5], and then come picture, video and audio posts.
Approximately 90% of textual posts include an image, 50%
include videos, and 10% include audio files [122]. The
textual blog posts contain words that have semantic coher-
ence of the topic [123]. Image blog posts contain pictures,
photographs or hyperlinks to pictures [124]. Video blog
posts contain video files or video games. Audio blog posts,
also known as podcasts, consist of audio files, podcast links,
and recordings [125–127].
Pictures, audio, and video in the textual content are
powerful psychological cues that improve an individual’s
memory and save time. Knowing who is using different
modalities in covering crises helps the PR and ad agencies,
as well as researchers and organizations that are working on
reducing illiteracy, to narrow their focus of research. Thus,
it’s very important to examine:
•Research Question 7: How do Egyptian journalists and
citizen bloggers differ in modalities used to cover the
following crises:
(a) The Egyptian revolution in 2011.
(b) The Sinai terror attack in 2012.
(c) The flooding in Egypt in 2010.
•Research Question 8: What kind of images did the
Egyptian journalists and citizen bloggers use in their
coverage of different crises?
•Research Question 9: What kind of hyperlinks did the
Egyptian journalists and citizen bloggers use in their
coverage of different crises?
6
A specialist is a person “who devotes or limits his interest to some
special branch”.
Framing Natural Disaster, Terrorist Attack and Civil Unrest …157
3 Method
The researchers used a quantitative content analysis of blog
posts to look at how each type of blogger’s frames, topics,
sources, and modalities in their coverage of different crises.
This section provides information about how the researchers
conducted her research, which includes: sample and data
collection, sampling procedures, operational definitions,
reliability assessment, and validity assessment. The
researchers analyzed 441 blog posts by journalists and citi-
zen bloggers about the three crises.
3.1 Sample and Data Collection
Content analysis method gives the researchers a good idea of
the content of blog posts. Several researchers have defined
content analysis as a systematic method [128–130]. For
instance, [128]defined it as “the systematic and replicable
examination of symbols of communication, which have been
assigned numeric values according to valid measurement
rules and the analysis of relationships involving those values
using statistical methods, to describe the communication,
draw inferences about its meaning, or infer from the com-
munication to its context, both of production and consump-
tion”(p. 25). By using this method, the researchers looked at
the clusters of messages in six groups of blog posts, two types
of bloggers and three types of crises (see Table 1).
3.2 Sampling Procedures
Blog post consists of a title, date, and body, and the post’s
body may contain text, links, images, videos and/or graphs.
The unit of analysis of most of the research questions and
two hypotheses was the entire blog post, which gives the
reader a good explanation of is the content of the post. While
the unit of analysis of RQ4 was the first paragraph in the
post, which provides the reader with the main topic in the
lead. And the unit of analysis in RQ8 was the photo, and
RQ9 was the hyperlink. Two coders analyzed each blog post
and identified the meaning of each post to answer the
questions in the coding sheet.
The study population is all blog posts by Egyptian jour-
nalist bloggers and citizen bloggers during three crises: the
January 25, 2011 Egyptian Revolution, the Sinai terror
attack of August 5, 2012, and the flooding in Egypt in
January 2010. The researchers created a list of journalist
bloggers in Egypt from the search on Google.com of “Egypt
journalist blogger”in English and “sahafi, modawen, masri”
in Arabic. The researchers only found 33 journalist bloggers.
To confirm this sample and get a credible and reliable
sample, the researchers used two more steps: (1) scanned
Twitter lists to search for journalists in Egypt who also have
blog accounts, and looked at their followers to determine if
any of them are journalists and bloggers in Egypt, and
(2) looked at the bloggers’blogrolls,
7
which are lists of
bloggers deemed to be experts in their community [132]. As
a result, the researchers collected a list of 33 journalist
bloggers in Egypt. To confirm that this list consists of all
journalist bloggers in Egypt, the researchers created another
list of 519 journalists working for 24 Egyptian newspapers
and news sites. The researchers searched for each name in
Arabic and English and found only six journalists who have
blogs; therefore, 33 journalist bloggers is a considerable
number.
The researchers excluded eight blogs
8
that fell outside of
the study time frame; six blogs that did not blog about the
three crises, one blog that had only hyperlinks to news
articles in an online newspaper, and one photo blog because
the posts were not dated. Other Egyptian journalist
micro-bloggers that appeared in the Google and Twitter
search results were ignored, because this study focuses on
blogs rather than microblogs, such as Twitter.
Blogs include a short biography of the blogger that
includes his or her name, background, and goals in creating
the blog. To confirm the first list of the sample, the
researchers reviewed the “About me,”“About,”“Anni”and
“Mn Anna”section of each blog and conducted a Google
search on each blogger to confirm their status as professional
journalists.
Omraneya.net was once the largest Egyptian blog
aggregator of active Egyptian blogs until it ceased publish-
ing in 2013. Therefore, the researchers used the second
largest blog aggregator, ArabO, a search engine and direc-
tory of the English and Arabic websites in 22 Arab coun-
tries, to collect samples of Egyptian citizen bloggers. This
engine contains more than 1300 active Egyptian blogs, from
which 33 were randomly selected. The researchers looked at
the “About me,”“About,”“Anni,”and “Mn Anna”page in
each blog and searched through Google to confirm that the
bloggers were not working and had not worked as journal-
ists. To confirm that all citizen bloggers in the list are not
journalists, the researchers emailed them and received
feedback from 18 bloggers that they are not journalists. Only
two worked as journalists and were moved to the journalist
bloggers list. The researchers reviewed the blog archives and
7
A blogroll is published on a blogger’s homepage and are common-
place among bloggers [131].
8
Ashraf Shahata-http://pressmisr.blogspot.com/, Nada Abd Alwahed-http://
hamselnada.blogspot.com/, and Ethar El-Katatney-http://etharelkatatney.
wordpress.com/-tweeter, Hussain Hassan Hussain-http://alwardy.wordpress.
com/,Mosa’ab Elshamy-http://www.mosaabelshamy.com/, Nora Younis-
http://web.archive.org/web/20110202034353/,http://norayounis.com/,
Mohammed Yahia-http://theunwriting.wordpress.com/2013/05/, Jamal Abd
Alrahim-http://gamalrahim.blogspot.com/.
158 N. Makhadmeh and G. Zeldes
ignored any blog posts dated outside the three periods of the
study. The researchers analyzed all blog posts from within
the three periods (see Table 2).
3.3 Study Time Frame
This analysis covers two weeks from the first day of each
crisis date, January 25–February 11, 2011, August 5–19,
2012 and January 17–30, 2010. The researchers used the
blogs’archives to collect a sampling of blog posts about
each crisis. The researchers collected all blog posts (in both
Arabic and English) containing specific keywords from the
first day and two weeks after each crisis date (N = 1500)
(see Table 2). The researchers excluded any post that had
only an image, video, audio, or hyperlink without text
because examining the content of only an image, video,
audio, or hyperlink may affect the coders’emotions and lead
to biased results.
The researchers collected 1500 blog posts about the three
crises. The researchers analyzed all of the posts about Sinai
terrorist attacks and flooding because they are small samples.
The researchers collected the links of posts about the revo-
lution by each type of blogger in separate word sheets. Then
they took a random sample of 140 blog posts from each
sheet until they collected 140 posts (see Table 3), resulting
in a total sample size of 441 blog posts.
3.4 Operational Definitions
To determine frames of the crises, the researchers used the
scale proposed in [94], because it is clear and general. In
each frame, there are five questions to be answered either by
yes (1) or no (0). For the attribution of responsibility frame,
the researchers determined if the blog post implies: (1) “that
some level of government has the ability to alleviate the
problem/issue,”(2) “some level of the government is
responsible for the issue/problem,”(3) “solution(s) to the
problem/issue,”(4) “an individual or group of people in
society is responsible for the problem/issue”(p. 100). These
researchers added (5) an institution or organization is
responsible for the problem/issue.
Regarding the human-interest frame, the researchers asked if
the blog post (1) “provide[s] a human example or ‘human face’
on the issue,”(2) “employ[s] adjectives or personal vignettes
that generate feelings of outrage, empathy-caring, sympathy, or
compassion,”(3) “Emphasize[s] how individuals and groups
are affected by the issue/problem,”(4) “go[es] into the private
or personal lives of the actors,”(5) “contain[s] visual infor-
mation that might generate feelings of outrage, empathy-caring,
sympathy, or compassion”[94,p.100].
In the conflict frame, the researchers asked if the blog post
(1) “reflect[s] disagreement between partiesindividuals-
groups-countries,”(2) “show[s] one party-individual-
group-country reproach another,”(3) “refer[s] to two sides or
more of the problem or issue,”(4) “refer[s] to winners and
losers”[94, p. 100]. These researchers added (5) refer to con-
sequences of disagreement two or more sides. In looking at the
morality frame, the researchers asked if the blog post
(1) “contain[s] any moral message,”(2) “make[s] reference to
morality, God, and other religious tenets,”(3) “offer[s] specific
social prescriptions about how to behave”[94,p.100],and
these researchers added two questions: (4) if they contain any
action or behavior against humanity,or(5)refertoagroupof
people or individual against law.
Table 1 Six groups of blog
posts Blogger type Journalist Citizen
Crisis type
Natural disaster Journalist + a natural disaster Citizen + a natural disaster
Terrorist attack Journalist + a terrorist attack Citizen + a terrorist attack
Civil unrest Journalist + civil unrest Citizen + civil unrest
Table 2 Crises time periods and
keyword searches Crisis type Time period Keywords
Sinai terrorist attack (August
5, 2012)
August 5–19,
2012
Sinai attack, terror attack, Egyptian- Israeli border,
Egyptian soldiers, Kerem Shalom border crossing,
Ansar Bayt al Maqdes, Rafah
Egyptian revolution (January
25, 2011)
January 25–
February 11,
2011
Revolution, demonstration, Jan 25, anti-government,
Mubarak, civil unrest, civil disorder, civil strife
Flooding in Sinai, Al-Arish
and Aswan (January 17, 2010)
January 17–30,
2010
Flooding, flood, rain. Sinai, Aswan, Al-Arish, Taba,
Nuweiba and Sharm el Sheik, Red Sea, natural disaster
Framing Natural Disaster, Terrorist Attack and Civil Unrest …159
Regarding the economic consequences frame, the
researchers asked if the blog post (1) “mention[s] current or
future financial losses,”(2) “mention[s] the costs/degree of
expense involved,”(3) “contain[s] a reference to economic
consequences of pursuing or not pursuing a course of action”
[94, p. 100], and the researchers added two more questions:
(4) if they refer to any financial assistance to overcome the
crisis, or (5) link the crisis to other events that caused
financial losses or gains.
To examine the blog post topics used in the journalists
and citizen bloggers coverage of different crises, the
researchers examined three things: (1) the topic that was
mentioned first, (2) the one that got the most space (main
topic), and (3) if the one that got the most space mentioned
in the first paragraph or not. The section about the topics
covers seven areas, and was answered by yes (1) or no (0):
•Economy, which includes unemployment, agriculture,
economic losses, etc.
•Politics, to include Mubarak, government, constitution,
law, elections, etc.
•Violence and terror, detailing the number of people killed
or injured by other people, sexual harassment or other
violent behavior. Any death by natural causes is not
considered violence.
•Environment, which covers issues such as flooding,
changing weather, death, injuries by natural causes.
•Human rights, which entails women rights, prisoner
rights, healthcare, educational rights, etc.
•Military, which covers information about troops, sol-
diers, bombs, tanks, weapons, guns, or any military
equipment or action.
•Other, for topics that cannot be included in the above
categories, such as technology.
The researchers compared journalist bloggers and citizen
bloggers by looking at five content modalities, or structural
features of the posts:
•Text, a post that only contains written text. All blog posts
contain text.
•Photo, a post comprised solely of photographs.
•Video, when embedded videos make up the post.
•Audio, when a post contains audio.
•Hyperlink, when a post contains an URL or link, the
coders looked at where these links take them.
To code the type of modalities, the researchers asked yes
(1), no (0) questions: If the post contains a text, photo, video,
audio, or hyperlink. The researchers also asked yes (1), no
(0) questions: weather the photo was professional, black and
white, an infographic, and has people. To examine the
hyperlinks, the researchers asked yes (1), no (0) questions: If
the first hyperlink contains a story, picture, video, and other.
The sources cited by bloggers are a person, organization or
document that provided information used by the bloggers.
Some bloggers use quotes or paraphrase information from
sources in posts. Various words refer to source attributions,
such as “said,”“claimed,”“confirmed,”“
thinks,”and
“suggests.”The researchers seeks to determine whether the
blogger used a source or not. To code the type of sources,
the researchers asked yes (1), no (0) questions: If the source
is government, science, business, non-governmental orga-
nization (NGO), media, and individuals [104], in addition to
the documents that a written, printed, or electronic statement
that provide information from a group or an individual. If the
source of information is other than these sources, the coders
choose “other”and write the name of the source.
3.5 Reliability Assessment
Intercoder reliability is the “agreement among coders about
categorizing content”[128, p. 123]. According to [128],
there are three main reliability requirements: “reliability
testing on randomly selected content …a test for chance
agreement, and report[ing] the reliability figures for all rel-
evant variables”(p. 154). In another paper [133], the authors
suggest the coefficient should be tested first on an instrument
to check the agreement of the categories’conceptual and
operational definitions with coders.
To measure inter-coder reliability, two coders randomly
coded 40 blog posts, a selected subsample of 10% of the
total sample. The researchers used Krippendorff’s alpha and
Scott’s pi. The researchers used ReCal website to calculate
the reliability scores of variables. ReCal helps the content
analysis researchers to get accurate coefficients for
nominal-level data [134]. The researchers calculated the
Table 3 Number of blog posts
of each crisis Journalist Citizen Total
Terrorist attack 58/13.15% 32/7.26% 90
Revolution 140/31.75% 140/31.75% 280
Flooding 16/3.63% 55/12.47% 71
Total 214/48.53 227/51.48% 441/100%
160 N. Makhadmeh and G. Zeldes
inter-coder reliability based on Krippendorff’s alpha and
Scott’s pi with nominal categories and a large sample.
Before the actual coding took place, the researchers trained
the coders by using sample blog posts from outside the study
period. During the training, the researchers tested the defi-
nitions of each category. The coders agreed in most “in-
stances about the proper category for each unit of analysis”
[135, p. 151]; this agreement is inter-coder reliability. The
highly defined categories also help to increase reliability.
Upon completion of training, the researchers and coders
conducted a reliability check by analyzing 40 of the posts
and checking the agreement and disagreement between the
coders. Based on the coding protocol, two coders coded
independently, after reading the coding instructions and
definitions for each variable. The inter-reliability process
went through two stages. After the first stage, the researchers
refined the protocol to make it clearer and to increase the
reliability of some variables. The range of the Krippendorff’s
alpha of framing questions were between 0.89 and 0.95;
conflict was 0.90 (SD = 0.03), human-interest was 0.94
(SD = 0.04), morality was 0.93 (SD = 0.1), economic con-
sequences was 0.95 (SD = 0.1), and attribution of respon-
sibility was 0.89 (SD=0.07). The averages of the inter-coder
reliabilities of the first topics were 0.99 (SD = 0.02) (the
range between 1 and 0.95), the topic got the most space 0.99
(SD = 0.02) (the range between 1 and 0.95), type of source
0.98 (SD = 0.03) (the range between 1 and 0.92), and type
of modalities 0.96 (SD = 0.09) (the range between 1 and
0.81) (see Table 4).
3.6 Validity Assessment
Validity is an important factor of any academic research. It
shows how well an analysis measures what it is supposed to
measure [136]. Getting acceptable scientific results as evi-
dence are the main purpose of research. In a paper, [135]
suggest validity is never an all-or-nothing situation. To some
degree, the researchers must use his/her own judgment to
assess the validity. The researchers used face validity to
measure what is supposed to be measured, and how it
appears in the blog posts. Face validity in the content
analysis provides the coders with greater confidence in the
measurement procedure, also gives the researchers greater
confidence in the study results [137]. In measuring the
frames, the researchers used an existing scale developed by
Semetko and Valkenburg in 2000, and added some questions
to make it more consistent. To examine each of the attri-
butes, the questions in the coding sheet were quick and easy
to answer either by yes (1) or no (0). In addition, the
researchers provided the coders with instruction and guid-
ance, and tested it before coding began.
4 Results
The researchers found that journalist bloggers posted 214
blog posts during two weeks of the start of each crisis, while
citizen bloggers posted 227 blog posts; 327 blog posts were
written in Arabic (74.15%) because it is the main language
in Egypt, 80 in English (18.14%), and 34 in three or more
languages (7.71%). The bloggers provided a translation of
words other than Arabic and English. A significant differ-
ence between journalist bloggers and citizen bloggers was
found in using language (X2(2) = 37.56, p< 0.001). Jour-
nalist bloggers (131 posts, 29.71%) were less likely to write
in Arabic than citizen bloggers (196 posts, 44.44%). Jour-
nalist bloggers (61 posts, 13.83%) were more likely to write
in English than citizen bloggers (19 posts, 4.31%). And
journalist bloggers (22 posts, 4.99%) were more likely to
write in mixed languages than citizen bloggers (12 posts,
2.72%) (see Fig. 1).
4.1 Frames
The researchers asked five questions to examine each frame,
and every question is answered either by yes (1) or no (0).
The researchers counted the number of questions answered
by yes (1) in each frame, and came up with continuous
scales of frames. RQ1 asked whether differences existed
between the citizen bloggers and journalist bloggers
regarding frames used in a civil unrest crisis (Egyptian
Revolution in 2011). The researchers computed a one-way
ANOVA comparing the citizen bloggers and journalist
bloggers in using five frames to cover the revolution. Sig-
nificant differences were found among bloggers in using the
attribution of responsibility frame (F(1, 278) = 7.47,
p< 0.01), and the human-interest frame (F(1, 278) = 10.27,
p< 0.01). Tukey’s HSD was used to determine the nature of
the differences between the bloggers. This analysis revealed
that the journalist bloggers who used the attribution of
responsibility frame scored lower (m = 2.06, sd = 1.48) than
the citizen bloggers who used the same frame (m = 2.56,
sd = 1.54), and journalist bloggers who used the
human-interest frame scored lower (m = 1.84, sd = 1.83)
than the citizen bloggers who used the same frame
(m = 2.54, sd = 1.78).
The analysis also found a trend close to significance
(p= 0.06) in using the morality frame (F(1, 278) = 3.41).
The mean of the citizen bloggers who used this frame was
lower (m = 0.69, sd = 1.21) than the mean of the journalist
bloggers (m = 1.00, sd = 1.55).
No significant differences were found between the means
of citizen bloggers and journalist bloggers in using the
conflict frame (F(1, 278) = 0.29, p> 0.05), and the
Framing Natural Disaster, Terrorist Attack and Civil Unrest …161
economic consequences frame (F(1278) = 0.43, p> 0.05) in
the coverage of the Egyptian revolution, 2011. The mean of
journalist bloggers who used the conflict frame (m = 2.68,
sd = 1.70) was not significantly different from the mean of
citizen bloggers (m = 2.58, sd = 1.40), and the mean of
journalist bloggers who used the economic consequences
frame (m = 0.21, sd = 0.67) was not significantly different
from the mean of citizen bloggers (m = 0.14, sd = 0.83) (see
Table 4). The RQ2 asked whether differences existed
between the citizen bloggers and journalist bloggers in
frames used to cover a terrorist attack crisis (Sinai terror
attack, 2012). The researchers computed a one-way
ANOVA. The results show significant differences between
journalist and citizen bloggers in using the human-interest
frame (F(1, 88) = 5.5 p< 0.05), and the conflict frame (F(1,
88) = 18.68, p< 0.001). Tukey’s HSD was used to deter-
mine the nature of the differences between the bloggers.
This analysis revealed that journalist bloggers who used
the human-interest frame scored lower (m = 1.21, sd =
1.60) than the citizen bloggers (m = 2.06, sd = 1.76), and
the journalist bloggers who used the conflict frame scored
higher (m = 3.81, sd = 1.43) than the citizen bloggers
(m = 2.47, sd = 1.37). No significant differences were found
between the citizen bloggers and journalist bloggers in using
the attribution of responsibility frame (F(1, 88) = 0.12,
p> 0.05), the morality frame (F(1, 88) = 0.17, p> 0.05),
and the economic consequences frame (F(1, 88) = 1.29,
p> 0.05) in the coverage of the 2012 Sinai terror attack. The
mean of journalist bloggers who used the attribution of
responsibility frame (m = 2.52, sd = 1.31) was not signifi-
cantly different from the mean of citizen bloggers (m = 2.63,
sd = 1.52); the mean of journalist bloggers who used the
morality frame (m = 1.09, sd = 1.82) was not significantly
different from the mean of citizen bloggers (m = 0.94,
sd = 1.24), and; the mean of journalist bloggers who used
the economic consequences frame (m = 0.17, sd = 68) was
not significantly different from the mean of citizen bloggers
(m = 0.38, sd = 1.00) (see Table 4).
To answer RQ3, regarding if any differences existed
between the citizen bloggers and journalist bloggers in
framing a natural disaster crisis (Flooding in Egypt in 2010),
the researchers also used a one-way ANOVA. The
researchers found a significant difference between the two
groups of bloggers in using the morality frame (F(1,
69) = 4.14, p< 0.05). The analysis showed that journalist
bloggers who used the morality frame scored higher
(m = 1.25, sd = 1.65) than citizen bloggers (m = 0.55,
sd = 1.07). And no significant differences were found in
framing a flooding crisis when using the attribution of
responsibility frame (F(1, 69) = 0.38, p> 0.05), the
Fig. 1 Frequencies of languages
used
162 N. Makhadmeh and G. Zeldes
human-interest frame (F(1, 69) = 0, p> 0.05), the conflict
frame (F(1, 69) = 4.13, p> 0.05), and the economic con-
sequences frame (F(1, 69) = 1.27, p> 0.05).
The mean of journalist bloggers who used the attribution
of responsibility frame (m = 2.00, sd = 1.26) was not sig-
nificantly different from the mean of citizen bloggers
(m = 1.73, sd = 1.63); the mean of journalist bloggers who
used the human interest frame (m = 3.253, sd = 1.98) was
not significantly different from the mean of citizen bloggers
(m = 3.250, sd = 1.29); the mean of journalist bloggers who
used the conflict frame (m = 2.13, sd = 2.06) was not sig-
nificantly different from the mean of citizen bloggers
(m = 1.25, sd = 1.62); and the mean of journalist bloggers
who used the economic consequences frame (m = 1.75,
sd = 1.88) was not significantly different from the mean of
citizen bloggers (m = 1.22, sd = 1.60) (see Table 4).
Over the average of all crises, the researchers ran inde-
pendent t-tests to compare the mean scores of citizen blog-
gers and journalist bloggers. The researchers found
significant differences between journalist bloggers and
citizen bloggers in using the human-interest frame
(t(439) = 5.12, p< 0.001), the conflict frame (t(439) = 4.47,
p< 0.001), and the morality frame (t(439) = 2.60,
p< 0.01). The mean of journalist bloggers who used the
human-interest frame (M = 1.78, SD = 1.85) was signifi-
cantly lower from the mean of citizen bloggers (M = 2.64,
SD = 1.71). The mean of journalist bloggers who used the
conflict frame (M = 2.94, SD = 1.74) was significantly
higher from the mean of citizen bloggers (M = 2.24, SD =
1.55), and the mean of journalist bloggers who used the
morality frame (M = 1.04, SD = 1.63) was significantly
higher from the mean of citizen bloggers (M = 0.69, SD =
1.18) (see Fig. 2).
To look at frequencies and percentages of frames ques-
tion, see Table 5.
4.2 Topics
RQ4 asked about the topics most frequently used in leads
within blog posts by Egyptian journalist bloggers and citizen
bloggers about three crises: (a) Egyptian revolution, (b) Sinai
terror attack, and (c) flooding. The topics most frequently
used in the lead by journalists and citizen bloggers were
politics, violence and terror. Chi-square tests of indepen-
dence were calculated comparing the percentages of topic
used by each type of blogger in each crisis. The researchers
dropped the economy and some cells in the environment and
human rights topics because there were not enough data to
perform a chi-square test. In the coverage of a civil unrest
crisis (Egyptian revolution) significant interactions were
found in the political topic (X2(1) = 13.69, p< 0.001), and
violence and terror (X2(1) = 3.89, p< 0.05).
In the coverage of a terrorist attack crisis, a significant
interaction was found in the violence topic (X2(1) = 5.34,
p< 0.05). In the coverage of a natural disaster (flooding), a
Table 4 Analysis of variance of
frames used in a civil unrest,
terrorist attack, and natural
disaster crises
SS df F Mean square
Civil unrest (N = 280)
Attrib. 17.00 1 7.47** 17.00
Human-Intr. 33.60 1 10.27** 33.60
Conf. 0.70 1 0.29 0.70
Moral 6.60 1 3.41 6.60
Eco. 0.36 1 0.63 0.36
Terrorist attack (N = 90)
Attrib. 0.24 1 0.12 0.24
Human-Intr. 15.10 1 5.50* 15.10
Conf. 37.12 1 18.68*** 37.12
Moral 0.46 1 0.17 0.46
Eco. 0.85 1 1.29 0.85
Natural disaster (N = 71)
Attrib. 0.92 1 0.38 0.92
Human-Intr. 0 1 0 0
Conf. 9.39 1 3.14 9.39
Moral 6.15 1 4.14* 6.15
Eco. 3.51 1 1.27 3.51
Note n = 441, *p< 0.05, **p< 0.01, ***p< 0.001
Framing Natural Disaster, Terrorist Attack and Civil Unrest …163
significant interaction was found in the military topic
(X2(1) = 6.68, p< 0.01). Citizen bloggers were more likely
to mention politics as the first topic (130, 31.18%) than were
journalist bloggers (106 posts, 25.42%). Journalist bloggers
used violence and terror topics in the first paragraph
(54 posts, 12.39%) more than citizen bloggers did (48 posts,
11.52%). Other topics mentioned by journalist bloggers
were about the media, women, sport, agriculture, religion,
culture, and life (see Table 5).
RQ5 asks about the topic that got the most space by
journalist bloggers and citizen bloggers in their coverage
about three crises: (a) Egyptian revolution, (b) Sinai terror
attack, and (c) flooding. The top two topics that got the most
space in the journalists’posts were politics, and violence and
terror. The researchers dropped the economy and some cells
in the environment, human rights, and military topics
because there were not enough data to perform a chi-square
test. Citizen bloggers were more likely to write about politics
and environment. In the coverage of a civil unrest crisis
(Egyptian revolution), significant interactions were found in
the political topic (X2(1) = 32.98, p< 0.001), violence
and terror (X2(1) = 16.99, p< 0.001), human rights
(X2(1) = 5.63, p< 0.05).
In the coverage of a terrorist attack crisis, a significant
interaction was found in the violence topic (X2(1) = 5.34,
p< 0.05). In the coverage of a natural disaster (flooding), a
significant interaction was found in the political topic
(X2(1) = 7.31, p< 0.01), environment (X2(1) = 15.06,
p< 0.001), and military (X2(1) = 7.07, p< 0.01). Accord-
ing to the topics that got the most space, citizen bloggers
were more likely to use politics (149 posts, 35.82%) than
journalist bloggers (120 posts, 28.85%). Journalist bloggers
were using violence and terror (47 posts, 11.3%) more than
citizen bloggers did (21 posts, 5.05%). Other topics covered
by journalist bloggers include media, women, sport, agri-
culture, religion, and life (see Table 6).
To answer RQ6 and find how each of the two types of
bloggers used the topic that got the most space in the lead
paragraph when covering: (a) Egyptian revolution, (b) Sinai
terror attack, and (c) flooding, the researchers conducted a
chi-square test. The results showed a significant interaction
in using the topic that got the most space in the post
in the first paragraph when covering the revolution
(X2(1) = 28.15, p< 0.001). The journalist bloggers are
more likely to put the topic that got the most space in the first
paragraph (lead) when they cover a civil unrest crisis (132,
75.4%) than citizen bloggers (98, 42.6%). The results also
showed a significant interaction in using the topic that got
the most space in the post in the first paragraph when cov-
ering the flooding (X2(1) = 6.68, p< 0.05). The journalist
bloggers are more likely to put the topic that got the most
space in the first paragraph (lead) when they cover the
Fig. 2 Estimated means of
frames by blogger type
164 N. Makhadmeh and G. Zeldes
natural disaster crisis (58, 64.4%) than citizen bloggers
(32, 35.6%). In addition, the results showed no significant
difference between journalist and citizen bloggers in using a
topic that got the most space in the first paragraph (lead)
when they cover terrorist attacks (X2(1) = 2.04, p> 0.05).
4.3 Sources
To test H1, a test of independent proportions was calculated
comparing the proportion using sources by journalist
bloggers and citizen bloggers. Journalist bloggers are more
likely to use sources (135, 30.6%) than were citizen bloggers
(99, 22.4%), which supports the H1. The study also found
207 (47%) blog posts do not have any source. To test H2 to
see whether Egyptian journalist bloggers are more likely to
use governmental, scientists, and eyewitness sources than
citizen bloggers, the researchers used a test of proportions.
The researchers found that citizen bloggers (34, 7.7%) are
more likely to use governmental sources than journalists (24,
5.4%). Sixteen posts by journalist bloggers used scientist
sources (16, 3.6%), while none by citizen bloggers used this
Table 5 Frequencies and percentages of the first mentioned by type of bloggers
Civil unrest Terrorist attack Natural disaster Total
Citizen JR Citizen JR Citizen JR Citizen JR
Politics 109 80 13 26 8 0 130 106
26.14%*** 19.18%*** 3.12% 6.24% 1.92% 0% 31.18% 25.42%
Violence and terror 26 40 14 12 8 2 48 54
6.24%** 9.59%** 3.36%** 2.86%** 1.92% 0.48% 11.52% 12.93%
Environment ––––36 9 36 9
––––8.63%*** 2.16%*** 8.63% 2.16%
Human rights 2 8 ––– – 28
0.48% 1.92% ––– – 0.48% 1.92%
Military 2 1 4 13 1 3 7 17
0.48% 0.24% 0.96% 3.12% 0.24%* 0.72% 1.68% 4.08%
N 139 129 31 51 53 14 417
Total 33.34% 30.93% 7.44% 12.22% 12.71% 3.36% 100%
Note n = 417, *p< 0.05, **p< 0.01, ***p< 0.001
Table 6 Frequencies and percentages of topics that got the most space by type of bloggers
Civil unrest Terrorist attack Natural disaster Total
Citizen JR Citizen JR Citizen JR Citizen JR
Politics 125 83 22 33 2 4 149 120
30.05%*** 19.95%*** 5.29% 7.93% 0.48%** 0.96%** 35.82% 28.85%
Violence and Terror 11 37 6 8 4 2 21 47
2.64%*** 8.89%*** 1.44% 1.92% 0.96% 0.48% 5.05% 11.3%
Environment ––––47 6 47 6
––––11.3%*** 1.44%*** 11.3% 1.44%
Human rights 1 8 ––– – 18
0.24%* 1.92%* 0.24% 1.92%
Military 2 1 3 11 ––512
0.48% 0.24% 0.72% 2.64% 1.2% 2.88%
N 139 129 31 52 53 12 416
Total 33.41% 31.01% 7.45% 12.5% 12.74% 2.88% 100%
Note n = 416, *p< 0.05, **p< 0.01, ***p< 0.001
Framing Natural Disaster, Terrorist Attack and Civil Unrest …165
source. And journalists (37, 8.4%) are more likely to use
eyewitnesses than citizen bloggers (31, 7%). In sum, the H2
is partially supported.
The researchers looked at using media and documents as
sources of information. Results showed that journalist
bloggers are more likely to use media sources (69, 15.9%)
than citizen bloggers (26, 5.9%), while citizen bloggers are
more likely to use documents as sources of information
(29, 6.6%) than journalist bloggers (13, 2.9%) (see Fig. 3).
According to media sources, journalist bloggers use online
media (39, 8.8%) more than using offline media (30, 6.8%),
while citizen bloggers are less likely to use online media sources
(11, 2.5%) than offline media (15, 3.4%).
4.4 Modalities
RQ7 addressed whether blogger types differed in using
modalities to cover the different crises. A chi-square test of
independence was calculated comparing the frequency
of modalities used by journalist and citizen bloggers.
Significant interactions were found in using images (X2(1)
= 22.84, p< 0.001), video (X2(1) = 23.09, p< 0.001), and
hyperlinks (X2(1) = 9.95, p< 0.01). Citizen bloggers were
more likely to use images in their posts (159, 36.1%) than
journalist bloggers (102, 23.1%), while journalists are more
likely to use video posts (30, 8.8%) than citizen bloggers
(9, 2%). Ninety (20.4%) blog posts by journalists had
hyperlinks, and 63 (14.3%) citizen blogger posts used
hyperlinks in their coverage of crises. In addition, the results
showed no significant difference between journalist and
citizen bloggers in using audio (X2(1) = 0.95, p> 0.05) (see
Fig. 4).
RQ8 asked about the kind of images the Egyptian jour-
nalist and citizen bloggers use in their coverage of different
crises. Sixty-two (14.1%) of the images used by journalists
looked professional, only five (1.1%) were in black and
white, 39 (8.8%) were info-graphics, and 81 (18.4%) had
people. Of the images used in citizen blog posts about crises,
97 (22%) look professional, 12 (2.7%) were in black and
white, 38 (8.6%) were info-graphic, and 124 (28.1%) had
people (see Fig. 5).
Lastly, journalists were more likely to use hyperlinks than
citizen bloggers (see Table 7). The researchers examined the
first link of each post to answer RQ9 and found that 67
(15.2%) of journalists’first hyperlinks go to stories, five
(1.1%) to pictures, 10 (2.3%) to YouTube, and 10 (2.3%) to
main websites without stories (e.g., Twitter.com,Facebook.
com). The results also showed only 44 (10%) of the first
hyperlinks by citizens went to stories, 15 (3.4%) to pictures,
two (0.5%) to YouTube, and one (0.2%) to a main website.
5 Discussion
After the Arab Spring revolutions, governments, organiza-
tions, researchers, and people around the world started
paying more attention to the crises. The Arab World’s crises
are very important examples that made governments deal
with future crises easier. Predicting the results and solutions
of a crisis come from reading news and analyses about the
crisis. The blog is one medium that provides audiences with
this information. This paper offers a window into the world
of bloggers during the crises. The theoretical contribution of
this paper provides knowledge about these two different
types of bloggers, and probes the differences between how
Fig. 3 Percentage of different
sources used
166 N. Makhadmeh and G. Zeldes
they used frames, sources, and modalities. In addition, the
paper provides important contributions to the development
of framing theory and the crisis coverage.
The results of this paper show significant differences in
the frames, sources, topics, and modalities used by two types
of bloggers in Egypt. A large number of blog posts were
about the civil unrest crisis (revolution), and a small number
of posts focused on the terrorist attack and a natural disaster
because the revolution started on the first day of our sample
and continued through two weeks. The flooding and terrorist
attack in Sinai were one-day crises that resulted in less
coverage. In addition, the on-going nature of the civil unrest
and the magnitude and impact of the event was much
greater. As an example, the Egyptian revolution received
global attention. Major media around the world covered this
crisis because it affected the governments and the economy
[138]. Moreover, millions of Egyptian protestors went to the
streets asking for freedom and democracy. At least 846
people were killed, and more than 6400 were injured [67].
Media cover crisis that is important to most of the people.
The more people and victims appear in a civil unrest crisis,
the more media coverage of the crisis. The crisis that gets the
attention of global media can easily get the attention of
bloggers.
Citizen bloggers are more likely to cover a natural dis-
aster (flooding) than journalist bloggers. And journalist
bloggers are more likely to cover a terrorist attack. Citizen
bloggers are more open to cover what they want, and jour-
nalist bloggers are subject to their specialization. The pre-
vious research developed the hierarchy of influences model
that shows the levels that media messages go through from
the most micro to the most macro: individual (journalist),
media routines, organization, extra media, and ideological
(culture) level. The journalists used to go through these
levels when they shape their messages, and used to have
gatekeepers on their messages. In the individual level, the
personal and professional roles and attitudes (e.g., organi-
zation regulations, journalists’code of ethics, etc.) influence
the content of messages. This study predicts that citizen
bloggers miss those personal and professional roles. The
only way to know that is by interviewing both types of
bloggers and know what are their roles when they blog. This
explanation shows that journalists are using blogs to express
Fig. 4 Percentage of different modalities used
Fig. 5 Percentage of kind of
images used
Table 7 Sum, average, and
standard deviation of using
hyperlinks
Type of blogger Sum of hyperlinks Average SD Number of posts
Citizen 84 0.37 0.83 228
Journalists 244 1.14 3.6 213
Framing Natural Disaster, Terrorist Attack and Civil Unrest …167
their emotions, but they are still using the journalism pro-
fessional roles in an indirect way when they post on blogs.
Moreover, the Arab World faced many political crises,
conflicts, and wars, which made journalists write about
politics and wars every day while they are working in media
organizations. The daily practice made them write easily
about heavy topics (terrorist attacks, wars, etc.), and they
know how to find resources for this type of crisis. However,
citizen bloggers do not write much about heavy topics
because of fear of responsibility and freedom of expression
laws. In Egypt, the fear of responsibility and arresting
influential bloggers made many citizen bloggers worry about
posting political posts, and write under pseudonyms, while
journalist bloggers use their real name because they are
protected by the freedom of expression laws. In terms of
language, both types of bloggers used Arabic more than
English because it is their main language. However, jour-
nalist bloggers were more likely to write in English than
citizen bloggers. The reason for that may be the experience
the journalists have in reading and finding online resources
for information, such as using foreign online newspapers.
The results showed that the journalist bloggers are more
likely to use hyperlinks that were going to media sources,
which confirms our explanation.
5.1 Frames
The research found significant differences between two types
of bloggers in using media frames. In the coverage of the
civil unrest crisis, citizen bloggers were more likely to use
the attribution of responsibility and human-interest frames
more than journalist bloggers. For the attribution of
responsibility frame, [94] asked whether the blogger blamed
a person, party, or government. Bloggers are using blogs to
air their opinions of news and analyze events, and 52 jour-
nalist bloggers are using blogs to air their analyses on the
main news of the mainstream media, especially politics [31].
However, the journalist bloggers are keeping and not
blaming any side of the problem by staying neutral, because
otherwise their trust, credibility and reputation could be
affected. For the human-interest frame, citizen bloggers are
more likely to express their feelings of sympathy by using a
human face example that generates feelings. Journalists are
more likely to be objective in their writing and unbiased
toward a side, which are the basic ethical principles in
journalism [103,139].
On the other hand, there are many governmental news-
papers in Egypt. The journalists in these newspapers write
positive articles about the government. The results show that
the journalist bloggers who are in the study may work in
newspapers that never show the government is responsible
for a crisis. In the coverage of a terrorist attack crisis, the
researchers found significant differences between two types
of bloggers in using human-interest and conflict frames.
Citizen bloggers are using human-interest more than jour-
nalist bloggers. As mentioned in the previous paragraph,
citizen bloggers try to attract audiences by putting a human
face in their posts and trying to stir their emotions, which
will increase the interactivity with the audiences. Moreover,
journalists are more likely to use conflict frame than citizen
bloggers.
According to a previous study, the conflict frame was very
commonly used by American news media [96] and audiences
[75]. Another study found that this frame is the second most
common frame used by media [94], and “the more serious the
newspaper, the more the conflict frame was in evidence”[99,
p. 108]. The researchers of this paper think that reporting
about a conflict between two or more sides is showing readers
the conflict between parties. In a terrorist attack crisis, usually
there is disagreement between the individuals who prepared
the attack and the government, and the people affected. This
kind of sensitive crisis needs someone who specializes in
reporting and analysis, such as journalists, who can reach the
information and the resources easily and early.
In the coverage of a natural disaster crisis, a significant
difference between types of bloggers was found in using the
morality frame. Journalist bloggers were more likely to have
used this frame in their coverage of flooding than citizen
bloggers. Entman [74]defined media framing as “select[ing]
some aspects of a perceived reality and mak[ing] them more
salient in a communicating text, in such a way as to promote
a particular problem definition, causal interpretation, moral
evaluation, and/or treatment recommendation for the item
described”(p. 52). Thus, “moral evaluation,”or making
moral judgments, is one of the aspects of media framing.
Journalists learned that from their careers, and try to apply it
when they blog on their personal sites. In addition, the
morality frame is showing the event in context of religious
tenets, social prescriptions, or moral prescriptions [75,99].
In their paper, the authors [96] found that the morality frame
is a common frame used by journalists to cover an event in
an indirect way by using quotations or inference; they tend
to use an indirect way in reporting because of the objectivity
that is the norm in journalism.
5.2 Topics
Politics and violence and terror were the topics most fre-
quently used by both journalist and citizen bloggers in the
lead and the main body of the post. The reason for this may
be the type of crises we analyzed and the interest of each
blogger type; the revolution and the terrorist attacks were
political events. In their paper, [6] found that the largest
number of blogs in the Arabic blogosphere consist mostly of
168 N. Makhadmeh and G. Zeldes
political content that engages the public in the political
movements, critiques the political regime and protests
against human rights violations. And [28] also found that
43.7% of bloggers with professional journalism backgrounds
write about the government, and only 22.8% of bloggers
with economic and other backgrounds write about politics.
The researchers said the “This variance may reflect differing
philosophies of the purpose of journalism and blogging by
authors with and without traditional journalistic back-
grounds. Reflecting the longstanding role of the press as the
Fourth Estate in American society, journalists often frame
stories in the context of government and other powerful
institutions exercising their control and influence”[28]. In
the coverage of the civil unrest crisis, both types of bloggers
covered the conflict between pro- and anti-government,
especially the behaviors of the police. In the coverage of the
terrorist attack, the bloggers talked about conflict between a
terrorist group and the government. Both topics are con-
nected to each other.
In a 2014 paper, [140] said that “the more relevant
readers of your blog content, the more opportunities to
attract, engage and convert those readers…” (para 1).
Bloggers write about the issues that are more pertinent to
their readers. Since they born, Arab people read political
news to follow up on news about political crises. The Arab
World’s communities are more interested in reading political
news because they faced many political crises: Gulf War,
Iraq War, Israel-Palestine conflict, etc. Large portions of
Arab blog readers are political activists, journalists, and
politically influential elites [42]. Thus, it is logical to cover
the political topics more than any other topics.
On the other hand, the researchers found a significant
interaction between two types of bloggers in using the topic
that got the most space in the lead. Journalist bloggers are more
likely to put the topic that got the most space in the first
paragraph than citizen bloggers. The lead is a main component
of the story and contains a summary of the topic and what is
the story about. This goes back to the rules that the journalists
have in news reporting and writing, and their education in
journalism and media-related fields. Journalists write news
every day, and doing the same thing every day makes the
person better at it. Thus, they are much better than citizen
bloggers in making the main topic in the post in the lead
paragraph. Fifty-two percent of bloggers consider themselves
journalists [34]. This study could help in explaining that the
bloggers who do put the main topic in the lead know the
importance of the lead, and so, consider themselves journalists.
5.3 Sources
Journalists (30.6%) are using sources more than citizen
bloggers do (24%). The researchers explained that by
justifying that journalist bloggers will go to the available
sources they used when they work(ed) in the media. Citizen
bloggers have more difficulty with sources, which require
them more time to find. The researchers found a significant
difference between the journalist bloggers and the citizen
bloggers in using scientists. The researchers explain that by
suggesting that journalist bloggers use sources that they used
in their careers. Moreover, prior studies showed that jour-
nalists are using official sources more than bloggers when
they cover crises [38,119,120]. Official sources refer to the
sources that are able to establish an interpretation about
things (e.g., government, scientists) [121].
The research did not find any differences between types
of bloggers in using governmental sources. However, a
previous researcher found that online newspaper journalists
cite official sources (e.g., government) more than citizen
journalists [73]. The researchers found that the journalist
bloggers are using media (online and offline) and document
sources more than citizen bloggers do. Because this is their
field, journalist bloggers know much about the media sites
that can provide information on a crisis. And journalists who
use these sources often hope that these media sources will
cooperate with them in the future. In addition, using docu-
ments is a way to be objective and not biased in journalism
reporting.
5.4 Modalities
The researchers found differences between the journalist
bloggers and citizen bloggers in which modality they use.
Citizen bloggers were more likely to use images in their
posts than journalist bloggers, while journalists are more
likely to use video than citizen bloggers. Prior research
found that the modalities of media (e.g., picture, video)
affect the human memory [106,107]. The brain processes
visual content differently than text. Typically, visual content,
whether it is moving (e.g., video) or not (e.g., image), has
much more emotional impact than text. The dual-coding
theory (DCT) suggests that the content that has two
modalities will have more outcomes than the content using
one modality, and the one that has visual content has a
“better chance of dual coding and enhance better recall”than
non-visual content [111,112, p. 184].
Bloggers are more likely to use visuals to show the details
of a crisis. They say “a picture is worth a 1000 words,”
therefore, a video that has many pictures is more important
and worth infinite words. Text requires the ability to read
and time, so using visual tools is easier to send messages to
the readers than sending textual messages. The
cue-summation theory assumes that the textual content with
an image provides more learning cues than the content
without image.
Framing Natural Disaster, Terrorist Attack and Civil Unrest …169
Video is more interesting to watch than looking at frozen
picture. The journalist bloggers may know that the video is
worth more than a picture, so they put videos on their blogs
to be more social and make the readers be more engaged and
interactive, which are the main goals of blogging. In addi-
tion, the journalist blogger may have previous experience
from their work as journalist in how to upload videos on the
Internet.
Then came the natural disaster, the greatest number of
videos were about the civil unrest (27 posts, 6.1%) just
because bloggers had a camera in the place of crisis and tried
to show the magnitude of the crises, (13 posts, 2.9%). In
Egypt, many bloggers were blogging from the Tahrir
Square, where people demonstrated. The goals of using
hyperlinks in the posts are to refer to the main source of the
information to encourage the readers to go to the primary
source, “increase the authority of a posted story,”achieve
transparency, sharing information, increase the number of
readers, get more replies of the post, and to be more reliable
by citing the main sources of information ([22, p. 119] and
[28,141,142]). In his paper [37] found that 85% of jour-
nalist bloggers provide the hyperlinks extensively to refer to
their main news sources, which are mainly media sites and
related materials. This paper found that journalist bloggers
are using hyperlinks more than citizen. Their journalism
experience taught them to cite the sources.
In addition, using hyperlinks indicators an ability to use
new media technologies, and it “reflect differing sourcing
philosophies of bloggers”[28, p. 9]. While, a limited use of
hyperlinks can show a limited knowledge in using this
technology [141]. As mentioned before, journalist bloggers
were using media sources more than citizen bloggers. To cite
these certain media sources, journalists used hyperlinks that
went directly to the story, and they often hope that these
sources reciprocate and cite them in the future [143,144].
Referring to these sources is a kind of praise between
journalists.
In general, using modalities is a very important aspect
that has been exploited by journalists and citizen bloggers in
the coverage of crises. Both know the importance of using
modalities in gathering more readers and building the
trustworthiness with their communities.
6 Conclusion
Framing studies discuss two levels of frames: media and
individual frames. Media frames are found in the media
content, but individual frames are in people’s heads, and
how they interpret and make sense of news and categorize
them in groups [71,81]. This research provides the framing
literature with two types of individual frames, journalists and
citizen bloggers. Bloggers express what is in their heads by
posting on blogs. The pervious knowledge and personal
characteristics can make differences in the interpretation of
news among people. In this study, journalist and citizen
bloggers are the individuals who select some aspects of the
crisis and make them more salient in a post. The differences
between the two types of bloggers in creating individual
frames, and using topics, sources, and modalities to cover
crises show that there are different levels of individual
frames; this may relate to professional norms and work
routines the journalist bloggers learned from their career as
journalists.
7 Implications
In sum, this research paper helps the public (e.g., blog
readers, students, journalism educator, crisis managers) to
know more about journalist bloggers and citizen bloggers,
and know how each type of bloggers write about crises in a
positive and negative way. For example, the study provides
the journalism educator with how different types of blogger
use a lead, and what are the main topics, sources, and
modalities used in the stories. In addition, it will help the
general public who have limited time with a summary of
who is a journalist and who is not. In addition, the paper
helps identify the parameters and boundaries of journalist
bloggers. Knowing which type of blogger, journalist or cit-
izen, is using more sources is a good indicator of credibility.
In journalism, using sources in a story, especially related to
the topic, shows the importance of the story, and in the
ability of the author to provide information. The results of
this paper help society with these questions: What hap-
pened? Who is responsible? Why did it happen? And how it
happened? After people, political and media researchers,
governments, and organizations find answers to these
questions, they can understand a crisis and predict the
answers of future crises.
This research paper is a guide for governments and public
relation agencies to see how each type framed and used
sources during crises. For example, governments could use
the type of frame that uses media sources to send messages
to the audiences. The results of this study will also help
public relation agencies in designing strategies to face crises
and crisis management by knowing the responsibility
framing acceptance or denial of an event [145]. In addition,
it helps these agencies know the type of blogger to send
messages to reach a particular audience in a specific crisis.
During a natural disaster for example, the public relations
agencies focus on sending their messages through citizen
bloggers because they are more likely to write about this
crisis than journalists. Knowing which type of bloggers is
using different modalities also has benefits for those in the
media and businesses. For example, the camera
170 N. Makhadmeh and G. Zeldes
manufacturers can provide citizen bloggers (the type who
used pictures more) free cameras to take better pictures and
promote their cameras to blog readers.
8 Limitations
This research had several limitations including difficulties in
finding who is a journalist blogger and who is a citizen
blogger. All journalist bloggers in the sample of this study
were using their real name, and wrote a short biography
about themselves to convey a sense of credibility and
transparency [143]. While most of citizen bloggers in the
sample did not have a short bio that refer if they worked as
journalists or not, Thus, the researchers emailed citizen
bloggers and received responses from most. After that, the
researchers searched through Google, Twitter, and Facebook
and confirmed that the remaining citizen bloggers were not
journalists. However, some of the citizen bloggers did not
disclose that they were journalists. It is very significant to
have a separate blog directory that has only journalist
bloggers, which will help governments, organizations,
media, PR agencies, bloggers, activists, and readers to be
more specific about to what type of blogs they want to read.
Another limitation was in finding posts about the terrorist
attacks and flooding in Sinai. The majority of blog posts
were about the Egyptian revolution because it was a famous
crisis not only in Egypt, but also in the whole world.
Another limitation was deciding not to code the content
of videos from the analysis, which may have included dif-
ferent messages and frames. Videos transmit a huge amount
of information that entices the blog readers to see or read
more about a crisis. In addition, these videos may tell more
about the frames used especially in those that affect the
emotions of readers, such as the human-interest and morality
frames. Using content analysis to find the differences
between types of bloggers in coverage crisis is a limitation.
This method only describes the content of posts. Further
research can interview bloggers to explore their attitudes
toward choosing the topics, sources, and modalities and why
they choose it.
The data of this study were collected from 33 journalist
blogs and 33 citizen blogs in Egypt. This number of blogs
may not be enough to generalize the results on all of jour-
nalist and citizen blogs around the world. In addition, the
Egyptian bloggers may have different characteristics than
other bloggers around the world. Responsibility and freedom
of expression laws, and arresting bloggers in Egypt made
some bloggers wary of publishing against the government,
which limits the generalizability of results to a wider
population.
Another limitation of this study was the fluency in a
language. In Egypt, people are mainly using Arabic because
it is the mother language. However, we found several posts
written in English and other languages with translation in
Arabic. The bloggers who wrote in this language might not
be fluent in English that may affect the results of this study.
The lack of available data about the differences between the
journalist and citizen bloggers may affect the generalizability
of the data of this research. However, this study can help
future research by providing a benchmark.
9 Future Research
There is much more work to do to find the differences
between the journalist and citizen bloggers. The natural
disaster and the terrorist attack crises were one-shot events,
while the revolution was a continuous crisis. Future studies
could look at the comparison between types of bloggers in
the coverage of two continuous crises or sudden crises to
make sure that the duration does not make a difference. In
addition, the researchers could examine economic crises,
such as air transportation. Future studies could also examine
different types of stories that are not about crises to see if the
results are consistent with the results of this paper.
During the coding process, the researchers noticed that
the sites of journalist bloggers were more sophisticated in
design and more consistent in adding more content, as their
news organizations invest their online resources and staff to
make the journalist blogger’s page visually appealing and
drive visits. Future studies could compare the designs of
journalist blogs and their news organization websites to see
how much these news organizations affect the journalists’
personal blogs. In addition, researchers can interview the
bloggers to see how they chose their site design.
Future studies could also look at additional factors that
can make the differences between the journalist bloggers and
citizen bloggers more clear in the coverage of a crisis, such
as the length of the posts and engagement with the audi-
ences. The researchers could analyze the content of blog
posts of a crisis to see if the bloggers are answering the main
news reporting questions: Who? What? Why? How? In
addition, the researchers could examine the differences
between a journalist associated with a news organization and
another who is not associated with a news organization to
see how current or old experience in journalism may affect
journalist bloggers.
Content of the picture is very important. Future
researchers could analyze the content of the pictures about
crises because there were a large number of pictures posted
by journalist and citizen bloggers. For example, analyzing
the written messages, “info-graphic messages,”is signifi-
cant. Other future research could examine the kind of people
who are in the pictures, and if they are politicians or public
people. This could show the importance of the people in the
Framing Natural Disaster, Terrorist Attack and Civil Unrest …171
pictures to each type of blogger. Moreover, examining the
kind and content of documents bloggers use could help us to
answer the questions of What happened? Who is responsi-
ble? Why did it happen? And how it happened?
Lastly, the researchers could look at media framing of
similar crises that occurred at different times, and see if the
passage of time could change the frame of the same crisis,
such as the overthrow of Mohammad Hosni Mubarak on Jan
25, 2011, and Mohamed Morsi on July 3, 2013. Future
studies could examine coverage of the same crises by jour-
nalist and citizen bloggers from different countries. For
example, blogs by Egyptian and American bloggers could be
examined to determine if cultures affect the framing of the
posts.
References
1. Gamon, M., Basu, S., Belenko, D., Fisher, D., Hurst, M., König,
A.C.: BLEWS: using blogs to provide context for news articles.
ICWSM (Apr 2008)
2. Dimitrova, D.V., Connolly-Ahern, C.: A tale of two wars:
framing analysis of online news sites in coalition countries and
the Arab world during the Iraq war. Howard J. Commun. 18(2),
153–168 (2007)
3. El-Nawawy, M., Khamis, S.: Egyptian Revolution 2.0: Political
Blogging, Civic Engagement, and Citizen Journalism. Palgrave
Macmillan, Basingstoke (2013)
4. Hermida, A., Lewis, S.C., Zamith, R.: Sourcing the Arab Spring:
a case study of Andy Carvin’s sources on Twitter during the
Tunisian and Egyptian revolutions. J. Comput. Mediated Com-
mun. 19(3), 479–499 (2014)
5. Abdulla, R.: Arab media over the past twenty years: opportunities
and challenges. In: The Changing Middle East: A New Look at
Regional Dynamics, pp. 59–84. (2010)
6. Etling, B., Kelly, J., Faris, R., Palfrey, J.: Mapping the Arabic
blogosphere: politics and dissent online. New Media Soc. 12(8),
1225–1243 (2010)
7. IACP Center for Social Media: Fun Facts. Retrieved 20 Apr 2014
from http://www.iacpsocialmedia.org/Resources/FunFacts.aspx
(2014)
8. Winn, P.: State of the Blogosphere: Introduction. Technorati, San
Francisco, 21 Aug 2009
9. Technorati: Technorati Main Page. Retrieved 20 May 2014 from
www.technorati.com/ (2014)
10. Nielsen: Buzz in the Blogosphere: Millions More Bloggers and
Blog Readers. Retrieved 1 Feb 2014 from http://www.nielsen.
com/us/en/newswire/2012/buzz-in-the-blogospheremillions-
more-bloggers-and-blog-readers.html (2012)
11. Cross, M., Bloggerati, T.: How blogs and twitter are transforming
popular culture: how blogs and twitter are transforming popular
culture. ABC-CLIO (2011)
12. Kaye, B.K.: It’s a blog, blog, blog, blog world. Atlantic Journal
of Communication 13(2), 73–95 (2005)
13. Sethi, S.K.: Blog/web log-a new easy and interactive website
building tool for a non-net savvy radiologist. J. Thorac. Imaging
22(2), 115–119 (2007)
14. Nardi, B.A., Schiano, D.J., Gumbrecht, M., Swartz, L.: Why we
blog. Commun. ACM 47(12), 41–46 (2004)
15. Gill, K.E.: How can we measure the influence of the blogosphere.
In: WWW 2004 Workshop on the Weblogging Ecosystem:
Aggregation, Analysis and Dynamics (May 2004)
16. Blood, R.: Weblogs: A History and Perspective. Retrieved 1 Feb
2014 from http://www.rebeccablood.net/essays/weblog_history.
html (2000)
17. Wortham, J.: After 10 years of blogs, the future’s brighter than
ever. Wired Mag. (2007)
18. El Gody, A.: The image of the United States in the Arab
blogshpere: readings from Al Arabiya.net. Paper presented at the
international communication association conference, 1. Retrieved
22 Mar 2014 from http://www.allacademic.com/meta/
p301249index.html (2009)
19. Bik, H.M., Goldstein, M.C.: An introduction to social media for
scientists. PLoS Biol. 11(4), e1001535 (2013)
20. James, J.: How Much Data is Created Every Minute? Retrieved
12 May 2014 from http://www.domo.com/blog/2012/06/how-
much-data-is-created-every-minute/ (2012)
21. Grabowicz, P.: Weblogs bring journalists into a larger commu-
nity. Nieman Rep. 57(3), 74–76 (2003)
22. Gillmor, D.: We the Media: Grassroots Journalism by the People,
for the People. O’Reilly Media, Inc. (2006)
23. Deuze, M.: Online journalism: modelling the first generation of
news media on the world wide web. First Monday 6(10) (2001)
24. Matheson, D.: Weblogs and the epistemology of the news: some
trends in online journalism. New Media Soc. 6(4), 443–468
(2004)
25. Huffington, A.: Now the little guy is the true pit bull of
journalism. The Guardian. Retrieved 17 Nov 2013 from http://
www.guardian.co.uk/commentisfree/2006/mar/14/comment.
blogging (14 Mar 2006)
26. Domingo, D., Heinonen, A.: Weblogs and journalism: a typology
to explore the blurring boundaries. Nordicom Rev. 29(1) (2008)
27. Docter, S.: Blogging and journalism: extending shield law
protection to new media forms. J. Broadcast. Electron. Media
54(4), 588–602 (2010)
28. Sheehy, M., Ji, H.: Blogging the meltdown: comparing the
coverage of the economic crisis in journalistic blogs vs. economic
blogs. Web J. Mass Commun. Res. 35. Retrieved 12 May 2014
from http://www.scripps.ohiou.edu/wjmcr/vol35/35.html (2011)
29. Sites, K.: About. Kevin Sites Report. Retrieved 23 May 2014
from http://www.kevinsitesreports.com/new/?p=6 (2014)
30. Boese, C.: The spirit of Paulo Freire in blogland: struggling for a
knowledge-log revolution. Gurak et al. (2004)
31. Pandey, A.R., Srivastava, A., Shukla, P.: A content analysis of
journalists’blogs with special reference to driving forces for blog
writing. Web J. Mass Commun. Res. 43. Retrieved 20 May 2014
from http://www.scripps.ohiou.edu/wjmcr/vol43/43.html (2013)
32. Wallsten, K.: Political blogs: transmission belts, soapboxes,
mobilizers, or conversation starters? J. Inf. Technol. Polit. 4(3),
19–40 (2007)
33. McKenna, L., Pole, A.: What do bloggers do: an average day on
an average political blog. Publ. Choice 134(1–2), 97–108 (2008)
34. Iacono, E., Skerik, S.: PRWeek/PR newswire media survey:
longer hours, heavier workloads persist; but fears over further job
erosion moderate (2010)
35. Leccese, M.: Online information sources of political blogs.
J. Mass Commun. Q. 86(3), 578–593 (2009)
36. Xin, X.: The impact of “citizen journalism”on Chinese media
and society. Journalism Pract. 4(3), 333–344 (2010)
37. Singer, J.B.: The political j-blogger ‘normalizing’anewmediaform
to fit old norms and practices. Journalism 6(2), 173–198 (2005)
38. Lowrey, W.: Mapping the journalism–blogging relationship. Jour-
nalism 7(4), 477–500 (2006)
172 N. Makhadmeh and G. Zeldes
39. Posner, R.A.: Bad news. New York Times 31,1–11 (2005)
40. Awad, H., The future of bloggers in the Arab region: a step
towards electronic democracy. Defense Magazine. Retrieved 1
Feb 2014 from http://www.lebarmy.gov.lb/en/news/?24413#.
VAdLsNyAOxo (2010)
41. Open Arab Internet: One social network with a rebellious
message. Retrieved 29 May 2014 from http://old.openarab.net/en/
node/1633 (2014)
42. Lynch, M.: Blogging the new Arab public. Arab Media Soc. 1(1)
(2007)
43. Mohamed, A.S.: Between the Hammer and the Anvil: Blogs,
Bloggers, and the Public Sphere in Egypt. McGill University
Library (2010)
44. Russell, A., Echchaibi, N. (eds.): International blogging: identity,
politics, and networked publics, vol. 50. Peter Lang (2009)
45. Sabry, G.: Top Arabic blogs in 2013. International Center for
Journalists, Washington, DC, USA. Retrieved 29 May 2014 from
http://ijnet.org/ar/blog/204147 (2013)
46. Haub, C., Kaneda, T.: World population data sheet. Population
Reference Bureau (PRB). Retrieved 11 Apr 2014 from http://
www.prb.org/pdf13/2013-population-datasheet_eng.pdf (2013)
47. Internet World Stats: Internet usage statistics the internet big
picture. Retrieved 2 Apr 2014 from http://www.
internetworldstats.com/stats.htm (2014)
48. Arif, R.: Social movements, YouTube and political activism in
authoritarian countries: a comparative analysis of political change
in Pakistan, Tunisia & Egypt (2014)
49. Information and Decision Support Center: IDSC in brief. IDSC
Mon. Newslett. 2(3). Retrieved 29 June 2014 from http://www.
idsc.gov.eg/upload/NewsLetters/IDSC-MarchNewsletter.pdf
(2010)
50. Lim, M.: Clicks, cabs, and coffee houses: social media and
oppositional movements in Egypt, 2004–2011. J. Commun. 62
(2), 231–248 (2012)
51. Hamdy, N.: Arab citizen journalism in action: challenging
mainstream media, authorities and media laws. Westminster
Papers Commun. Cult. 6(1), 92–112 (2009)
52. Isherwood, T.: A new direction or more of the same? political
blogging in Egypt. Arab Media Soc. 6,1–17 (2008)
53. Hofheinz, A.: The internet in the Arab world: playground for
political liberalization. Int. Polit. Soc. 3(1), 78–96 (2005)
54. Haddad, L.: Egyptian bloggers: the revolution has just begun.
Al-akhbar English. Retrieved 16 Dec 2014 from http://english.al-
akhbar.com/node/3703 (2012)
55. Dooley, B.: Dancing cops’video blogger says freedom of
expression under attack in Egypt. Huffington Post. Retrieved 29
May 2014 from http://www.huffingtonpost.com/briandooley/
dancing-cops-video-blogge_b_3280569.html (2013)
56. McNamee, S., Gergen, K.J. (eds.): Therapy as Social Construc-
tion, vol. 10. Sage, London (1992)
57. O’Connor, J.: The meaning of crisis. Int. J. Urban Reg. Res. 5(3),
301–329 (1981)
58. Coombs, W.T., Holladay, S.J.: Reasoned action in crisis com-
munication: an attribution theory-based approach to crisis
management. In: Millar, D.P., Heath, R.L. (eds.), Responding
to Crisis Communication Approach to Crisis Communication,
pp. 95–115. Lawrence Erlbaum Associates, Hillsdale, NJ (2004)
59. Rosenthal, U., Charles, M.T., Hart, P.T.: Coping with crises: the
management of disasters, riots, and terrorism. Charles C Thomas
Pub Ltd. (1989)
60. Boin, A., Hart, P.T.: The Crisis Approach: Handbook of Disaster
Research, pp. 42–54. Springer, New York (2007)
61. Hewitt, K. (ed.): Interpretations of calamity from the viewpoint of
human ecology (no. 1). Taylor & Francis, Milton Park (1983)
62. Bankoff, G., Frerks, G., Hilhorst, D. (eds.): Mapping vulnerabil-
ity: disasters, development, and people. Earthscan (2004)
63. Skoufias, E.: Economic crises and natural disasters: coping
strategies and policy implications. World Dev. 31(7), 1087–1102
(2003)
64. Ganor, B.: Defining terrorism: is one man’s terrorist another
man’s freedom fighter? Police Pract. Res. 3(4), 287–304 (2002)
65. Salaverría, R.: An immature medium strengths and weaknesses of
online newspapers on September 11. Gazette 67(1), 69–86 (2005)
66. McGreal, C., Shenker, J.: Hosni Mubarak resigns –and Egypt
celebrates a new dawn. The Guardian. Retrieved 22 Apr 2014
from http://www.theguardian.com/world/2011/feb/11/hosni-
mubarak-resigns-egypt-cairo (11 Feb 2011)
67. BBC News. Egypt unrest: 846 killed in protests - official toll.
Retrieved 22 Apr 2014 from http://www.bbc.com/news/world-
middle-east-13134956 (2011)
68. CBS News. Egypt terror group from Sinai claims suicide attack
on Interior Minister. Retrieved 8 Dec 2013 from http://www.
cbsnews.com/news/egypt-terror-group-from-sinai-claimssuicide-
attack-on-interior-minister/ (2013)
69. Prevention Web: Egypt - disaster statistics. Retrieved 6 Dec 2013
from http://www.preventionweb.net/english/countries/statistics/?
cid=54 (2013)
70. Hassan, A., Egypt: heavy rains, flooding kill 15. Los Angeles
Times. Retrieved 29 May 2014 from http://latimesblogs.latimes.
com/babylonbeyond/2010/01/egypt-fifteen-deadbecause-of-
heavy-floods.html (19 Jan 2010)
71. Scheufele, D.A.: Framing as a theory of media effects. J. Com-
mun. 49(1), 103–122 (1999)
72. Chong, D., Druckman, J.N.: Framing theory. Ann. Rev. Polit.
Sci. 10, 103126 (2007)
73. Carpenter, S.: U.S. elite and non-elite newspapers’portrayal of
the Iraq war: a comparison of frames and source use. Journalism
Mass Commun. Q. 84, 761–776 (2007)
74. Entman, R.M.: Framing: toward clarification of a fractured
paradigm. J. Commun. 43(4), 51–58 (1993)
75. de Vreese, C.H.: News framing: theory and typology. Inf. Des.
J. Doc. Des. 13(1), 51–62 (2005)
76. Iyengar, S.: Is anyone responsible? How television frames
political issues. University of Chicago Press, Chicago (1991)
77. König, T.: Frame analysis: theoretical preliminaries. In: The
Cathie Marsh Centre for Census and Survey Research (2006)
78. Dunwoody, S., Peters, H.P.: Mass media coverage of technolog-
ical and environmental risks: a survey of research in the United
States and Germany. Public Underst. Sci. 1(2), 199–230 (1992)
79. Reese, S.D.: Prologue-framing public life. In: Reese, S., Gandy,
O., Grant, A. (eds.), Framing Public Life: Perspectives on Media
and our Understanding of the Social World (2001)
80. Kensicki, L.J.: No cure for what ails us: the media-constructed
disconnect between societal problems and possible solutions.
Journalism Mass Commun. Q. 81(1), 53–73 (2004)
81. Kinder, D.R., Sanders, L.M.: Mimicking political debate with
survey questions: the case of white opinion on affirmative action
for blacks. Social Cogn. 8(1), 73–103 (1990)
82. Entman, R.M.: Symposium framing US coverage of international
news: contrasts in narratives of the KAL and Iran air incidents.
J. Commun. 41(4), 6–27 (1991)
83. Hamdy, N., Gomaa, E.H.: Framing the Egyptian uprising in
Arabic language newspapers and social media. J. Commun. 62
(2), 195–211 (2012)
84. Kolmer, C., Semetko, H.A.: Framing the Iraq War perspectives
from American, UK, Czech, German, South African, and
Al-Jazeera news. Am. Behav. Sci. 52(5), 643–656 (2009)
85. Liebes, T., First, A.: Framing the Palestinian-Israeli conflict.
Framing Terrorism News Media Gov. Public 59, 74 (2003)
Framing Natural Disaster, Terrorist Attack and Civil Unrest …173
86. Amireh, A.: Framing Nawal El Saadawi: Arab feminism in a
transnational world. Signs, pp. 215–249 (2000)
87. Killian, C., Olmsted, J., Doyle, A.: Motivated migrants: (Re)
framing Arab women’s experiences. Women Stud. Int. Forum 35
(6), 432–446, Pergamon (Dec 2012)
88. Browers, M.: Political Ideology in the Arab World. Cambridge
University Press, Cambridge (2009)
89. Hanafi, S.: Framing Arab socio-political space: state governmen-
tality, governance and non-institutional protestation. Con-
temp. Arab Aff. 3(2), 148–162 (2010)
90. Al-Saggaf, Y.: The online public sphere in the Arab world: the
war in Iraq on the Al Arabiya website. J. Comput. Mediated
Commun. 12(1), 311–334 (2006)
91. Cherribi, S.: From Baghdad to Paris Al-Jazeera and the Veil.
Harvard Int. J. Press/Polit. 11(2), 121–138 (2006)
92. Elmasry, M.H., El Shamy, A., Manning, P., Mills, A., Auter, P.J.:
Al-Jazeera and AlArabiya framing of the Israel-Palestine conflict
during war and calm periods. Int. Commun. Gaz. 75(8), 750–768
(2013)
93. Meltzer, K.: The US launch of Al Jazeera English in Washington,
DC: an analysis of American media coverage. Journalism 14(5),
661–677 (2013)
94. Semetko, H.A., Valkenburg, P.M.: Framing European politics: a
content analysis of press and television news. J. Commun. 50(2),
93–109 (2000)
95. Iyengar, S.: Television news and citizens’explanations of
national affairs. Am. Polit. Sci. Rev. 81, 815–831 (1987)
96. Neuman, W.R., Just, M.R., Crigler, A.N.: Common Knowledge.
University of Chicago Press, Chicago (1992)
97. Price, V., Tewksbury, D., Powers, E.: Switching trains of
thought: the impact of news frames on readers’cognitive
responses. Commun. Res. 24, 481–506 (1997)
98. Bennett, W.L.: News: The Politics of Illusion. Longman, New
York (1995)
99. An, S.K., Gower, K.K.: How do the news media frame crises? A
content analysis of crisis news coverage. Public Relat. Rev. 35
(2), 107–112 (2009)
100. Scheufele, D.A.: Agenda-setting, priming, and framing revisited:
another look at cognitive effects of political communication.
Mass Commun. Soc. 3(2–3), 297–316 (2000)
101. Powers, A., Fico, F.: Influences on use of sources at large US
newspapers. Newspaper Res. J. 15(4), 87–97 (1994)
102. Hovland, C.I., Weiss, W.: The influence of source credibility on
communication effectiveness. Public Opin. Q. 15(4), 635–650
(1951)
103. Christians, C.G.: Fifty years of scholarship in media ethics.
J. Commun. 27(4), 19–29 (1977)
104. Messner, M., DiStaso, M.W.: The source cycle: how traditional
media and weblogs use each other as sources. Journalism Stud. 9
(3), 447–463 (2008)
105. Giddens, A.: The constitution of society: outline of the theory of
structuration. Polity Press, Cambridge (2013)
106. Hoogeveen, M.: Toward a theory of the effectiveness of
multimedia systems. Int. J. Hum. Comput. Interact. 9(2), 151–
168 (1997)
107. Van Dijck, J.: Mediated Memories in the Digital Age. Stanford
University Press, California (2007)
108. Appiah, O.: Rich media, poor media: the impact of audio/video
vs. text/picture testimonial ads on browsers’evaluations of
commercial web sites and online products. J. Curr. Issues Res.
Advertising 28(1), 73–86 (2006)
109. Fletcher, T.D., Major, D.A.: The effects of communication
modality on performance and self-ratings of teamwork compo-
nents. J. Comput. Mediated Commun. 11(2), 557–576 (2006)
110. Unnava, H.R., Burnkrant, R.E., Erevelles, S.: Effects of presen-
tation order and communication modality on recall and attitude.
J. Consum. Res. 21(3), 481–490 (1994)
111. Sundar, S.S.: Multimedia effects on processing and perception of
online news: a study of picture, audio, and video downloads.
Journalism Mass Commun. Q. 77(3), 480–499 (2000)
112. David, P.: News concreteness and visual-verbal association do
news pictures narrow the recall gap between concrete and abstract
news? Hum. Commun. Res. 25(2), 180201 (1998)
113. Severin, W.: Another look at cue summation. AV Commun. Rev.
15(3), 233–245 (1967)
114. Severin, W.J.: Pictures as relevant cues in multi-channel
communication. Journalism Mass Commun. Q. 44(1), 17–52
(1967)
115. Miller, N.E.: Graphic communication and the crisis in education.
Audio Visual Commun. Rev. 5(3), 1–120 (1957)
116. Moore, D.M., Burton, J.K., Myers, R.J.: Multiple-channel
communication: the theoretical and research foundations of
multimedia. Handbook Res. Educ. Commun. Technol., 851–
875 (1996)
117. Cho, S.H., Gower, K.K.: Framing effect on the public’s response
to crisis: human interest frame and crisis type influencing
responsibility and blame. Public Relat. Rev. 32(4), 420–422
(2006)
118. Bell, A.: The language of news media, pp. 84–85. Blackwell,
Oxford. Retrieved 19 Sept 2014 from http://www2.media.uoa.gr/
lectures/linguistic_archives/mda0405/notes/Bell_Media_and_
Language.pdf (1991)
119. Cornfield, M., Carson, J., Kalis, A., Simon, E.: Buzz, blogs, and
beyond: the Internet and the national discourse in the fall of 2004.
Pew Internet Am. Life Proj. (2005)
120. Liu, B.F.: Distinguishing how elite newspapers and A-list blogs
cover crises: insights for managing crises online. Public Relat.
Rev. 36(1), 28–34 (2010)
121. Hall, S.C., Jefferson, C., Clarke, T.J., Roberts, B.: Policing the
Crisis: Mugging, the State and Law and Order (1978)
122. Stein, D.: State of the blogosphere 2011: Introduction and
methodology. Technorati. Retrieved 1 May 2014 from http://
technorati.com/social-media/article/state-of-the-
blogosphere2011-part3/ (2011)
123. Mei, Q., Liu, C., Su, H., Zhai, C.: A probabilistic approach to
spatiotemporal theme pattern mining on weblogs. In: Proceedings
of the 15th International Conference on World Wide Web,
pp. 533–542, ACM (May 2006)
124. Cohen, K.R.: What does the photoblog want? Media Cult. Soc.
27(6), 883–901 (2005)
125. Fareed, W.: Affordances analysis of an audioblog and sugges-
tions for its recruitment in oral lesson. Instr. Technol. 55 (2010)
126. Hill, J.: The voice of the blog: the attitudes and experiences of
small business bloggers using blogs as a marketing and
communications tool. Unpublished dissertation, University of
Liverpool. Available at, http://jeffreyhill.typepad.com/voiceblog/
files/MBADissertation.pdf (2005)
127. Tan, K.W.P., Detenber, B.H.: Audio weblogs: Communication
breakthrough or communication overload. In: International
Communication Association Conference. Dresden (June 2006)
128. Riffe, D., Lacy, S., Fico, F.: Analyzing media messages: using
quantitative content analysis in research: Lawrence Erlbaum
Assoc Inc. (2008)
129. Rourke, L., Anderson, T., Garrison, D.R., Archer, W.: Method-
ological issues in the content analysis of computer conference
transcripts. Int. J. Artif. Intell. Educ. (IJAIED) 12,8–22 (2001)
130. Stemler, S.: An overview of content analysis. Pract. Assess. Res.
Eval. 7(17), 137–146 (2001)
174 N. Makhadmeh and G. Zeldes
131. Bruns, A.: Methodologies for mapping the political blogosphere:
an exploration using the IssueCrawler research tool. First
Monday 12(5) (2007)
132. Park, H.W., Thelwall, M.: Developing network indicators for
ideological landscapes from the political blogosphere in South
Korea. J. Comput. Mediated Commun. 13(4), 856–879 (2008)
133. Tucker, R.K., Weaver, R.L., Berryman-Fink, C.: Research in
Speech Communication. Prentice-Hall, Englewood Cliffs, NJ
(1981)
134. Freelon, D.G.: ReCal: Intercoder reliability calculation as a web
service. Int. J. Internet Sci. 5(1), 20–33 (2010)
135. Wimmer, R.D., Dominick, J.R.: Mass Media Research: An
Introduction, 3rd edn, pp. 139–166. Wadsworth, California
(2003)
136. Carmines, E.G., Zeller, R.A. (eds.): Reliability and Validity
Assessment, vol. 17. Sage, Thousand Oaks (1979)
137. Potter, W.J., Levine-Donnerstein, D.: Rethinking validity and
reliability in content analysis. J. Appl. Commun. Res. 27(3), 258–
284 (1999)
138. Amin, M., Assaad, R., al-Baharna, N., Dervis, K., Desai, R.M.,
Dhillon, N.S., Galal, A.: After the Spring: Economic Transitions
in the Arab World. Oxford University Press, Oxford (2012)
139. Ward, S.J.: Philosophical foundations for global journalism
ethics. J. Mass Media Ethics 20(1), 3–21 (2005)
140. Odden, L.: 5 ways to grow your blog community and
readership. Retrieved 30 Nov 2014 from http://www.
toprankblog.com/2014/03/grow-blog-community-readership/
(Jan 2014)
141. Gao, F.: Emerging powers of influence: the rise of new media in
China. Doctoral dissertation, University of Florida (2011)
142. Deuze, M.: The web and its journalisms: considering the
consequences of different types of newsmedia online. New
Media Soc. 5(2), 203–230 (2003)
143. Wall, M.: ‘Blogs of war’weblogs as news. Journalism 6(2), 153–
172 (2005)
144. Blood, R.: The Weblog Handbook: Practical Advice on Creating
and Maintaining Your Blog. Basic Books (2002)
145. Hallahan, K.: Seven models of framing: implications for public
relations. J. Public Relat. Res. 11(3), 205–242 (1999)
Framing Natural Disaster, Terrorist Attack and Civil Unrest …175
Humanities Scholar Information-Seeking
Behavior: Quantitative Approach
Mohammad Khaled Al Shboul , Othman A. Obeidat ,
and Natarajan Sundar
Abstract
This study aims to investigate the humanities scholars’
information needs and behavior in an ICT environment as
a case study at Yarmouk University, Jordan. Earlier
researches showed that humanities scholars have an
incompatible relationship with ICT use even despite their
significant use of library facilities compared to other
scholars. Not to mention, the lack of up-to-date studies,
which considers the significant acceleration in ICT
infrastructure and the emerging digital environment.
However, the main objectives are to (a) understand
humanities scholar’s behavior and their information need
in an ICT environment (b) identify the barriers they
encountered, the study employed survey questionnaire
method. 280 Academic staff from four faculties of
humanities were sampled and selected. Responses were
received from 161 academician’s staff members. The
finding indicated that the humanities scholars possessed
various level of awareness in the availability of sources
and services of information in their field of subject
interest. Besides, they showed different motivations in
in-formation-seeking which were influenced by the usage
of appropriate format and preference languages. It was
also discovered that barriers in information-seeking such
as limited of library resources, inconvenient of university
environment and personal incompetency had affect their
information-seeking satisfaction. They overcame the
barriers through personal experience and technological
literacy. Lastly, the findings can greatly assist the library
in facilitating the needed re-sources and services which
could ease the information-seeking behavior. It also can
increase the level of satisfaction among the library users
particularly the electronic resources and services.
Keywords
Information-Seeking behavior Information needs
Humanities scholars ICT environment
Jordan
1 Introduction
The history of research of information behavior dated back
in 1948 where the conference of Royal Society discussed a
research about the scientific information [1–3]. Over years of
studies, researchers have studied the information behavior
and needs, features and characteristics of scholars. The study
of similarities and differences of information behavior
among library users can provide the appropriate services to
the users’information needs.
The access and dissemination of information has been
changed in recent years due to the tremendous evolution of
the Internet and web-based technology. Thus, have influ-
enced in one way or another the humanities scholars seeking
behavior, and the way that academic libraries are handling
and managing their resources and delivering services [4,5].
Therefore, in 21st century researcher believed that a new
study on the information behavior of humanities scholars is
required. Besides, a study on the current scenario among
non-English speaker in the developing Arab country such as
Jordan is vital requirement. Previous studies shown a sig-
nificantly substantiation differences between the information
seeking behavior of scholars in the social science [6–9], and
science [10–14]. Furthermore, the humanities scholars
showed particular behavior during their information-seeking
process which were different than other scholars in other
disciplines [4,13–15].
In the ICT environment, humanities scholars encountered
an issue in selecting the proper and efficient searching
M. K. A. Shboul (&)N. Sundar
American University in the Emirates, Dubai, UAE
e-mail: alhareth8@gmail.com
N. Sundar
e-mail: gn.sundar5@gmail.com
O. A. Obeidat
Al-Balqa Applied University, Salt, Jordan
e-mail: dr.othmanobeidat@hotmail.com
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_20
177
criteria. They are slow and left-behind in embracing the
modern technology [4,10,16]. Barrett [17] Reported that
they did not prefer the electronic information technology.
They were also reported that they feel pressure while dealing
and using the information technology [18]. This happen due
to their incompetence skill in ICT usage compared to other
disciplines [4]. Besides, [19] humanities scholars made little
use of online databases and many of them reported about the
trouble of the search language, and lack of availability of
desired primary resources [17]. Additionally, more printed
books and journals are still being referred compared to the
electronic format [15]. Talja and Maula [20] Called the
humanities scholars “low level users”, particularly in the
usage of e-journals and electronic databases.
2 Aim and Objectives
This study aims to investigate the information needs and
behaviour among humanities scholars in various depart-
ments at Yarmouk University Jordan. This is to contribute to
the context of Library and Information Science in the
developing country of Arab nation. This study explores the
information needs and behaviour of humanities scholars and
the undertaken information-seeking process they do to fulfil
their information needs. Moreover, this study investigates
the behaviour of humanities scholars in utilizing the needed
information, especially the digital resources and services in
an ICT-enriched environment for their academic tasks. This
study also explores the effectiveness of their information-
seeking process and the barriers of information-seeking
faced by them.
The detail objectives of this study are:
1. To investigate the humanities scholar’s information
behaviour and needs in an ICT environment at Yarmouk
University Jordan.
2. To identify the barriers that humanities scholars faced by
the while they seek for information and use it for their
academician tasks.
3 Literature Review
According to [21], information-seeking behaviour is moti-
vated by individual’s information needs. It is an individual’s
mental process where they identify the need to satisfy their
information needs to accomplish their task through what is
known as “information-seeking behaviour”.[22,23] asserted
that the information needs and information-seeking beha-
viour varies according to the demographic attributes.
The understanding of how demographic attributes
induced the information needs and affect how humanities
scholars behave in their information-seeking process is
important to be studied to help the library in providing
information services that suit and fulfil to all group of
demographic customers. This is supported by [24] where
they mentioned that (i) personal reasons in information-
seeking, (ii) types of information being searched, and
(iii) methods and sources of information being searched,
were the factors that influenced information-seeking of an
individual. Moreover, research on information needs and
information-seeking behaviour is crucial because it could
determine the first step and the sequence process of the user
behaviour [25].
3.1 Traditional and Emerging
Information-Seeking Behavior
Among humanities scholars, there is a different in terms of
the way or means the seek for information. The traditional
way such as going to and use library collections by browsing
and reading the printed books and journals were still pre-
ferred by humanities scholars [15,26–32]. As well they use
numerous sources of information like monographs, and
seldom discuss general bibliographic works, indexes, and
another secondary services [33].
Despite of the traditional way that humanities scholar’s
prefer towards the physical library and printed materials, few
of humanities scholars find it useful with the availability of
electronic journals from the Internet [34]. There are also
positive changes of information-seeking behavior among
some of them as found by [35,36]. This includes a more
pleasant, easy to access and up-to-date information on online
catalogue. In addition, the access to download the electronic
information and to be printed it is the main reason of pref-
erence to use the electronic journals among humanities
scholars. Other than the electronic journals, e-mail, websites,
and databases that can be easily searched and modified are
the preferred medium to seek for information among them.
Additionally, [36] stressed that there were some setbacks
on the use of electronic resources. First was the lack of
knowledge and training to use the electronic search engine
and the Internet. Second was the torrential search results that
were not fully correlated to their information need. Lastly is
the credibility of the sources of the information.
Locating the Information, Location of Information-
seeking, Format and Language of Information Sources,
Tools or Channels of Information, and Types of Infor-
mation Resources Used
There is a variation among humanities scholars in terms
of how they locate their information, location of where they
178 M. K. A. Shboul et al.
seek the information, format and language used, tools of
information, and types of information resources they used.
References [8,31,36–38] discovered that humanities
scholars still prefer the conventional practice to locate their
printed books and articles by going to the department or
university library. In terms of the location of where they
prefer to seek for information, majority of humanities
scholars prefer to seek information from their office and
home. This preference is for the electronic resources which
can conveniently access from the Internet at their office and
home [7,31,32,39–41]. Between printed and electronic
format of information sources, the printed format especially
books and journals were preferred than the electronic one by
the humanities scholars [7,31,36].
However, according to [8,42,43] there is an increment of
use for the electronic format among the humanities scholars.
It was also found that the junior humanities scholars pre-
ferred the electronic than the senior scholars. Meanwhile, the
language used when searching the information was deter-
mined by the native language of the scholars [37], and
country of graduation of the scholars [31]. For the tools or
channels of information, humanities scholars preferred to use
the bibliographic tools, consultations with colleagues and
experts, citations tracking from books and journals, and
library catalogues [37]. Interestingly, humanities scholars
also preferred to personally consult with the colleague and
field expert to keep update of their information [31,32]. For
the types of information resources used by humanities
scholars for teaching and research, the printed books and
journals are the main preference among them [44].
3.2 Barriers to Information-Seeking
There are several barriers and obstacles to
information-seeking that hinder the success and satisfaction
of information needs among humanities scholars. Lack of
access and availability is the main barrier to humanities
scholars, both printed and electronic format of information
resources [4,45–47].
Besides, difficulty to locate and obtain information
especially the electronic format were the barriers mentioned
by humanities scholars [46,48]. In addition, lack of
knowledge and awareness in terms of insufficient skill to
search also contribute to the barriers [48–52]. Other than
these, barriers also include difficulty of language—ambigu-
ous terminology [46], as well as personal constraint such as
lack of time and seniority of age to learn the modern tech-
nology in information-seeking [52].
In summary, the literature reviews above shown a specific
situation and preference among humanities scholars in
information-seeking. It is believed, among the humanities
scholars themselves, a specific preference will vary
according to different demographic attributes such as gender,
age, years of experience, country of graduation and others.
Knowing the variety of their preference can help the library
to provide information services and resources efficiently.
This is important to ensure their information need can be
fulfilled.
4 Methodology
To achieve the objectives of this study, a questionnaire
instrument was designed based on previous studies ques-
tionnaire surveys related to this study. This is identified as
funnelling approach according to [53,54]. A questionnaire
which includes of open-ended question and closed questions
along with Likert’sfive—point Scale was designed. More-
over, the Statistical Product and Service Solutions (SPSS)
18th edition was used. The data analysis of the responses
covers descriptive and inferential statistical methods.
The pre-testing of the questionnaire was reviewed by four
reviewers from Yarmouk University (UY), Jordan Univer-
sity (JU), and two senior librarians from Al-Husayniyyah
Library. A pilot test was conducted among twenty faculty
members of humanities scholars from different departments
in Yarmouk University. The population of the study consists
of 275 humanities scholars from four human sciences fac-
ulties: Faculty of Arts; Faculty of Shari’a and Islamic
Studies, Faculty of Archaeology and Anthropology, and
Faculty of Fine Arts. The questionnaires were personally
distributed, where the proportional random sampling tech-
nique was used. Out of 275 populations, the sample size
becomes 185 as recommended by [55] in their statistical
table, a total of 161 respondents responded to the ques-
tionnaire survey where all questionnaire surveys were found
usable.
5 Findings: Descriptive Statistics
5.1 Demographic Characteristics
The Yarmouk University humanities scholars sample is male
and represents 90.7% (n = 146), while only 9.3% (n = 15)
for female. Given the academic status of the population
qualifications are PhD holders 90.7% (n = 146), and the rest
of the completion are master degree completed only of 9.3%
(n = 15). This fact reflect the worst participation of Arab
women in the labor market of the share of Jordan among 133
countries as mentioned in the world economic competitive-
ness report [56].
As indicate the data in Table 1, that the distribution of
respondents according to the current level of their academic
appointment or rank, 31.1% (n = 50) is professor, were
Humanities Scholar Information-Seeking Behavior …179
currently working on the University’s academic staff, 23.6%
(n = 38) of the professors is over the age of 56. Meanwhile,
with their rank fairly evenly distributed between 22.9%
(n = 37) with the highest number (n = 13) as associate
professor in age range of 36–40. The most senior category,
29.9% (n = 48) is assistance professor with the highest age
range of 36–40 (n = 18), followed 41–45 (n = 12). Lastly,
16.1% (26) most junior category of ‘Other staff’lecturers
comprising only three age groups; 36–40 (n = 13), 30–35
(n = 30) and 41–45 (n = 2) was reported by considerably
lower numbers of respondents.
5.2 Information Needs and Use of Electronic
and Print Resources
An earlier study which reported that the majority of
humanities scholars’researches were using based on printed
books and scholarly journals [15]. In Table 2, the data indi-
cate the respondents have been using both services almost
equally are books with 92.5% (n = 149), the next important
source is journals (83.2%, n = 134), conference proceedings
(65.2%, n = 105), dissertations (52.7%, =85), in addition the
other type of source is Online Databases (49.6%, n = 80).
Meanwhile, audio-visual materials (44.7%, n = 72), then
government documents also important source (40.9%, n =
66) and the less popular source is newspaper (29.8%, n = 48).
In addition, Table 3, show that humanities scholars
somehow, prefer to use printed resources slightly more than
electronic resources. The differences are small in magnitude
with 52.8% (n = 85) preferred the printed format resources
compared with 47.2% (n = 76) who preferred the electronic
format resources.
Tables 2and 3significantly confirmed earlier literature,
humanities scholars who had comparatively better computer
literacy skills than the others have more chances to use
electronic resources for academic purposes. As it is clear in
Table 2higher using database among junior scholars
(assessment and lecturer). Generally, there is an increase of
using electronic resources among humanities scholars and
junior scholars particularly, who have more computer skills
and confidence compared with senior scholars comparing
earlier studies [4,15].
5.3 Identifying and Locating Relevant
Information
Respondents were requested to indicate how do humanities
scholars categorize and discover relevant information for
research and teaching process, Table 4, indicated that
entering a general query at a search engine firstly with 40.3%
(n = 65), followed by entering a specific query at a search
engine with 23.0% (n = 37) of the respondents. However,
there is a strong element of bilingualism in the teaching at an
academic institution in Jordan, for that 20.5% (n = 33) of the
respondents go to a topic-specific webpage and perform a
search there. Lastly, the data indicates that 16.1% (n = 26) of
the humanities scholars respondents go for searching aca-
demic database.
As noted, the searching process at academic databases
occupied the last option. This is because the scholars did not
Table 1 Respondents’demographic by gender, age and academic position
Age Gender
Academic position
Professor Total Associate
Professor
Total Assistant
Professor
Total Lecturer Total
MF MF MF MF
30–35 ––– ––– 3–3
1.9%
7411
6.8%
36–40 ––– 13 –13
8.1%
10 8 18
11.3%
13 –13
8.1%
41–45 ––– 8–8
5.0%
12 –12
7.4%
2–2
1.2%
46-50 4 –4
2.5%
2–2
1.2%
4–4
2.5%
–––
51–55 8 –8
5.0%
437
4.3%
11 –11
6.8%
–––
>56 38 –38
23.6%
7–7
4.3%
––– –––
Total 50 –50
31.1%
34 3 37
22.9%
40 8 48
29.9%
22 4 26
16.1%
180 M. K. A. Shboul et al.
have skills for searching in academic databases and
numerous of them did not know about availability types of
this academic databases. Furthermore, it is clear the library
don’t provide an adequate training program for the human-
ities scolders, especially for using electronic databases, and
there is a lack announcement about it is services and
resources providing.
5.4 Sources Used to Obtain Information
A study conducted in the United States by [57], which reported
that all academics surveyed were using the Internet to search
for information related to their research. A group of statements
was therefore compiled in order to investigate the attitude of
respondent in methods of use sources to find information. The
relevant data about this section were asked for respondent in
Table 5, These results reported that reading textbooks in the
field of specialization is the most often used method for
seeking information with mean score = (4.2), standard devi-
ation = (1), compares to a result of reading professional
journals in the field of specialization with mean score = (4.1),
standard deviation = (0.9) the next most frequently indicated
reasons for using the accessed service. Compared with results
in Australian academic environment, of respondent’s
researchers use the ‘e-journals databases’at Curtin University
study conducted by [58]. Followed by reading conference and
meeting papers with mean score= (3.7), with Standard Devi-
ation = (1). Also, the responses at Yarmouk University the
range of attending conferences and meeting, searching bibli-
ographic databases and talking to colleagues or experts in
one’s own department occupied the same rate with mean score
= (2.9), standard deviation = (1.1). While asking librarians or
information specialists and writing to a colleague or an expert
at another university being the least frequent method with both
having a mean score of (2.5).
Table 2 Types of information
most often need to access Types of information
most often need to
access
Professor
(50)
Associate
Professor
(37)
Assistant
Professor
(48)
Lecturer
(26)
Total Percentage
(%)
Books 50 35 42 22 149 92.5
Journals 44 32 38 20 134 83.2
Conference
proceedings
30 27 31 17 105 65.2
Dissertations 12 17 34 22 85 52.7
Databases 11 14 36 19 80 49.6
Audio-visual
materials
13 14 29 16 72 44.7
Government
documents
18 17 18 13 66 40.9
Newspapers 10 11 16 11 48 29.8
Total 50 37 48 26 161 100
Table 3 Respondents’Preferred
Information Resource Format Format Frequency Percentage (%)
Printed 85 52.8
Electronic 76 47.2
Total 161 100
Table 4 Search for Answers to a
Specific Question on the Internet Search for answers to a specific question on the internet Frequency Percentage (%)
Enter a general query at a search engine 65 40.3
Enter a specific query at a search engine 37 23.0
Go to a topic specific webpage and perform a search there 33 20.5
Searching academic databases 26 16.2
Total 161 100
Humanities Scholar Information-Seeking Behavior …181
5.5 Issues Faced Regarding
Information-Seeking Behavior
The results reported in Table 6, answered that “Yes”61.6%
(n = 99) out of the total respondents have enough time
to seek information and respondents chose “No”38.4%
(n = 62) do not have enough time to seek information by
themselves was the most commonly recorded barrier. So for
that, the rate is slightly high 72% (116) have asked assis-
tance while seeking information. The reason behind this
result is because most of the respondents are not all the time
in the best situation and allocate their time on lecturing.
Table 5 Methods Respondents Use for Seeking Information (n = 161)
Methods of seeking information Never Rarely Sometimes Frequently Always Total Mean SD
Reading textbooks in my field 26
16.1%
25
15.5%
30
18.6%
36
22.4%
44
27.4%
161
100%
4.2 1.0
Reading professional journals in my field 24
14.9%
26
16.1%
33
20.5%
36
22.4%
42
26.1%
161
100%
4.1 0.9
Reading conference and meeting papers 24
14.9%
28
17.4%
38
23.6%
35
21.7%
36
22.4%
161
100%
3.7 1.0
Using an Internet search engine 20
12.4%
20
12.4%
39
24.3%
43
26.7%
39
24.3%
161
100%
3.3 1.3
Searching bibliographic databases 28
17.4%
32
19.9%
46
28.6%
27
16.8%
28
17.4%
161
100%
2.9 1.0
Attending conferences and meeting 25
15.4%
37
23.1%
41
25.5%
32
19.9%
26
16.1%
161
100%
2.9 0.9
Talking to colleagues or experts in my own
department
25
15.4%
40
24.9%
41
25.5%
28
17.4%
27
16.8%
161
100%
2.9 0.9
Asking librarians or information specialists 30
18.6%
44
27.4%
30
18.6%
30
18.6%
27
16.8%
161
100%
2.5 1.1
Writing to a colleague or expert at another
university
28
17.4%
40
24.9%
41
25.5%
26
16.1%
26
16.1%
161
100%
2.5 0.9
Table 6 Difficulties Encountered while Seeking for Information
Item statement Responses Frequency Percentage (%)
Not having enough time to seek information by oneself Yes 99 61.5
No 62 38.5
Need assistance during seeking information Yes 116 72.0
No 45 28.0
Multitude assistance seeking Research assistance 42 36.2
Library assistance 35 30.2
Colleague 35 30.2
Other (family members) 4 3.4
Level of Internet searching skills Less than adequate 22 13.7
Adequate 7 4.3
Somewhat proficient 49 30.4
Proficient 53 33.0
Very proficient 30 18.6
Relevancy of searching result Very irrelevant 37 23.0
Irrelevant 10 6.2
Somewhat relevant 67 41.6
Relevant 37 23.0
Very relevant 10 6.2
182 M. K. A. Shboul et al.
But these results indicate that the majority are confident
that they can search adequately from the vast searched
information. It is clear that the lack of adequate and appro-
priate time is one of the most difficult obstacles faced by
professors and prevents the use of electronic resources,
which in the end will influence their seeking behavior.
Furthermore, who asked for assistance through
information-seeking process present 36.3% (n = 42) indi-
cated some level barriers of asked research assistance, while
30.2% (n = 35) indicated a level of both asked their col-
leagues and library assistance, and 3.5% (n = 4). It may have
been expected asked the other (family members).
In terms of the Internet searching skills 33.1% (n = 53)
they response to the latter question indicating a level of
proficient and somewhat proficient is 30.4% (n = 49). Also,
reported suffering adequate is 4.3% (n = 14) and Perhaps
contrary to expectations and was the least indicated barrier,
13.7% (n = 22) shows that their Internet searching skills are
less than adequate. With regard to the relevance of search
results, the respondent shows their research result is very
irrelevant with 23% (n = 74) compared with only 6.2%
(10) who reported that their search results are irrelevant. It is
possible, however, that this general response regarding
Internet searching skills.
6 Conclusion
6.1 Computer Use
The study shows that the junior scholars who have a com-
puter and more internet searching experience than the senior
scholars, will be more likely to use electronic resources and
internet for the academic purposes. A suitable condition and
good speed of Internet connection play significant role for
the preference of Internet surfing in the office. This study
discovers variation in the motives for information-seeking
among the scholars that could be determined using appro-
priate format and understandable language, where preparing
the class and completing the research is the most significant
reason for information-seeking. However, study reveals that
scholars depend heavily on printed materials as a primary
source of information for teaching purpose. Meanwhile,
senior scholars are still preferred to use printed monograph
and textbooks for teaching purpose, while printed journal for
research field. Meanwhile, the junior scholars prefer to use
both electronic and printed format of information resources.
It is also evident that there is an increase in using electronic
resources compared with the previous studies.
6.2 Identifying and Locating Relevant
Information
Regarding to identifying the relevant information, this study
found that humanities prefer to take a general idea of the
subject by entering a general query on a search engine and
then locate the search in a more specific way by entering a
specific query on the search engine. This study shows that
the humanities scholars prefer to locate information by
downloading the softcopy and save the copy in the hard
drive. This underpinned the findings from the earlier studies.
Furthermore, factors such as uneasiness reading from a
computer screen for a long time and lack of computer skills,
made the senior scholars prefer printed papers than the
electronic copy.
6.3 Sources Used to Obtain Information
For obtaining information, this study confirms that human-
ities scholars still have the uppermost number of users who
use the library resources. The senior scholars still prefer to
use the printed materials such as reference books to obtain
relative information. But, the electronic resources like elec-
tronic databases and journals are preferred by the junior
humanities scholars.
6.4 Issues Faced Regarding
Information-Seeking Behavior
This study discovers that lack of time and relevance of
research result, were considered as barriers or factors that
against senior scholars from using the electronic resources
and influenced their information-seeking behavior. Because
time issue is frequently the sign of deeper dilemma, there-
fore, senior professors are asking for assistance during
information-seeking process. As a result, they are willing to
have a training on information-seeking, but timidly; most of
them like to be trained individually.
In conclusion, the need to know and identify the
information-seeking behavior and see the behavioral pattern
among various demographic background of humanities
scholars can assist the library management. The assistance
could be specific for certain information needs based on the
identified categories. It will help for a smooth and efficient
information-seeking process and reduce the barriers they
might face which will satisfy the humanities scholar’s
information needs.
Humanities Scholar Information-Seeking Behavior …183
References
1. Urquhart, D.J.: The distribution and use of scientific and technical
information. In: The Royal Society Scientific Information Confer-
ence, pp. 408–419 (1948)
2. Bernal, J.D.: Scientific information and users. In: Aslib Proceed-
ings, vol. 12, Issue 12, pp. 423, 438 (1960)
3. Wilson, T.D.: Models in information behavior research. J. Docu-
mentation 55(3), 249–270 (1999)
4. Tahir, M., Mahmood, K., Shafique, F.: Use of electronic
information resources and facilities by humanities scholars. The
Electron. Libr. 28(1), 122–136. (2010). www.emeraldinsight.com/
0264-0473.htm. Last accessed 11 Oct 2012
5. Quan-Haase, A., Martin, K.: Digital humanities: the continuing
role of serendipity in historical research. In: Proceedings of the
2012 i-Conference, February 7–10, 2012, Toronto, ON, ACM,
New York, NY, pp. 456–458 (2012)
6. Al-Suqri, M.N.: Information Needs and Seeking Behavior of
Social Science Scholars at Sultan Qabous University in Oman:
Mixed-Method Approach. (Unpublished doctoral dissertation).
Emporia State University, Kansas, United States of America
(2007)
7. Bhatti, R.: Information Needs and Information-Seeking Behavior
of Faculty Members at the Islamic University of Bahawalpur.
Library Philosophy and Practice (e-journal), Paper 314 (2010)
8. Kumar, A.: Assessing the information need and information
seeking behavior of research scholars of M.B.P.G. College: a case
study. Int. J. Digital Libr. Serv. 3(3), 1–12 (2013)
9. Msagati, N.: Awareness and use of scholarly electronic journals by
members of academic staff: a case study of Dar es Salaam
University College of Education (DUCE). Libr. Philos. Pract.
(e-journal), 1–25 (2014)
10. Rafiq, M., Ammeen, K.: Information seeking behavior and user
satisfaction of university instructors: a case study. Libr. Philos.
Pract. (e-journal) (2009)
11. Jamali, H., Asadi, S.: Google and the scholar: the role of google in
scientists’information-seeking behavior. Online Inf. Rev. 34(2),
282–294 (2009)
12. Norbert, G.L., Lwoga, E.T.: Information seeking behavior of
physicians in Tanzania. Inf. Dev. 29(2), 172–182 (2013)
13. Nor Liyana, M.S., Noorhidawati, A.: Ascertain the information
seeking behavior of computer science students. In: 3rd Interna-
tional Conference on Libraries, Information and Society, pp. 1–13
(ICoLIS) at the University of Malaya, Petaling Jaya, Malaysia
(2014)
14. Sarkhel, J., Khan, Md: Information needs and information seeking
behavior of faculty members of a agricultural universities in
Bangladesh: a study. Int. J. Soc. Sci. 24(1), 23–36 (2014)
15. Baruchson-Arbib, S., Bronstein, J.: Humanists as information
users in the digital age: the case of Jewish studies scholars in
Israel. J. Am. Soc. Inf. Sci. Technol. 58(14), 2269–2279 (2007)
16. Delgadillo, R., Lynch, B.P.: Future historians: their quest for
information. Coll. Res. Librar. 60(3), 245–259 (1999)
17. Barrett, A.: The information-seeking habits of graduate student
researchers in the humanities. J. Acad. Librarianship 31(4), 324–
331 (2005)
18. Massey-Burzio, V.: The rush to technology: a view from the
humanists. Libr. Trends 47(4), 620–639 (1999)
19. Bates, M.J.: The Getty end-user online searching project in the
humanities: Report No 6: overview and conclusions. Coll. Res.
Libraries 57(6) (1996)
20. Talja, S., Maula, H.: Reasons for the use and non-use of electronic
journals and databases: a domain analytic study in four scholarly
disciplines. J. Documentation 59(6), 673–691 (2003)
21. Ansari, M.N.: Information seeking behavior models: a review.
Pak. Libr. Inf. Sci. J. 39(4), 3–16 (2008)
22. Devadason, F.J., Lingman, P.P.: A methodology for the identifi-
cation of information needs of users. IFLA J. 23(1), 41–51 (1997)
23. Ucak, N.O., Kurbanoglu, S.S.: Information need and information
seeking behavior of scholars at a Turkish University. Proceedings
Paper. In the 64th IFLA General Conference, 16–21 Aug 1998,
Amsterdam. http://www.nlc-bnc.ca/ifla/IV/ifla64/041-112e.htm
24. Leckie, G.J., Pettigrew, K.E., Sylvain, C.: Modeling the informa-
tion seeking of professionals: a general model derived from
research on engineers, health care professionals, and lawyers. Libr.
Q. Inf. Community Policy 66(2), 161–193 (1996)
25. Hsieh-Yee, I.: Effects of search experience and subject knowledge
on the search tactics of novice and experienced searchers. J. Am.
Soc. Inf. Sci. 44(3), 161–174 (1993)
26. Wilson, T.D.: On user studies and information needs. J. Documen-
tation 37(1), 3–15 (1981)
27. Stone, S.: Humanities scholars: information needs and uses.
J. Documentation 38, 292–313 (1982)
28. Sievert, D., Sievert, M.E.: Humanists and technologists: the case of
philosophers. In: Borgman, C.L., Edward, Y.H. (eds.) Information
Technology, Planning for the Next Fifty Years. Proceedings of the
First Annual Meeting of the American Society for Information
Science, vol. 25, pp. 94–99. Medford, New Jersey (1988)
29. Wiberley, S.E., Jones, W.G.: Patterns of information seeking in the
humanities. Coll. Res. Libr. 50, 638–645 (1989)
30. Gould, C.C., Pearce, K.: Information Needs in the Sciences: An
Assessment. Research Libraries Group, Mountain View, CA
(1991)
31. Tahir, M., Mahmood, K., Shafique, F.: Information needs and
information-seeking behavior of arts and humanities teachers: a
survey of the University of the Punjab, Lahore, Pakistan. In:
Library Philosophy and Practice, Paper 227 (2008)
32. Mostofa, S.M.: A study of information needs and seeking behavior
of faculty members of Darul Ihsan University in Bangladesh.
Libr. Philos. Pract. (e journal). http://digitalcommons.unl.edu/
libphilprac/983. Last accessed 05 Dec 2013 (2013)
33. Watson-Boone, R.: The information needs and habits of human-
ities scholars. RQ 34(2), 203–216 (1994)
34. Brockman, W.S., Neumann, L., Palmer, C.L., Tidline, T.J.:
Scholarly Work in the Humanities and the Evolving Information
Environment. Digital Library Federation and the Council on
Library and Information Resources. Washington, D.C. http://www.
clir.org/pubs/reports/pub104/pub104.pdf. Last accessed 12 Sept
2014
35. Ileperuma, S.: Information gathering behavior of arts scholars in
Sri Lankan universities: a critical evaluation. Collect. Build. 21(1),
22–31 (2002)
36. Ellis, D., Oldman, H.: The english literature researcher in the age
of the internet. J. Inf. Sci. 31(1), 29–36 (2004)
37. de Romanos de Tiratel, S.: Accessing information use by
humanists and social scientist: a study at the Universidad de
Buenos Aires, Argentina. J. Acad. Librarianship 26(5), 346–354
(2000)
38. Suriya, M., Sangeetha, G., Nambi, M.A.: Information-seeking
behavior of faculty members from Government Arts Colleges in
Cuddalore District. In: Kaul, H.K., Patil, S.K. (eds.) Library and
Information Networking (NACLIN 2004), pp. 285–292. New
Delhi (2004)
39. Patitungkho, K., Deshpande, N.J.: Information seeking behavior of
faculty members of Rajabhat Universities in Bangkok. Webology
2(4). http://www.webology.ir/2005/v2n4/a20.html (2005)
40. Wenderoth, C.: Research behaviors of theological educators and
students: the known and the unknown. In: American Theological
Library Association Summary of Proceedings 61, 180.200 (2007)
184 M. K. A. Shboul et al.
41. Sukovic, S.: Convergent flows: humanities scholars and their
interactions with electronic texts. Libr. Q. 78(3), 263–284 (2008)
42. Xuemei, G.: Information-seeking behavior in the digital age: a
multidisciplinary study of academic researchers. Coll. Res. Libr.
71(5), 435–455 (2010)
43. Nicholas, D., Williams, P., Rowlands, I., Jamali, H.R.: Research-
ers’-journal use and information seeking behavior. J. Inf. Sci. 36(4)
(2010)
44. Tibbo, H.R.: Primarily history in America: how U.S. historians
search for primary materials at the dawn of the digital age. Am.
Archivist 66(1), 9–50 (2003)
45. Meho, L.I., Haas, S.W.: Information-seeking behavior and use of
social science faculty studying stateless nations: a case study. Libr.
Inf. Sci. Res. 23(1), 5–25 (2001)
46. Buchanan, G., Cunningham, S.J., Blandford, A., Rimmer, J.,
Warwick, C.: Information seeking by humanities scholars. Lect.
Notes Comput. Sci. 3652, 218–229 (2005)
47. Adeniran, P.: User satisfaction with academic libraries services:
academic staff and student’s perspectives. Int. J. Libr. Inf. Sci. 3(10),
209–216 (2011)
48. Quigley, J., Peck, D.R., Rutter, S., Williams, E.: Making choices:
factors in the selection of information resources among science
faculty at the University of Michigan. In: Issues in Science and
Technology Librarianship. http://www.istl.org/02-spring/refereed.
html (2002)
49. Adams, J.A., Bonk, S.C.: Electronic information technologies and
resources: use by university faculty and faculty preferences for
related library services. Coll. Res. Libr. 56(2), 119–131 (1995)
50. Starkweather, W.M., Wallin, C.: Faculty response to library
technology: insights on attitudes. Libr. Trends 47(4), 640–812
(1999)
51. Ibrahim, A.E.: Use and user perception of electronic resources in
the Arab Emirates University (UAEU). Libri 54,18–29 (2004)
52. Xuemei, G.: Information-seeking behaviour in the digital age: a
multidisciplinary study of academic researchers. Coll. Res. Libr.
71(5), 435–455 (2010)
53. Frankfort-Nachmias, C., Nachmias, D.: Research Methods in the
Social Sciences, 5th edn. Edward Arnold, London (1996)
54. Oppenheim, A.N.: Questionnaire Design, Interviewing and Atti-
tude Measurement. Biddles Ltd, Great Britain (2000)
55. Krejcie, R.V., Morgan, D.W.: Determining sample size for
research activities. Educ. Psychol. Meas. 30(3), 607–610 (1970)
56. World Economic forum. The global competiveness report 2010–
2011. Available at: http://www3.weforum.org/docs/WEF_Global
CompetitivenessReport2010-11.pdf (2010)
57. Heterick, B.: E-content: faculty attitudes toward electronic
resources. Educause Rev. 37(4), 10–11 (2002)
58. Genoni, P., Merrick, H., Willson, M.: Scholarly communities,
e-research literacy and the academic librarian. Electron. Libr.
24(6), 734–746 (2006)
Humanities Scholar Information-Seeking Behavior …185
Hybrid Alliances: Efficiency, Business
Continuity and Future Foresight in a World
of Challenges
Marios Panagiotis Efthymiopoulos
Abstract
Modern alliances, regional, or international, short-term or
long-term, require security resilience, business continuity
and sustainability. Alliances need to be practically
efficient and provide efficacy and accuracy when practi-
cally applied. In an age of change, alliances have become
hybrid in nature and thus need to be reshuffled. In a
period of strong, real-time geo-strategic changes, in a
constantly changing security environment, there is a need
for strong actions. Countries and leaders, seek modern
and long-term alliance capacity building that will provide
eventually stability, sustainability, safety and growth for
their own countries and regions. Based on the initial
theory of Steven Walt’s“Origins of Alliances”, this
research paper seeks to demonstrate a clear need for
strategic realignment of alliances through appropriate
understanding of security threats and challenges, yet also
leadership and vision that does more to promote regional
and international environment strategic and security
cooperation. A new long-term commitment, in a period
of reshuffling of strategic alliances will eventually provide
a‘safety net’that will trigger growth, sustainability and
development. This policy and research paper, currently
examines countries’pragmatic practical engagement for
the establishment of a balance of power, through alliances
that are of hybrid nature; achieved through diverse
elements of true diplomatic involvement, military pre-
paredness, active engagement and knowledge sharing
capacity, in a world, where regional or international
security or stability seems to be at stake.
Keywords
Interoperability Resilience Business
Security continuity Strategic planning
Operations Tactics Global policy
Hybrid alliances
1 Introduction
One of the emerging and greatest challenges, of our multi-
polar landscape, is defining or shaping strategic alliances. In
the completion of 17 years inside the 21st century, we evi-
dently notice a great reshuffling of alliances. It is based on
something greater, than reason or interest. ‘Power and
influence’to conquer or to establish a new ‘world order’,
seem to be some of the main reasons behind all actions and
methodologies. Alliances reshuffle their ‘cards’. They are
re-aligned with new interests due to power and influence. An
argument that we will analyse below.
According to [1] on Alliances, “…the greatest challenge
is the translation of overwhelming might…” of alliances “…
into effective influence”. Conditions of the 20th century
chess board, according to [2], leveraged power through
bilateral and multilateral alliances, that were based on power
and influence. Even more so, the creation of ‘Alliances’,
based on [3], Origins of Alliances, assumed a role of power
effectiveness but also influence in a world that was back in
the days, ready to change, yet again.
By the end of 2017, the world is in fact a state of alliance
fluidity. Alliances are being reshuffled. Alliances have been
transpired to become ‘hybrid’in nature. As we know, they
are founded based on elements and objectives of security
and strategic affairs; challenges and threats yet also oppor-
tunities. Alliances are created based on tactical objectivity,
political acceptance but also necessity of power and influ-
ence, that needs in 2017, to be redefined as challenges and
threats themselves are not symmetrical yet seem to be cer-
tainly ‘hybrid’. In this paper, we state clearly, that the main
M. P. Efthymiopoulos (&)
College of Security and Global Studies, American University in
the Emirates, Dubai, United Arab Emirates
e-mail: marios.panagiotis@aue.ae
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_21
187
characteristics of alliances are now in change. Within the
duration of this research, an examination and analysis of
main key points, on old and new characteristics of alliances,
will be defined, examined and critically analysed.
The world faces, non-traditional challenges as foresaid,
defined as of ‘hybrid nature’. This current paper justifies the
‘frontier’of terminology and necessity of the term ‘hybrid
nature’as defined and examined in the below sections.
Strong geostrategic changes are coming about. Alliances
are restructuring. They are necessary. They are however,
reformed; redefined. In a ‘game of power’in which pro-
jection of power and influence are evident more than ever
alliances are re-shuffled or newly constructed. In the age of
technological modernity, alliances need strong strategic
management, tactical agility and leadership. Alliances need
to be of long-term value rather than short term objectives;
they need to be or become robust in or through capacity
building; continue to acquire technological advances that
ease while effort alliance networking and operational
capacity efficiency when military action is requested. As
such, we need to forecast a possible development or other-
wise stated, the future of alliances, through agility and
operational/tactical capacity development, training and tac-
tical deliverables. Strong strategic commitment is needed
and strong understanding of all regional and global strategic
changes. Efficient and pragmatic alliances will allow for
resilience on regional or global security, while allow for
tactical operational effectiveness when engaged.
In the Euro-Atlantic and Eurasian continents, regional
and internationally led alliances such as NATO [4], are
committed to long strategic alignment against symmetrical
and asymmetrical threats. Although, the commitment should
continue, alliances should enlarge yet also evolve and be
re-shaped when needed. While, threats and challenges, have
managed to evolve and become hybrid from asymmetrical,
so should alliances, be hybrid; redefined.
The current policy and research paper, argues that alli-
ances need to be restructured as emerging challenges have
now become hybrid. Walt [3], articulates on “understanding
forces that shape international alliances should be a vital
concern for most statesmen”. Alliances should be redefined
to meet challenges and opportunities; both in operational and
tactical capacity; based on their ‘hybrid capacity’to evolve
and to re-evolve again and again, when and where is needed.
Concepts, objectives and tactical targets, need to be clearly
and strategically defined. Alliances, should last for a
long-period of time political and military consensus, posi-
tioning and operational capacity. Member-countries should
be engaged; financially, operationally, political and diplo-
matically committed. All need to commit strategically and
tactically; they need to contribute in meeting, hybrid
demands for a continued strong security resilience and
business continuity.
By the end of 2017, challenges and stakes seem to be
greater and higher; clear in methodological options but
hybrid in objectives. Threat elements are hybrid in nature.
Risk and threat assessments are considerable; distinguish-
able, external and internal, regional and international; mul-
tilevel and multidimensional. Threats suddenly come from
both the one, the capable, the technologically agile or
knowledgeable, the ‘lonely wolf’; and the many, the orga-
nized or from ‘guerrilla fighters’or rogue states.
Currently, security stakes are high; challenges constantly
emerge. Any current or new alliances, should reflect the need
to secure and to provide stability and safety against any
possible insecurities. A foresight on future security is of
necessity. Minority reports can help towards this goal: to
assist in operations and practice; what will become to
become a tool of operational effectiveness, to observe,
understand and operation the possible future of security.
Minority reports, will be the ‘response’on criminal acts prior
to their establishment, facing current and future threats.
There may be involve, game theories and intelligence risk
analysis methods, strategically providing the ‘frontier line’
of security. Minority reports if adopted, should provide
interoperable alliance, operational solutions, before threats
become actually existential and possibly destructive.
A strategic alliance plan of ‘hybrid’hybrid challenges/
targets should be thus established.
Walt [3], assures that on Alliances “strategy is a set of
hypotheses or predictions”. This research paper suggests that
strategy is and should be a clear-cut crisis strategic man-
agement process and tool of professional and training edu-
cation; a strategic methodological plan, that should be
applicable in both real operations and future challenges,
considering changes; being of fiscal austerity nature, political
and geostrategic challenges, ideological, societal or religious
challenges.
The research builds on the assumption that alliances
should be strengthened, reshaped and continuously mod-
ernized, operationally and tactically. On Morals of War and
conflict, alliances should clearly project moral and ethical
values; shaping and or formatting rules, regulations and
ethics on war, peace and resolutions of any or all possible
conflicts symmetrical and asymmetrical; Alliances should
find out methods on which war and/or conflict zones need to
end. Alliances should reflect the wider international com-
munity that are otherwise revoked as in Kissinger [5] book
“World Order”. Provide tangible solutions for long-lasting
actual peace and peacetime security cooperation that will
render growth and development a reality.
Evolution of the existing concept of what constitute an
alliance is imperative. Evolution and push-out to a whole
new frontier, onto a new modern and practical concept is
also imperative. We need to recognise that current or future
threats are no longer confined in a region and/or area or
188 M. P. Efthymiopoulos
analogic dimension. Hybrid threats are real and are here
now; Along with non-symmetrical threats like terrorism or
weapons of mass destruction or even pandemic diseases or
food safety, security issues are far more, far more real and
far more many and interrelated with each other, than ever.
Protective action is thus necessary. Preventive and protective
measures and procedures are necessary to be managed;
managing crisis is a must, as they need to occur, prior to
their occurrence.
National security is of primary necessity; Protection
seems to be the objective, yet also the tool. Protection
means, safety, equals to sustainability and growth. This
equation reflects both country/countries, regions and space.
Security seems thus to be a societal advancement element. It
reflects both national security and supranational security (in
an alliance) form and format. Their very existence and
development require investment, in both, soft and hard
skills; adding to them clear-cut strategic management of
logistics and fiscal needs and requests.
Security is today more than ever, a pre-requisite; A
pre-requisite for stability and possibility sustainability;
peaceful resolution of current or possible future conflicts.
Security is thus a model of business continuity; in where a
strong resilience in both tactical and operational methods
and adaptability, may lead to practical solutions today and
beyond on challenges and threats. Security when properly
adopted and adapted should reflect a forecast methodology,
which we will need to adopt comprehend and strategize in a
new modernized alliance level format, whether international
or regional.
The following sub-chapters, introduce, analyses and
critically evaluates the necessity of the theoretical concept of
what the author defines as the need to establish or reshape
‘Alliances in a Hybrid manner’. In the hope that the termi-
nology of ‘Hybrid Alliance’can further be defined, exam-
ined and possibly applied, the theory on Hybrid alliances,
should be considered as a strategic tool; an element of
thinking in an alternate way and dimension thinking and
acting on security; reflecting the real world of security,
strategy, intelligence and specialized education and
training on security resilience and business continuity,
among others.
In a new world order, according to Henry Kissinger’s
book [5], alliances are an integrative part to world balance.
Alliances hold the key for growth and sustainability of a
region’s peace, stability but also prosperity. Through inter-
nationally led and accredited, by the sole international
organization, the United Nations (UN), alliances such as
NATO [4] and are security providers projecting sustain-
ability and growth, featuring safety and security, that is
however is no longer ‘static’; stakes are stronger and greater;
as the enemy is not symmetrical and threats are hybrid.
When alliances do become hybrid themselves, meaning
self-adaptable, self-interoperable and operationally agile and
flexible, then we can rest assure that threats and challenges
can be swiftly and successfully tackled. We should know the
enemy, and we should respond to the enemy appropriately.
Alliances can only achieve strategic aims and visions, when
successfully integrated in a system of operational agreement
that will eventually lead to potential success against threats
and challenges of all kinds.
This paper explores and examines the importance of
current and future hybrid challenges. Hybrid challenges
come about versus, traditional symmetrical/asymmetrical
threats. The paper explores the necessity of modern and
pragmatic strategic thinking in the levels of alliance coop-
eration, coordination and practical effectiveness.
In turn, I contemplate the importance of leadership and
vision for growth in a world of business continuity and
security resilience and efficiency. Power and influence are
elements that establish strong alliances. Needless to stress,
they need to be organized and long-term associated with
current but most importantly future challenges.
The theory on Hybrid Alliances, meaning the necessity to
self-adapt, self-operate and self-determine, should be put to
the test, when considering the future of security, peace and
conflict. Hybrid alliances are today a reality that is currently
takes such form, where influence and power matters at a time
of much needed and newly created regional or international
balance of power. They should reflect a new era of security
terminology.
Hybrid Alliance methodology is a current terminology
with future elements attached. It is an important outcome
that does not deprive from any author, reader and evaluator
for what science is meant to be: Future foresighting and
made possible when applied in a growing society complete
with opportunities but also threats.
The targeted audience for such a theory are security
experts and strategists in the relevant or specialized fields.
The research is part of a multidisciplinary approach to
security, strategy and operational capacity-building.
Following the below analysis, the author projects early,
important lessons to be learned as outcomes. The author
provides proposals, which necessitate strong alignment to
long-term strategic planning and management that does
more to provide effectiveness, military agility and interop-
erability in a world of global interconnectedness.
As a disclosure to the paper that follows, I wish to stress
that this current research includes views which are solely and
independently expressed. They reflect my positioning on the
future of security through alliances.
The term ‘Hybrid Alliances’should be considered as new
term, which may be used as a tool for strategic thinking. It is
the first time that is used and reflects innovation in security
thinking; it is a new security terminology that I deem as
important to reflect on, to analyse and to examine. The
Hybrid Alliances: Efficiency, Business Continuity …189
current paper is of multidisciplinary approach; concentrating
in the fields of international security and strategy.
This paper is both a research and policy proposal paper. It
is part of a larger research that is of specialization in security
and strategy, is of practical value, as it includes policy
analysis and policy proposals. A larger scale research will be
published soon after the publication of this research as a
collective analysis book on “Hybrid Alliances”.
2 On Hybrid Alliances
According to Henry Kissinger’s book on World Order, “the
world or rule-based system, faces challenges”, as the ‘in-
ternational community’“…expected all allies to abide by
rules”[5]. According to the author, for countries “to do their
fair share, play by the 21st century rules or to be responsible
stake-holders in a common system”, there is still no clear
definition or practical formulation of what constitutes,
according to the reader “fair”contribution to any possible
alliance [5]. He further goes on to stress that the international
community in invoked “insistently now that any other era”.
Yet “it presents no clear or agreed set of goals, methods, or
limits”[5].
According to [3], alliances depend on what we may call
as “nature”of the external threat and as such alliances are
formed. In this paper, I assume that alliances happen due to
influence, “power and opportunity”. A possibility of fore-
sight of the future, may actually help create enough ‘mi-
nority reports’to foresee threats and challenges. As such, as
Walt states, States shall no more “bandwagoning, with the
source of threat”[3], rather we state that alliances shall be
ready, through the source of self-adaptiveness and security
operational and tactical preparedness and resilience.
As [3] stresses, alliances can hold a behavior based on the
external threat. In this paper, we assume that alliances have
already a ‘security culture’attached. As we explain next, due
to geographical proximity, interests and diversity of current
but also new and future threats, alliances are or can be
inevitable. Reasoning is quite clear: interconnectedness.
According to [3], alliances can hold offensive and
aggressive intentions. That is true. However, alliances are
also dully formed, due to opportunity. Alliance creation,
may be created for those seeking to become strong or to be
stronger, due to their active abilities and competences but
also availability and need. Alliances are always necessary.
They not only strengthen cultures, but strengthen continuity,
business continuity and security resilience.
Alliances cannot be ‘dominated’from specialized solely
characteristics. They are formed to complement methods of
interests and of power efficiency that are of mutual impor-
tance; understanding the necessity of need, or request to be
part of an alliance is an opportunity, as long as foreign and
security objectives are clear; a definition of the role that each
state will play should be clear.
Alliances, according to the above mentioned can there-
fore be characterized terminologically as ‘Hybrid’. As alli-
ances, cannot be decreed as ‘solid’. History of alliances
easily proves such argument. Alliances can either long-term
or short-term; reflecting solely the necessity; do renew
themselves at times of challenge and threat to face conse-
quences. As such [6] wonders: “What if alliances were to be
reformed in our near future? In his “World Order”,[5],
wonders how to define it; threats will or do continue to
emerge; challenges are seen and risks are now high. Current
alliances need to reshape. Clearly due to the following: the
threat of terrorism and war, short-term proxy wars, tech
wars, weapons of mass destruction, climate change food and
health security to mention just a few. When and if a new
world order is declared, when alliances are hybrid shaped;
when a system of rule is established on alliances, on oper-
ations, tactics and more importantly hybrid strategy, only
then we may define a clear-cut strategy. In a world order of
hybrid adaptiveness and capabilities, the system of rule will
become clearer; well defined and managed; skills vision and
positioning in operations will be clear as the reports and
objectives on how to counter all forms of extremism will be
made as a clear-cut risk management tool.
Within the 21st century, as the 4th technological revo-
lution unfolds, at a time of technological advances, smart
grids, networks and grids, outer space communications,
Artificial intelligence, genetics and robotics are quick sha-
pers of conditions and new and emerging situations, sharing
of knowledge and information that is accurate and to the
point is necessary. Access to large data gathering and
information is deemed as a necessity in a world of hybrid
threats, yet also hybrid alliances that are self-reliable and
self-adaptive to threats of the future.
Alliances bring and will continue to bring cultures toge-
ther; societies will eventually continue to grow closer to each
other as “slogans”according to [5]. Methods created, reg-
istered as initiatives are present to reflect the needs of today.
In a world of ‘smart dominance and rule’, alliances ought
however to be more flexible and diverse and multidimen-
sional in all vision, mission, strategy and operations. Hybrid
alliances seem to be the only option that will keep the
security relevance of action and methodology against all
kinds of threats, alive.
3 Challenges When Building Hybrid
Alliances
A strong challenge on and about Hybrid Alliances is to
define and seek out a true and operational model of coop-
erative security for possible allies. It should be model for
190 M. P. Efthymiopoulos
self-command structure of operational, tactical and leader-
ship capacity to deliver actual security, through elements of
cooperative growth between the allies that seek to
re-establish cooperative objectives. Future visions of oper-
ations of Hybrid Alliances, can actually provide strategic-led
solutions to existing or future issues in a ‘world of an order’,
that according to [5], is yet to defined, while the international
community is constantly invoked.
While seeking models of economic, society and security
prosperity and sustainability and self-modernization in
countries and cities, cooperative hybrid security of allied
countries, stands out as a good method of bringing a balance
of power for the region. Any possible current or future
alliance to be shaped that holds a cooperative security pol-
icy, will enable practical efforts to provide security resilience
for the long-term whether threats are asymmetrical or hybrid
in nature.
Hybrid Alliances are a model of business continuity,
defining countries and regions. Alliances are/will be used as
a tool or method that connects all security elements with the
world of sustainability and economic/societal stability and
growth; It is/will use elements of traditional security provi-
dence, helping to create a sustainable business model of
growth, safety and stability. This model is/will help establish
a regional or global society not only as security resilient but
business oriented, sustainable; it will be considered a
methodological method of resolution, of current, existing
and/or possible future conflicts.
The challenge on Hybrid Alliances, is evident: for new
alliances to take shape, form and or be defined as hybrid, we
need to seek out force-command and leadership with a
vision that supersedes current issues, challenges and threats
in a world that its order is yet to be defined. In this world of
Hybrid alliances, we seek operational capacity building,
power and influence of leadership that acquires and requires
strong legitimacy and power effectiveness; Alliances
reflecting future models of societal global and regional
governance; Models of hybrid nature: Self-nurtured and
self-adaptive to new challenges, risks and threats.
In a modern and constantly self-modernizing society, the
method of understanding cooperative delivery of security,
that is the approach to alliance formation, should be sim-
plified. Necessary rules of and for political stability are
needed; Resilience to peace is requested; resilience to busi-
ness sustainability, growth and development should be the
approach to cooperative security. In a truly global and
interconnected society, alliance formation, should reflect
moral, ethical and societal needs and requests.
Current canonical forces and force-command structures
of allies are seen to be restrained from rules and regulations
of a system that was built on element(s) of competition or
threat(s) of ideological differentiated nature; where the pos-
sibility of war or instability was or still is imminent.
Currently, alliances are on a track of change; threats differ;
the ‘opportunity’to change is there; thus, alliances will also,
just change for the sake of changing.
Alliances with no hybrid command structure, abilities, or
self-engagement rules self-adaptability can be only consid-
ered as ‘static’alliances with a possible end date. Modern
Alliance posture and business resilience requires power-base
influence, long-term project planning and tactical effective-
ness; actual engagement and methodological adaptation to
new rules and new dimensions without procedural or polit-
ical engagement.
Defense as the frame for alliance cooperation, for political
and strategic engagement reflects the need for the rule of law
and democracy but it does not reflect modern and future
threats. Defense methodology is static, as are current alli-
ances. It expects things to happen so allies may be engaged
or defend. In defense, preventive or pre-emptive methods are
of defense nature. But they are not Hybrid. They are not
mature enough to operate. They cannot provide for a future
foresight ‘strategic minority report’that will necessitate the
adaptability process of what defense should look like in the
near future to come, that will elaborate all possible future
challenges taking into account symmetrical, asymmetrical
threats and now the possibility of Hybrid threats.
Hybrid alliances are challenges to continue and be built
around the concept of alliance-making, where forces join
against a common or many threats. Alliances are thus not a
new phenomenon. Empires, from Ancient Periods and
Antiquity, such as the one of Alexander the Great and its
“Corinthian Alliance”, stand out as similar in morality and
notion; they are reflective to today’s world. An example
NATO [4]. Alliances flooded with pluralism of democratic
values. Decision-making processes depend and depended on
the element of power and interests; created and sustained
based on elements that ones’interest may reflect or be the
interest of the other one. More so, when the interests
reflected or reflect past and current threats. When future is
introduced based on interest and power effectiveness.
According to [7], “New Wars”or future wars, are or can
be about the claim to power on the basis of “seemingly
traditional identities-nation, tribe, religion”. Agreeing and or
accepting the above, equally means that security needs to be
re-defined based on sound arguments that are not solely of
static defense posture, rather hybrid. Methodologically
achievable to reach out for tactical training and
preparedness.
As such one may ask: what if, power was not about
symmetrical and static threats? What if threats were modules
of future issues, related with among others technological
advances such as artificial intelligence, robotics, genetics
and humanoid development? Would threats arrive and/or be
more destructive from the one, rather the many in a
dimensional world above the internet of things?
Hybrid Alliances: Efficiency, Business Continuity …191
Hybrid threats need hybrid reaction. Through alliance
sharing of information and research material, these chal-
lenging realities should be faced. More so, when we may
become capable to anticipate them in or through an estimate
as we already named it as ‘strategic minority report’.
Mearsheimer [8], assures us that in the field of security
and or strategy, “security competition is endemic to daily
life”. Security should be able to reconstruct it-self, adapt to
new and emerging situations both analogic and multi-
dimensional. Security, should continue to be provided and
states or alliances should continue to be providers. More so,
when challenges and/or threats can be considered hybrid.
Military or political alliances are and should continue to
be security providers. When security apparatus, needs to
re-adapt, so should alliances. When alliances become hybrid
in both nature and operations the security apparatus is sud-
denly changed as the risk assessment assures of imminent
hybrid threat assessments. Security resilience therefore
seems to be a necessity. As alliances are constantly and
knowingly, challenged, allied members are as well. The
question is, are we capable for strong futuristic led leader-
ship that does more to provide sustainability and resilience to
allies and member states?
4 Leadership and Vision for Growth
in the Field of Security
Leadership requires agility and understanding. It can be
taught yet is considered for few to be a gift of nature, to a
person. Leadership defines creativity, notions of collabora-
tion and aspiration. Vision, mission and innovation as
methodologies, stand out at times of grave and tremendous
change that maybe needed, or be inspired to do so. Lead-
ership is an asset value. I personally, believe, that leadership
cannot be dictated or taught. Skills can be dictated to a point
or extent. Yet true vision and methodology of approach to
subject may not.
The importance of leadership and vision for growth in a
world of business continuity and security resilience and
efficiency, is of essence. Leaders need to lead. Take deci-
sions. Learn the importance of alliance interconnectedness
and growth. Leaders should be an example. Of character and
abilities to hear, learn, decide and implement. Leaders
should empower and influence in a positive nature followers
and supporters. They should dream and share dreams with
what the city or state can be. A great leader may also be a
great marketer; a great manager and a great decision-maker.
All above are elements, we seek in a leader that will not
only allow for the establishment of strong alliances but for
innovation and future foresight to become an integrative part
of alliance success, posture and effective power measure-
ment in what we are yet to define as the world order.
Walt [3] used in his theory, the Middle East, due to the
fascinating scale of changes, happening in and through
alliances in between the Arab World. And even today the
scale of changes due to foreseen and unforeseen circum-
stances in the Arab World and the Gulf are tremendous. In a
world and country plentiful of structural and institutional
changes, leadership stands out as the most important asset
value for the sustainability and growth of the Middle East
and Gulf region, that is more than seemingly emerging.
Defining the future is not easy. Predicting even more so. But
when dreams come true you cannot but to seek, to learn how
and apply.
The United Arab Emirates, the Government of Dubai
with its vibrant city [9] stand out, through the vision of
2030–2117 of the UAE as a model of current and future
cooperative security. The UAE vision is a set complete of
cultural values; national diversity, tolerance but also security
resilience; important elements, which stand out as key to
current and future success [9] but also education to current
and future allies of the UAE; achievable, through culture and
traditions, technological agility and research. Leading suc-
cess derives from vision. A vision and concept of leadership,
decision making and process but also security resilience and
business continuity and enhancement.
In his book “my Vision”H. H. Mohammed Bin Rashid
Al Maktoum, Prime Minister of the United Arab Emirates
and Ruler of Dubai [10], envisions sustainability growth and
development for the United Arab Emirates, thus becoming
an exemplary case of success, and therefore assuring security
resilience, business continuity and partnering with the
international community. His Royal Highness, the ruler of
Dubai, anticipates the future; does not bandwagoning; and
suggests development as an element of growth. He “knows
and understands that development and constant moderniza-
tion are difficult”[10]. As “nothing is impossible”.
Visionary leadership is as shown above, important for
alliances. Alliances stand out, as a good opportunity for
growth and development and in this case cooperative secu-
rity as a modus operandi. Tactical and operational projection
planning, interoperability of forces, tolerance, diversity of
language and cultures are important objectives and tools of
reaching out to cooperative security that is hybrid in nature.
Sustainability of hybrid alliances, is an importance goal to
reach at. Consensus building and operational ‘burden shar-
ing’should be applicable. These are elements justifying
operational capacity and business continuity. Foresighting
the future is also of essence. Predicting challenges, maybe
the sole important aspect of success for alliance continuity
and constant change.
Resilience within hybrid alliances is important. Security
resilience should continue to include continuity that is not
deprived of development through future prediction and
foresighting. Security allocation and vision of leaders,
192 M. P. Efthymiopoulos
should allow for strong leadership in strategic, operational
and tactical levels. Quality of decision-making should
increase. Influence and national participation in target met
objectives is of necessity.
Security allocation, enhanced cooperation in alliance
posture such as NATO, as a political military alliance,
should project the need for strong leadership in strategic,
operational and tactical levels in assuring the future of
security against possible threats and obstacles to modern-
izations of countries and increase of democratic values of
cooperation and trade. Quality of decision-making and
affordability in comprehending anticipating and sustaining
the future of security, should increase.
Therefore, strong engagement, rule and posture is of
paramount importance to the success of alliances. Mini-
mizing the risk of solitude, and achieving maximum open-
ness and cultural diversity, military and operational success
through joined and continued preparedness, collaboration
and continued interoperability that will be solely based on
the element of ‘yes we can’.
5 Forecasting the Future: Continuity
and Change in Hybrid Alliances
By forecasting a much-needed security resilience framework,
we result to a much needed diplomatic and military pre-
paredness framework of security cooperation among states
that wish or are willing to take part in alliance formations.
What is necessary to stress is that any new alliance, hybrid in
nature, should reflect current challenges and threats.
Reflecting, acknowledging and defining threats current or
future considering all aspects of dimensionality and diversity
of threats, in this paper I defined a new meaning and role of
alliance formation when considered hybrid.
Today’s regional and global security environment requires
at this point continuity through constant change. Change that
according to Walt, is defined based on threat. This paper
defines threat as a ‘non-ending story’, as challenges will
never cease to exist. Challenges and threats cannot define
alliances. Rather alliances need to define or predict the future.
Future resilience in alliance formation or sustainability
requires strong understanding of growth and development,
through opportunities that defines a global, multi-
dimensional societal and security culture, where nation,
states and regions, can define their own peaceful develop-
ment and possibly resolution of conflicts inside or outside
the sphere of influence.
Hybrid Alliances hold the key for prospective growth in a
new geostrategic world that is complete with challenges and
threats. Hybrid alliances, require agility in leadership,
strategic, operational and tactical accuracy; preparedness,
capacity building; deployability efficiency and operational
effectiveness. By defining alliances, this does not mean that
alliances will rest and or remain the same forever, as inter-
ests change according to [11].
That is why, characterizing necessary growth in alliance
current formation requires, hybrid alliance positioning and
posture. Eliminating static formations and decision making
to acquire multi-dimensionality in effectiveness and
decision-making, simplifying rules and decisions, while
adapting to a constantly changing environment without
expecting the threat or challenge to ‘rise to surface’.
6 Conclusion
During the course of this research paper, I established the
theoretical assumption that goes in line with current security
operational requests, on current or future alliance formation
or reformation. The future cannot be dictated, but can be
predicted and shaped. When alliances are of hybrid in nat-
ure, self-determinant, self-adaptive and predictive of future
threats and challenges, then alliances can be a. reformed, b.
reshaped, c. newly shaped, considering long-term strategic
planning for stability regionally or globally positively
affecting business continuity, security resilience, safety,
sustainability and growth.
References
1. Randal Sherwood, E.: Alliances and American National Security.
US Army War College, Carlisle. http://www.StrategicStudies
Institute.army.mil/. Last accessed 2017/11/15
2. Brzezinski, Z.: The Grand Chessboard: American Primacy and Its
Geostrategic Imperatives. Basic Books, New York (1997)
3. Walt, S.: The Origins of Alliances. Cornell University Press, Ithaca
and London (1987)
4. The Official Site of the North Atlantic Alliance, NATO. www.
nato.int. Last accessed 2017/11/17
5. Kisssinger, H.: World Order. Penguin Books, New York (2014)
6. Efthymiopoulos, M.P.: International Security and Transatlantic
Relations. Sakkoulas Press, Thessaloniki-Athens (2012)
7. Kaldor, M.: New and Old Wars, Organized Violence in a Global
Era, 3rd edn. Stanford University Press, Stanford (2014)
8. Mearsheimer, J.J.: The Tragedy of Great Power Politics, updated
edn. University of Chicago Press, Chicago (2014)
9. The Official Portal of the UAE Government: Vision 2030–2117.
https://government.ae/en/more/uae-future/2030-2117. Last
accessed 2017/11/17
10. Al Maktoum, H.H., Bin Rashid, M.: My Vision. Motivate
Publishing, The Dubai Government Media Office, Dubai (2015)
11. British Broadcasting Company BBC: All you need to know about
the UK Exit from the EU. http://www.bbc.com/news/uk-politics-
32810887. Last accessed 2017/11/17
Hybrid Alliances: Efficiency, Business Continuity …193
Impact of Corporate E-Learning Systems
in Enhancing the Team Performance
in Virtual Software Teams
Rajalakshmi Subramaniam and Senthilkumar Nakkeeran
Abstract
E-learning at workplace in other words ‘Corporate
E-learning’is being becoming extremely important in
today’s globalized organizational scenario. Especially
software organizations that facilitate lot of opportunities
for its staff members to work in a virtual environment rely
upon E-learning solutions to a great extent. E-learning
solutions are available in various forms and various tools
are available in the market developed with the intention to
serve the customized needs of software organizations
depending upon the kind of knowledge transfer they
would like to impart to their work force. This research
intends to analyze empirically the impact of Corporate
E-learning solutions in enhancing the team performance
of virtual software teams. An empirical study has been
conducted on the primary data collected from 202
software professionals spread across various software
organizations in India and are leading the virtual teams.
A multiple linear regression analysis has been conducted
in analyzing the data collected. The results reveal that
successful implementation and usage of E-learning sys-
tems in software organizations for training employees will
enhance the performance of teams even though there are
geographically dislocated from one another.
Keywords
Team work quality Corporate E-learning systems
Virtual team performance Virtual software teams
E-learning system success
1 Introduction
Owing to the tremendous advancement of technology and the
growing importance of E-learning, this technology is being
adapted widely in both public and private organizations in
India. Time, place, access, supporting technology, interaction,
personalization and control are some of the characteristics
which make them as one of the most preferable elements in
operating training in corporate companies. Kumar and Gulla
[1] studied about the possibilities, promises and realities of
corporate e-learning. Conception, operation, implementation
and specification are some of the important aspects that make
corporate e-learning system an important tool. Most of the
organizations use sophisticated learning management system
(LMS) tool or software to train their employees these days.
Better management and technical support has been achieved
by the implementation of e-learning in most of the organiza-
tions successfully. Moreover, the modularity, privacy, speed,
style of learning, customization, evaluation, consistent
delivery and flexibility make e-learning systems an indis-
pensable tool for corporate training [2].
E-learning systems have played a significant role in team
training and have proven to enhance the performance of team
members of most of the corporate companies that have
employed them so far. Apart from these, most of the enter-
prises have identified E-learning technology as an enabler in
attaining the organizational goal in an effective manner.
E-learning has created the possibility of quick reaction to
change the environment. Possibility of lifelong learning,
trainings interactivity, direct verification possibility of train-
ing effects and the absorption easiness are some of the vital
aspects that make e-learning method as an indispensable
technique in the corporate world [3]. Table 1summarizes
few of the most frequently used E-learning tools by various
Indian corporate sector in training their employees.
E-learning has proven to be very cost effective in training
employees especially when they are geographically dislo-
cated from each other. E-learning has proven to have yielded
R. Subramaniam (&)S. Nakkeeran
Department of Management Studies, Anna University,
Chennai, India
e-mail: s.raji217@gmail.com
S. Nakkeeran
e-mail: sen_nsk76@annauniv.edu
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_22
195
positive return on investment to most of the organizations
through its cost effectiveness. IBM, one of the giant tech-
nocrats, has confirmed that huge savings can be achieved via
the initiatives of team training through E-learning. Team
training through e-learning system requires team members to
demonstrate self-direction and lot of discipline [4].
E-learning systems are more conducive to team members
who are independent learners and tech-savvy within a team.
While there have been numerous benefits identified to have
been achieved by corporate companies in adapting
E-learning technology for employee training, this study tries
to find out the answer for the following research question:
•Does successful implementation of e-learning systems
(ELSS) in software organizations enhance virtual team
performance (VTP)?
2 Literature Review and Conceptual
Framework
2.1 Meaning and Definition of Virtual Teams
Earnhardt [5]defined the virtual team as an interdependent
group working on the project across varying time and space.
This also has relied on the technologies of information and
communication. In other words, the virtual teams have the
capability to meet the requirements through electronic means
successfully. The virtual teams share the responsibility in out-
come of team. It comes together for a time with a finite amount.
Additionally, the virtual team uses the information technologies
which prevail among the form of communication.
Ebrahim et al. [6]defined the virtual team as the group of
people who interact through the independent task guided by
common work across links strengthened by technologies of
transport, communication and information. In other words,
the virtual teams are referred as the distributed team of work
whose members are dispersed geographically with the
technologies of electronic information and communication.
According to [7], virtual teams are defined as the groups
of people who work together although they are dispersed
across time, organizational boundaries and space in a
frequent manner. In addition to these, it is also defined as the
groups of organizationally dispersed workers brought toge-
ther by technologies of information to accomplish more than
one organizational task.
2.2 Dimensions of Successful E-Learning
Systems
Information Quality. Alkattabi et al. [8] analyzed the
framework of information quality for e-learning systems.
Accuracy, believability, consistency, objectivity, verifiabil-
ity, interpretability, accessibility and response time are some
of the quality dimensions significantly linked with the dif-
ferent information quality creates a significant influence on
the e-learning system. Intrinsic information quality, contex-
tual informational quality, representational informational
quality and accessibility information quality are some of the
information quality linked with the e-learning system. Alla
and Faryadi [9] studied the effect of information quality in
e-learning system. Their study has found out that the accu-
racy has become the strongest dimension which affects the
quality of information of e-learning system followed by
validity, relevancy and accessibility respectively.
Service Quality. Service quality of e-learning system has
created the positive impact on the organizational outcomes.
In the context of e-learning system, the high service quality of
e-learning induces higher user satisfaction and system usage
[10]. Hence, the service quality of e-learning has provided the
clear basis for the success of e-learning service. Sugant [11]
designed the framework for measuring the service quality of
e-learning services. The service quality dimensions have
varied between e-services. Design and presentation, struc-
ture, content, usability, technology and responsiveness rela-
ted to information and service quality paved the way to attain
the highest service quality of e-learning systems. The users’
perceptions about the system and information quality have
influenced the beliefs about the service quality.
System Quality.Alla[12] studied the impact of system
quality in e-learning system. Usability, accessibility, relia-
bility and stability are some of the main dimensions of
Table 1 Few famous corporate e-learning systems in practice in Indian IT organizations at present
S. no Name of e-learning system Advantages
1 Talent LMSS Supports for videoconferencing with multiple platforms
2 Docebo It is an user-friendly system
3 Litmos It helps to enable corporate learners to get the customer service they need by using any mobile devices
4 Mindflash It helps to achieve specific performance goals and training objectives effectively
5 Oracle Taleo Cloud
Service
Very flexible and customizable for the learners
6 Capabiliti It provides complete data security with seamless integration
196 R. Subramaniam and S. Nakkeeran
system quality of e-learning system. Among these, the
usability is act as the strongest dimensions on the e-learning
system efficiency. The author also pointed that the system
quality has the tendency to increase or decrease the effi-
ciency of the learning system. It also has become very clear
that the attributes of system quality seems to be more sig-
nificant in the area of e-learning success. The authors pre-
dicted that the system quality is positively related to the
satisfaction of the user when compared to other dimensions
of e-learning system [13].
User Satisfaction. Wang et al. [14] pointed that the user
satisfaction is act as the critical success factor which surro-
gate of e-learning systems. Information quality and the
readiness for online learning are the two factors positively
affected the e-learner satisfaction. Moreover, self-efficacy
and the self-regulated learning management are showing the
negative relationships with the e-learner satisfaction with the
learning management systems (LMS) [15].
System Use. Institutional support to the system users has
been pointed as the main dimensions of the success of the
system. In fact, the incorporated quality of system acts as the
main determinant of system use by the instructors. System use
has operationalised in various ways. The author has found a
strong relationship between the intention to use and the system
use [16]. In fact, the system use has measured by the extent to
which the instructors ensured the functions of e-learning
system. In addition to these, the system use is considered as the
measure of success under mandatory use and discretionary use
and hence it is considered as the e-learning success dimen-
sions. In this sense, the content quality of e-learning acts as the
main predictor of system use by learners.
Net Benefits. User satisfaction and net benefits are the
two vital dimensions of e-learning system that create an
impact on the performance of an organization. Enhanced
learning, empowered, time savings and success are the
positive aspects of net benefits whereas, the lack of contact,
isolation, quality concerns and technology dependence are
pointed as the negative aspects of net benefits [17]. Net
benefits of e-learning systems have acquired among indi-
viduals, organizations and society. The e-learning system
usage among the employees is significantly associated with
the performance of task [18] (Table 2).
2.3 Impact of E-Learning Systems on Team
Performance
Srivastava and Agarwal [19] studied about new trend of
e-learning in education and corporate training. Mobile tech-
nologies, e-learning process simulation, adaptive learning
environments (ALEs) and developments of e-learning tools
standards are some of the latest trends in e-learning played a
significant role on virtual team performance. Likewise,
e-learning is pointed as the better option to enhance the
performance of the team members to attain the objectives of
an organization in a successful manner. Moreover, self paced
courses and facilitated asynchronous type of e-learning cre-
ated a significant impact on the virtual team performance.
Fatma [20] analyzed the trends, issues and challenges of
e-learning. Embedded learning and blended method of
e-learning creates an impact on the performance of the team.
Blackboard.Inc tools have used for the business and gov-
ernment collaboration and this has created a significant
impact on the success of the organizations. Moreover, an
asynchronous activity of e-learning uses some of the tech-
nologies to creates the team members more effective.
E-learning has complemented the process and it can helped
to reached out to he masses. It also has the tendency to cover
distances and it also has spreaded across multiple locations
especially towards an organization. The content of e-learning
seems to be repetitive until it is cleared by the trainee.
David [21] studied the impact of e-learning in workplace.
Improved and consistent rates of lifelong learning, enhanced
productivity and improved competitiveness and innovation
are some of the key outcomes of e-learning within an
organization. Anytime, anywhere, any place, time reduction,
increased payback, reinforcement, motivation, community
building, flexible access and monitoring of the leaning
process are some of the benefits of using e-learning creates a
positive impact on the virtual team performances. The
authors have pointed out that the e-learning is effective to
link learning with work of an employee.
Corporate e-learning’s impact on employees was ana-
lyzed by Ellis and Kuznia [22]. Proper training by e-leaning
systems towards employees and their teams shows higher
organizational commitment and enhanced virtual team
Table 2 Dimensions of
successful e-learning system Dimensions of successful e-learning system Author Year
Information quality All and Faryadi 2013
Service quality Sugant 2014
System quality Draheeb and Fabil 2016
User satisfaction Eom 2014
System use Samarasinghe 2012
Net benefits Chen and Kao 2012
Impact of Corporate E-Learning Systems in …197
performances. E-Learning has the tendency to produce
custom-made training courseware to attain the enhancing
training solutions. It also has the ability to maintain detailed
records of training to track the performance of an employee.
This has further increased the virtual team performance in an
effective manner. The authors also predicted that the
increasing usage of e-learning by the corporate leaders has
affected the working environment and hence it affects the
attitudes of employees towards the corporation.
A study done by Cheng and Chen [23] analyzed the
impact of e-learning on workplace on the job training.
System quality, information quality, system use and user
satisfaction are some of the perceived characteristics and
system use behavior of e-learning creates an impact on the
individuals and thereby influencing the performances of the
team. In this sense, the authors predicted that the e-learning
system is positively related with the user satisfaction. It can
be also predicted that the e-learning is act as the powerful
tool for the team members to attain the competitive advan-
tages over others in an organization.
Wang et al. [24] has used the performance oriented
approach to e-learning in the workplace. The authors have
analyzed that the e-learning has a tendency to align the needs
of individual and organizational learning, performance of
work and supporting social interaction among individuals.
Key performance indicator of e-learning is flexible and
popular approach to conduct the performance measurement
in an organization. It also has helped the team members to
make sense of their work context to enhance their organi-
zational performances. The authors also have focused on the
development of e-learning in view of short-term needs to
enhance the job performances.
Hatane [25] studied the impact of e-learning on
employability skills development in small organizations.
Limited facilities and work culture are pointed as the main
challenging factor of e-learning creates a negative impact on
the virtual team performances. Learning success or failure
through e-learning is seen in the employees’performance.
Immediate cost savings, flexibility, reduced time and travel
of e-learning are creating the positive impact on the virtual
team performance of an organization. Purpose, learners,
support, other media and choose what you need are some of
the optimal benefits of e-learning creates a significant impact
on the performance of team and its successful outcome.
Conceptual Framework and Hypothesis
The following figure presents the conceptual Framework
explaining the relationship between Virtual Team Perfor-
mance and Successful Implementation of E-learning system
at IT organizations (Fig. 1).
The following is the hypothesis to be tested in this study
Null Hypothesis: Successful implementation of e-learning
systems in software organizations does not enhance virtual
team performance.
Alternate Hypothesis: Successful implementation of e-
learning systems in software organizations enhances virtual
team performance.
3 Research Methodology
3.1 Approach of Research Employed
This research makes use of a deductive approach also known
as quantitative approach. Previous research has defined
deductive approach as the one in which a research design is
developed for the test of a set of hypothesis that has been
derived and proposed through extensive review of existing
literature. The researcher in this particular study has exten-
sively reviewed the factors that determine the successful
implementation of E-learning systems within organizations
and the relationship between E-learning and virtual team
performance and derived hypothesis that connect each and
every factor of E-learning system success with that of virtual
team performance. This study therefore can be considered to
have adapted a quantitative or deductive approach. Data
collection is restricted to software organizations within
Fig. 1 Conceptual framework explaining the relationship between
virtual team performance and successful implementation of e-learning
system at IT organizations
198 R. Subramaniam and S. Nakkeeran
Chennai India that make use of E-learning systems to train
their employees. The research design employed is descrip-
tive research design. Simple random sampling is the sam-
pling design that has been adapted in this research.
Collection of primary data was done through distribution of
questionnaires to the target respondents through online sur-
vey data collection tool. The questionnaire links of the sur-
vey instrument generated by the online survey tool was sent
to 245 respondents. After data coding of the collected data,
the final figure of number of valid responses arrived at was
202 thereby making the response rate as 82%. It was taken
care of by the researcher that the data has been collected
from the team leaders of virtual teams of software organi-
zations. It has been ensured that the person who is
responding to the survey has used E-learning system himself
for at least 3 months and has led a particular virtual team for
at least four months.
3.2 Research Instrument
The researcher has designed the research instrument with
three sections in it. Dimensions of successful implementa-
tion of E-learning and Virtual team Performance are the two
major variables involved in this study. The first section of
the questionnaire measures E-learning system success. In
order to measure whether E-learning system has been
implemented successfully in an organization, the researcher
has employed ELSS instrument proposed and adapted [26]
by as it is. E-learning system success in this research is
quantified into six parameters namely system quality,
information quality, service quality, system use, user satis-
faction, net benefits and measured in the form of a 34 item
scale. Virtual team performance makes the second section of
the instrument. In order to measure team performance the
researcher has employed the instrument proposed by Jones
and Harrison [27]. The instrument proposed by Jones and
Harrison [27] measures performance of teams that are
exclusively put up in software organizations through a 7
item scale. Since it suits best for this research, the researcher
has employed the same. The third and final section of the
questionnaire surveys the demographic details of the par-
ticipants such as age, gender, years of experience, educa-
tional background and details of the institution in which the
respondent is currently put up.
3.3 Techniques for Statistical Analysis
This research makes use of multiple linear regression in
order to find the relationship between the dependent variable
virtual team performance and independent variable suc-
cessful implementation of E-learning Systems at organiza-
tions. According to [28], multiple linear regression is best
suited when there is one dependent variable and many
independent variables. In our case the dependent variable is
virtual team performance of virtual teams and the indepen-
dent variables is E-learning system success which is deter-
mined by 6 characteristics namely system quality,
information quality, service quality, system use, user satis-
faction, net benefits. Therefore this research finds Multiple
Linear regression analysis as the most appropriate technique
for identifying the relationship between the variables and
testing the proposed hypothesis of this research. SPSS has
been employed in order to carry out the statistical analysis.
3.4 Techniques for Validation of Instrument
and Findings
Reliability is an important strategy that has to be identified
for any instrument to consider it suitable for collection of
primary data. Cronbach alpha is the most widely adapted
tool for calculating reliability of an instrument. It has been
suggested by George and Mallery [29] that the value of
Cronbach amust be greater than 0.7 for an instrument to be
accepted reliable. In this research the Cronbach alpha value
obtained for the adapted research instrument is 0.9 which is
above the cut off limits. Therefore it can be considered
reliable. Further in order to ensure the validity of the adapted
research instrument, the researcher has adapted the instru-
ments that have been adapted by many researchers in the
past and have been proven to render valid results.
4 Data Analysis and Interpretation
This section presents the statistical analysis of the impact of
E-Learning System Success (ELSS) on Virtual Team Per-
formance (VTP) in a software industry. The virtual team
performance is the dependent variable while e-learning
system success is the independent variable. The e-learning
system success has six attributes: information quality, sys-
tem quality, service quality, system use, user satisfaction and
net benefits. To achieve this goal, the following research
hypothesis and its respective research question were set to
guide in the analysis process. The analysis process will
involve analysis of socio-demographic factors, descriptive
statistics of both dependent and independent variable and
lastly multiple linear regression. The study had 202
respondents who were mainly employees from software
organizations across, Chennai, India.
Impact of Corporate E-Learning Systems in …199
4.1 Analysis of Socio-demographic Factors
This section is involved with analysis of social and demo-
graphic data concerning the employees in software industry.
The socio-demographic variables of the employees that were
analyzed include; age, gender, working experience and
designation type. The statistical methods used for analyzing
socio-demographic data are descriptive statistics and
graphical techniques.
Distribution of Age. Table 3shows that the age group
20–30 years were 36.1%, followed by those aged
30–40 years at 23.8%, while those aged above 40 years
were 23.3% and those aged 18–20 years were the least at
16.8%. The results indicate that the age group 20–30 years
was the modal age group among in the software industry.
Gender. The data analysis shows that the male were
54.5% while the female were 45.5%. This indicates that the
males were relatively more than males in the software
industry. These results can also be displayed by a pie chart
(Fig. 2).
Working experience. Results in Fig. 3show that the
working experience of employees who had worked for
1–5 years were 29.7%, those with work experiences of
6–10 years and 11–15 years were both at 29.2% lastly those
with work experience above 16 years were 11.9%. The
results indicate that the work experience of 1–5 years was
the most common among in the software industry
employees.
4.2 Dependent Variable: Mean and Standard
Deviation of VTP
Results in Table 4show the minimum rated virtual team
performance is 2.00 and the maximum rated virtual
team performance is 4.50 at a scale of 5. The mean virtual
team performance is 3.3465 with a standard deviation of
0.3943. The results at a scale of 5 show that averagely, VTP
was at a moderate state and evenly spread across the soft-
ware industries in India. This assertion can be exhibited
using a normal curve inscribed on a histogram (Fig. 4).
Table 3 Age
Age Frequency Percent Cumulative percent
18–20 34 16.8 16.8
20–30 73 36.1 53.0
30–40 48 23.8 76.7
40+ 47 23.3 100.0
Total 202 100.0
Fig. 2 Pie chart of gender distribution
Fig. 3 Pie chart of working experience distribution
Table 4 Dependent variable
Variable N Minimum Maximum Mean Std.
deviation
VTP 202 2.00 4.50 3.3465 .3943
Valid N
(listwise)
202
200 R. Subramaniam and S. Nakkeeran
4.3 Independent Variable: Mean and Standard
Deviation of E-Learning System Success
(ELSS)
Table 5shows the minimum and maximum values for each
ELSS variables, it also shows themean and standard deviation of
each of the ELSS variables. It is worth noting that all the six
variables analyzed were scaled within 5 values, being; 1, 2, 3, 4
and 5 representing; strongly disagree, disagree, neither agree nor
disagree, agree and strongly agree respectively. In all the six
variables, the minimum rated value was 1.67 while the
maximum rated ELSS variable value is 4.43 at a scale of 5. The
means and standard deviations of the ELSS variables are:
(l=3.1304andr= 0.4963), (l=3.1301andr= 0.4829),
(l=3.0554andr= 0.4843), (l=2.8449andr= 0.6684),
(l=3.1106andr= 0.5447) and (l= 2.9931 and r=0.4874)
for system quality, information quality, service quality, system
use, user satisfaction and net profits respectively.
The results averagely indicate that all the ELSS variables
were at moderate states and normally spread across the
software industries in India. Therefore, the descriptive
statistics on VTP and ELSS variables did not explain much
about the relationship between them. With this regard, the
research found it imperative to analyze this relationship
using correlations and regression in multiple linear regres-
sion analysis.
Fig. 4 Histogram of virtual team
performance distribution
Table 5 ELSS-mean and
standard deviation ELSS variables N Minimum Maximum Mean Std. deviation
System quality 202 2.33 4.33 3.1304 .49631
Information quality 202 2.29 4.43 3.1301 .48287
Service quality 202 2.20 4.20 3.0554 .48428
System use 202 1.67 4.33 2.8449 .66843
User satisfaction 202 1.67 4.33 3.1106 .54473
Net benefits 202 2.10 4.10 2.9931 .48741
Impact of Corporate E-Learning Systems in …201
4.4 Multiple Linear Regression
Correlations. Table 6shows that all the ELSS variables
except user satisfaction are significantly correlated to virtual
team performance (VTP). The system quality is significantly
and fairly correlated with virtual team performance
(r = 0.407 and Sig = 0.000), information quality is signifi-
cantly and moderately correlated with virtual team perfor-
mance (r = 0.327 and Sig = 0.000), service quality is
significantly and strongly correlated with virtual team per-
formance (r = 0.581 and Sig = 0.000), system use is sig-
nificantly and strongly correlated with team performance
(r = 0.628 and Sig = 0.000) and net benefits is significantly
and strongly correlated with virtual team performance
(r = 0.691 and Sig = 0.000).
Therefore, it is worth noting that system quality, infor-
mation quality, service quality, system use and net benefits
are significantly correlated with virtual team performance
and can be used in linear regression modelling of VTP using
variables of ELSS.
4.5 Regression Model Summary
When virtual team performance (VTP) is modelled using
system quality, information quality, service quality, system
use, user satisfaction and net benefits the model correlation
coefficient is 0.775 and it respective R-squared is 0.600. This
is a stronger R-squared value that shows that the model can
account for about 60% of the variability of virtual team
performance using system quality, information quality, ser-
vice quality, system use, user satisfaction and net benefits as
appropriate predictors (Table 7).
4.6 ANOVA Table of the Regression Model
The results indicate that of the regression model, in which
virtual team performance is predicted using system quality,
information quality, service quality, system use, user satis-
faction and net benefits has a F-value of 48.820 with p-value
of 0.000. Consequently, this shows that the model is signif-
icant and should be adopted for prediction and explanatory
purposes. Next we obtain the model parameters (regression
coefficients) that will be used to quantify and predict the
virtual team performance using system quality, information
quality, service quality, system use, user satisfaction and net
benefits as appropriate predictors. The table below shows the
regression coefficients of the regression model (Table 8).
4.7 Regression Model Coefficients
The results in Table 9indicate that constant (t = 15.241 and
sig = 0.000), system quality (t = −2.455 and sig = 0.015),
information quality (t = −3.759 and sig = 0.004), service
Table 6 Correlation between VTP and ELSS
VTP System
quality
Information
quality
Service
quality
System
use
User
satisfaction
Net
benefits
VTP Correlation 1 .407
**
.327
**
.581
**
.628
**
−.002 .691
**
Sig. .000 .000 .000 .000 .981 .000
N 202 202 202 202 202 202 202
**Correlation is significant at the 0.01 level (2-tailed)
Table 7 Model summary table
Model R R square Adjusted R square Std. error of the estimate
Regression .775
a
.600 .588 .25309
Predictors: (Constant), Benefits, Satisfaction, System use, System quality, Information quality, Service quality
a
Dependent variable: VTP TT
Table 8 ANOVA table
Model Sum of Squares df Mean square F Sig.
1 Regression 18.762 6 3.127 48.820 .000
a
Residual 12.490 195 .064
Total 31.253 201
a
Predictors: (Constant), BEN QT, SAT QT, USE QT, SYS QT, INF QT, SER QT
202 R. Subramaniam and S. Nakkeeran
quality (t = 4.573 and sig = 0.000), system use (t = −4.278
and sig = 0.000), user satisfaction (t = −5.279 and sig =
0.000) and net benefits (t = 3.791 and sig = 0.003).
According to the results, all p-values (Significant values) in
the model are less than 0.05, hence, we reject the null
hypothesis, accept the alternate hypothesis and conclude
that, successful implementation of e-learning systems in
software organizations enhances virtual team performance.
The multiple linear regression model can be expressed
mathematically as:
TP ¼2:288 0:339 SYS 0:744 INF þ1:162 SER 0:471 USE
0:336 SAT þ1:091 BEN
where
VTP Team
performance
SYS system quality
INF information
quality
SER service quality
USE system use
SAT user satisfaction
BEN net benefits
These results indicate that when system quality increases
by 1 virtual team performance decreases by 0.339 and when
information quality increases by 1 virtual team performance
decreases by 0.744. on the other hand, when service quality
increases by 1 virtual team performance increases by 1.162
while if system use increases by 1 virtual team performance
will decreases by 0.471. When user satisfaction increases by
1 virtual team performance decreases by 0.336 while if net
benefits increases by 1 virtual team performance will
increases by 1.091.
5 Discussion and Conclusion
Learning is an integral part of the corporate training strategy.
E-learning systems form an important role in imparting
effective training at corporate organizations belonging to the
software industry. The results of the study reveal that suc-
cessful implementation of E-learning systems depend upon
six basic factors namely system quality, information quality,
user satisfaction, system use, service quality and net benefits.
It is also understand from the test of hypothesis that suc-
cessful implementation of E-learning systems in corporate
will contribute towards the enhancement of performance of a
team even though they are, virtual, in nature. In other words,
the members of a software team can exhibit enhanced per-
formance even though they are geographically dislocated
from each other.
Considering the theoretical implications of this research, it
has opened up new dimensions for future researchers to
explore more in the academic arena of software team perfor-
mance and corporate E-learning. Considering the practical
implications of the study, this research brings into light the
expectations that user of E-learning systems especially
belonging to the software industry have towards the features of
E-learning systems implemented at their workplace. Further
this research gives an idea to the team leaders and team
members who are a part of virtual team in making effective use
of E-learning systems and enhance performance of the team.
Table 9 Coefficients of the
regression model Coefficients t Sig.
B Std. error
(Constant) 2.288 .150 15.241 .000
System quality −0.339 .138 −2.455 .015
Information quality −0.744 .190 −3.759 .004
Service quality 1.162 .254 4.573 .000
System use −0.471 .056 −4.278 .000
User satisfaction −.336 .064 −5.279 .000
Net benefits 1.091 .115 3.791 .003
Impact of Corporate E-Learning Systems in …203
6 Future Scope of the Research
Like any other research this research also have its own
limitations. This research has been conducted with specific
reference to Indian software organizations and that too for
virtual teams. This study can be further extended by
repeating the same for physical software teams in India as
well as other regions across the globe in order to test if the
results hold same. Further this study can be conducted with
respect to industries other than that of the software industry
and their results can be compared against the findings of this
research by the future researchers.
References
1. Kumar, P., Gulla, U.: Corporate e-learning: possibilities, promises
and realities. DESIDOC J. Libr. Inf. Technol. 31(3), 179–188 (2011)
2. Roy, A., Raymond, L.: Meeting the training needs of SMEs: is
e-learning a solution? Electron. J. e-Learn. 6(2), 89–98 (2008)
3. Kisielnicki, J., Sobolewska, O.: E-learning as a strategy of
acquiring a company’s intellectual capital. Interdisc. J. E-Learn.
Learn. Objects 6(2010)
4. Rao, P.: E-Learning in India—the role of national culture and
practical implications (2010). Retrieved from: http://ceur-ws.org/
Vol-570/paper010.pdf
5. Earnhardt, M.P.: Identifying the key factors in the effectiveness
and failure of virtual teams. Leadership Advance Online, vol. XVII
(2009)
6. Ebrahim, N., Shamsuddin, A., Taha, Z.: Virtual teams for new
product development—an innovative experience for R&D engi-
neers. Eur. J. Educ. Stud. 1(3), 109–123 (2009)
7. Ebrahim, N.A., Ahmed, S., Taha, Z.: Virtual teams: a literature
review. Aust. J. Basic Appl. Sci. 3(3), 2653–2669 (2009)
8. Alkattabi, M., Neagu, D., Cullen, A.: Information quality frame-
work for e-learning systems. Knowl. Manage. E-Learn. Int. J. 2(4)
(n.d)
9. Alla, M.M.S.O., Faryadi, Q.: The effect of information quality in
e-learning system. Int. J. Appl. Sci. Technol. 3(6) (2013)
10. Chen, L.H., Kuo, Y.F.: Understanding e-learning service quality
attributes of a commercial bank by using Kano’s model. Total
Qual. Manage. Bus. Excellence 22(1), 99–116 (2011)
11. Sugant, R.: A framework for measuring service quality of
e-learning services. In: Third International Conference on Global
Business, Economics, Finance and Social Sciences (GB14Mumbai
Conference), Mumbai (2014)
12. Alla, M.M.S.O.: The impact of system quality in e-learning
system. J. Comput. Sci. Inf. Technol. 1(2) (2013)
13. Dreheeb, A.E., Basir, N., Fabil, N.: Impact of system quality on
users’satisfaction in continuation of the use of e-learning system.
Int. J. e-Educ. e-Bus. e-Manage. e-Learn. 6(1) (2016)
14. Wang, Y.S., Shih, Y.W., Li, C.R.: Assessing user satisfaction with
e-learning blog systems. Int. J. e-Educ. e-Bus. e-Manage. e-Learn.
2(6) (2012)
15. Eom, S.B.: Understanding e-learners’satisfaction with learning
management systems. Bull. IEEE Tech. Committee Learn. Tech-
nol. 16(2/3) (2014)
16. Samarasinghe, S.: e-learning systems success in an organizational
context (2012). Retrieved from: http://mro.massey.ac.nz/xmlui/
bitstream/handle/10179/4726/02_whole.pdf?sequence=
1&isAllowed=y
17. Lee-Post, A.: e-learning success model: an information systems
perspective. Electron. J. e-Learn. 7(1), 61–70 (2009)
18. Chen, H.-J., Kao, C.-H.: Empirical validation of the importance of
employees’learning motivation for workplace e-learning in
Taiwanese organizations. Australiasian J. Educ. Technol. 28(4),
580–598 (2012)
19. Srivastava, E., Agarwal, N.: E-learning: new trend in education
and training. Int. J. Adv. Res. 1(8), 797–810 (2013)
20. Fatma, S.F.: E-learning trends issues and challenges. Int. J. Econ.
Commer. Res. 3(2), 01–10 (2013)
21. David, O., Salleh, M., Iahad, N.: The impact of e-learning in
workplace: focus on organizations and healthcare environments.
Int. Arab J. e-Technol. 2(4) (2012)
22. Ellis, P.F., Kuznia, K.D.: Corporate e-learning impact on employ-
ees. Glob. J. Bus. Res. 8(4) (2014)
23. Cheng, W.T., Chen, C.C.: The impact of e-learning on workplace
on the job training. Int. J. e-Educ. e-Bus. e-Manage. e-Learn. 5(4)
(2015)
24. Wang, M., Ran, W., Liao, J., Yang, S.J.H.: A performance-
oriented approach to e-learning in the workplace. Educ. Technol.
Soc. 13(4), 167–179 (2010)
25. Hatane, S.E.: The impact of e-learning on employability skills
development in small organization (A study case of a small
organization in Blitar, East Java, Indonesia). In: The Sixth
International Conference on eLearning for Knowledge-Based
Society, Thailand (2009)
26. Wang, Y.S., Wang, H.Y., Shee, D.Y.: Measuring e-learning
systems success in an organizational context: scale development
and validation. Comput. Hum. Behav. 23(1), 1792–1808 (2007)
27. Jones, M.C., Harrison, A.W.: IS project team performance: an
empirical assessment. Inf. Manage. 31(2), 57–65 (1996)
28. Hair, J.F., Black, W.C., Babin, B.J., Anderson, R.E.: Multivariate
Data Analysis, 7th edn. Prentice Hall, Upper Saddle River, New
Jersey (2010)
29. George, D., Mallery, P.: SPSS for Windows Step by Step: A
Simple Guide and Reference. 11.0 Update, 4th edn. Allyn &
Bacon, Boston (2003)
204 R. Subramaniam and S. Nakkeeran
IoT Based Water Usage Monitoring System
Using LabVIEW
P. Arun Mozhi Devan , K. Pooventhan, C. Mukesh Kumar,
and R. Midhun Kumar
Abstract
Wireless communication devices development has a
considerable impact on several fields like healthcare,
agriculture, houses and various others applications.
Amongst these, the significant application is the improve-
ment of monitoring system for various functions. Auto-
mated water utilization monitoring system proposes an
efficacious manner of controlling the wastage of water at
home, colleges, hospitals, industries, shops, and malls by
the use of LabVIEW software and Wireless sensor nodes.
At many locations of the world, water is luxuriously
wasted whereas many areas don’t have sufficient. So in
order to track/monitor the water flow, Sensor nodes are
placed at every water outlets which sense the course of
water. Continuous monitoring is done using the concept
Internet of things (IoT) via the wireless sensor nodes. The
server collects the information through Wi-Fi/LAN to the
process and tracks the usage, additionally, amount of
water wastage is calculated at each outlet. When water is
used in surplus/prefixed rate, an alert is sent to the user for
indication by using this user can constantly keep a track
of the water usage or wastage through a cell or laptop
with an internet connection. This proposed water utiliza-
tion and monitoring system allows the individuals,
colleges, hospitals, industries, department shops, malls
and motels to keep a track on their water bills and allows
the government and authorities to accomplish/control the
water supply.
Keywords
Water monitoring LabVIEW Wireless sensor nodes
IoT
1 Introduction
At present Conventional water meters are used to calculate
the amount of water used at homes for billing cause. This
doesn’t provide an efficient method of monitoring the water
usage. The water is wasted at each and every outlet know-
ingly or unknowingly which adds as much as a big quantity
ultimately. Efficient management of the water used at homes
could be very lots essential as about 50% of water provided
to the cities gets wasted thru its incorrect utilization [1].
Water control is only possible if the user is aware of the
quantity of water he makes use of and the quantity available
to him. Hence there is a need for enhancing the conventional
water measurement meters for the users to continuously
screen their water usage. Agricultural countries like India,
news about multiplied farmer suicides (about 26% in 2014)
cannot be overlooked, wherein one of the predominant
motives for its miles the unavailability of water [2]. At many
places, water is luxuriously wasted while our farm lands
don’t have enough. Automated water usage monitoring
machine proposes a powerful manner of controlling the
wastage of water at houses and industries with the aid of
permitting the person to continuously display and manage
the use of water. The user is able to screen his water uti-
lization at each faucet now and again thru his smartphones or
laptops and also needless water wastage is also prevented.
This water tracking device includes 3 modules: Wi-Fi
sensor module; Central module; Server module. Wireless
sensor module collects the records from each water outlets,
P. Arun Mozhi Devan (&)K. Pooventhan C. Mukesh Kumar
R. Midhun Kumar
Electronics and Instrumentation Engineering,
Sri Ramakrishna Engineering College, Coimbatore, India
e-mail: arunmozhideven.p@srec.ac.in
K. Pooventhan
e-mail: pooventhan.k@srec.ac.in
C. Mukesh Kumar
e-mail: mukeshkumar.1506026@srec.ac.in
R. Midhun Kumar
e-mail: midunkumar.1506022@srec.ac.in
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_23
205
at the server all of the computation is performed and the
signals are generated and central module acts as an interface
between the server and the sensor module. Wireless sensor
networks (WSN) are spatially dispensed autonomous sensors
to display physical or environmental situations, which
include temperature, sound, stress, and so forth. Internet of
Things (IoT) is a growing idea which may be included in
conjunction with Wi-Fi sensor networks for efficient track-
ing from a remote area. Section 2discusses the associated
works papers listed out in, the techniques for implementation
is discussed in Sect. 3and the proposed methods are
explained in Sect. 4. Sections 5and 6discusses the results
acquired and conclusion.
2 Related Works
A mechanism for estimation of senior well-being condition
based usage of family home equipment linked through
multiple sensing units is proposed in [3]. It is a WSN
(wireless sensor network) based household monitoring sys-
tem for senior people activity tracker which involves func-
tional evaluation of daily activities.
Paper [4] discusses the design of a sensor network for
monitoring and manipulation of the water distribution
mechanism. The application of this system lies in detecting
seepage or any other structural faults present in underground
pipelines. It has various sensors for this reason integrated
with GPS and a 3G modem. The sensor nodes are expensive
and the replacing of it may difficult as it’s deployed in
underground.
The paper [5,6] discusses the development of a prototype
for tracking and content material management system for
agriculture. It is a Zigbee based tracking module using Wi-Fi
sensor nodes. The sensors are coupled to LAN that is used to
show the information on the server.
A Wi-Fi sensor based environmental water monitoring
method is proposed in [7]. This system routinely displays
video regarding the water temperature and pH from sur-
rounded water. This water monitoring methodology is
appropriate for the complicated and significant water mon-
itoring of large areas, inclusive for reservoirs, lakes, rivers,
swamps, and shallow or deep ground waters.
The efforts are taken for developing a wireless frame
sensor networks based totally energy saving integrated cir-
cuit featured with the protocol is designed for medicinal
programs to have been explained in a paper [8].
In [9] the author has advanced “Smart Coast”that has
been proposed for best water control which is designed
primarily based on WSN (wireless sensor network) concept
It’s a Wi-Fi sensor based device for sensing and calculating
the usefulness of water. It is a miniaturized and smart
tracking device.
3 Methodology
This arrangement consists of two core modules, (1) Server
Module (2) Wireless sensor module [10]. The Wi-Fi sensor
module as shown in Fig. 1which collects the definite time
data at respective households. These data is sent to Lab-
VIEW module thru Wi-Fi or LAN. The LabVIEW module
can be accessed from any far inaccessible area with an
internet linking [11].
The basic block of computerized water usage monitoring
machine consists of specifically three components, (i) Wire-
less sensor module (ii) Central Module (iii) Server Module.
Wireless sensor module connects the various sensor nodes to
central node. Then it’s connected to Server thru a commu-
nique link Sensor module includes (1) Sensor (2) Sensor
Circuitry (3) RF Transceiver module (4) Indicators and
(5) Power source as shown in Fig. 2. The sensor senses the
water flow and sends the statistics to the sensor circuitry.
The received signal is amplified at the sensor circuitry. RF
module is used as a transceiver to transmit the sensed
statistics and receive the control alerts. The power source is
used to power up the sensor circuitry, RF module, and
indicators.
The Central module includes an Arduino board that is
linked to numerous modules together with (1) RF module
(2) Solenoid valve (3) Wi-Fi/Ethernet Shield (4) Water flow
meter (5) Indicators (6) Power supply as presented in Fig. 3.
The server collects the raw statistics over the internet for
tracking the water utilization. For this purpose, it contains
(1) Computational block (2) Monitoring/Display block
(4) Feedback/Control block as presented in Fig. 4.
The computational block computes the desired parame-
ters based on numerous algorithms. These parameters are
Wireless
Sensor
Module
Central
Module
Server
Module
Fig. 1 Block diagram of an automated water usage monitoring system
Sensor RF Transceiver
Sensor
Circuit Power Source
Indicators
Fig. 2 Block diagram of wireless sensor module
206 P. Arun Mozhi Devan et al.
displayed with the help of monitor/display. These parame-
ters are used to create remarks or manipulate indicators.
4 Proposed System
The idea of automated water utilization monitoring system
lies in alerting the user for excess usage of water at every
outlet, also providing the consumer a way to screen his/her
water bills time to time.
4.1 Wireless Sensor Module
Water flow at every outlet can be sensed by the wireless
sensor node at every water outlet [12]; (i) which is shown in
Fig. 5characterize the wireless sensor nodes placed at the
water outlet. An apartment of seven water outlets is con-
sidered. These sensor nodes are wirelessly linked to a central
module by a solo hop Central module is represented by
(ii) in Fig. 4. Indicators at the central module indicate the
average amount of water that can be used by the user. The
indicator is also used display the water outlet which is cur-
rently used. Centralized node shown in Fig. 6consists of
arduino board is connected to water flow meter and solenoid
valve which is connected to main water inlet. Reset button is
also included in the system [13].
When a water outlet is opened for more than a certain
amount of time stated at the Server module, an alert is given
on the indicator and through the mail. If the consumer
doesn’t reply within a prescribed time restriction the sole-
noid valve shuts the supply to the house. When the con-
sumer identifies the alert and closes the particular outlet he
can press the reset button to re-establish the water distribu-
tion. An effectual way for the full quantity of water utiliza-
tion can be done using water flow meter [14].
4.2 Server Module
LabVIEW module acts as a server to manipulate and display
the information to and from the wireless sensor nodes. The
LabVIEW develops the information received from the cen-
tral module to show the processed data and additionally
create appropriate manipulation signals. The central module
data is used to check the water outlet or faucets status. It is
used to decide the quantity of time the water outlet is
retained open. The utilization time is displayed in seconds.
Based on the utilization time and information from the water
flow meter, an effective algorithm is used to calculate the
quantity of water used. The current utilization is displayed
from the calculated value. Each time the status turns off the
present usage. The cumulative information from the present
utilization is used to calculate the overall usage and it’s
displayed. A time stamp is inserted into it to reset it each
month.
The information from the usage time and present uti-
lization is used to formulate the alert and warn the machine.
The conditions for warning and alert scheme are revealed in
Table 1. These situations are formulated to reduce the
Arduino
Board
Indicators Power
Source
RF
Solenoid valve Water flow meter
Fig. 3 Block diagram of central module
Computational
Block
Monitoring /
Display
Feedback
Control Block
Fig. 4 Block diagram of server module
Fig. 5 System concept design
IoT Based Water Usage Monitoring System Using LabVIEW 207
wastage of water. Its important purpose is to alert the person
of the over utilization at every water outlet. To resume the
water flow to the residence the user can close the apt water
outlet and can press the reset button. This approach gives an
effective way of controlling wastage of water while it is left
unattended.
Figure 7shows the warning system’sflowchart of the
server. The system begins the process by checking the status
of the outlet. If the tap constantly makes use of water greater
than the stated value then the warning signal is activated.
Then the machine examines whether the tap is on or off. If
the tap is off then, once again the system assess the status of
the tap. The flowchart of alert system for server was shown
in Fig. 8. The system examines if the tap is continuously on
for greater time than the threshold time restriction then the
alert signal is activated. Then the system inspects whether
the tap is on or off. If the tap is off then the system again
examines the status of the tap. The supply control system’s
flowchart for the server was shown in Fig. 9. The system
checks if the tap continuously on for greater time than the
brink time limit then the alert signal is activated. After that
the system checks whether tap is on or off. If it’s off then the
system once again examines the status of the tap. Automated
water utilization monitoring system offers the person the
ability to view the water utilization data within the server
through any gadget at any time using an internet connection.
The water utilization parameters inside the LabVIEW
module such as usage time, present utilization, overall usage,
warning and alert status of every water outlet the present
invoice amount can be accessed by using the person through
Fig. 6 Central module design
Table 1 Conditions for warning
and alert system Output devices Warning limit (Liters) Alert time (min)
Wash basin 10 15
Shower 25 15
kitchen tap 10 15
Flush 15 15
Fig. 7 Warning system flowchart
208 P. Arun Mozhi Devan et al.
his/her smart phones, PDA and desktops by using internet
accessibility from any browser.
5 Results and Discussions
The essential a part of the water control management system
is LabVIEW which will act as a server. On and off buttons
will simulate the water outlets with the help of server
developed. The on/off status of the buttons is used for an
additional computation for developing alert, warning signal
and govern the alert signals. Server module alerts the user
through e-mail. From this the user can able to get the proper
warning signals from the server module to help the con-
sumer to access the status.
The advanced server device with the capabilities inte-
grated together for an automatic water usage utilization
system to offer a effective manner of controlling the over
usage and unnecessary wastage are shown Fig. 10. The front
panel view of water utilization thru manual simulation where
shown in Fig. 11.
By using a switch water outlet has manually simulated for
switching on and off of the water outlet. If the wash basin tap
uses more than or equal to 10 L of water continuously,
which is definitely an over usage then the warning is acti-
vated. This signal activates the LED on the respective Wi-Fi
sensor node. This suggests the person close the tap. If a
particular water outlet is kept open for more than 15 min i.e.
when the consumer ignores the warning signal or left unat-
tended then an alert signal is regenerated. Alert and warning
signal generation where shown in Fig. 12.
The alert signal generates a beep sound at the central
module and additionally, it flashes the LED indicating
which water outlet is open. If the consumer doesn’t respond
to the alert signal within a minute the server sends an
e-mail to the person informing the information about the
over utilization of water on exact tap. The system waits
again for two more minutes to close the water outlet. Even
after two minutes if the water outlet is left unattended the
then the server informs the central module to close down
the primary water supply. Solenoid valve shuts the primary
water supply and the module keep on displaying the outlet
is open.
The consumer will get a weekly notification about the
status of his/her water bills. He/she also can request a noti-
fication when the water bill exceeds a specific restrict.
Thereby the consumer can maintain the water bill and its
usage. The graph as shown in Fig. 13 indicates the usage at
every water outlet in the Server module.
Fig. 8 Alert system flowchart
Fig. 9 Supply control system flowchart
IoT Based Water Usage Monitoring System Using LabVIEW 209
Fig. 10 Graphical representation of water usage at server
Fig. 11 Manual stimulation of water usage
210 P. Arun Mozhi Devan et al.
Fig. 12 Alert and warning system display at server
Fig. 13 Graphical representation of water usage at server
IoT Based Water Usage Monitoring System Using LabVIEW 211
6 Conclusion
The development of technology paved the way to increase
in conceptions like WSN, IoT, and 5G and many others.
There are some fundamental assets in the world which
might be important to preserve life, but with the advance-
ment in the generation, most of those sources are being
depleted or destroyed in a certain manner. These advanced
technologies are in general exploited to make our existence
easier. But there are a lot of these technologies that aren’t
but exploited or given importance, which can be used to
decrease the depletion of the natural resources preserving
the ecological balance and making the existence of our
forthcoming generation easy and trouble free living
environment.
In this paper, we’ve created an automatic water usage
monitoring system which lets in plummeting the depletion
of the water. The server module has been designed with all
capabilities together with the generation of status and
reports of every tap in the house, malls and apartments the
present usage of water at each outlet and the total quantity
of water used at every outlet respectively. The current water
bill of water used is displayed with the entire amount of
water bill. The warning and alert signals to control the water
flow to the house, malls and apartments are displayed in
combination with email facility to notify the consumer
approximately the water utilization based totally on
above-mentioned situations. The switching of an each water
tap is simulated utilizing manual controls. The hardware
part consists of the Wi-Fi sensor module and central module
yet to be developed it needs to be synchronized to the server
module and needs to be validated in the various real-time
conditions.
References
1. Hegde, N.: Water scarcity and security in India. In: BAIF at the
Indian Science Congress (2012)
2. Hebous, S., Klonner, S.: Economic Distress and Farmer Suicides
in India: An Econometric Investigation. University of Heidelberg,
Discussion Paper Series No. 565, May 2014
3. Suryadevara, N.K., Mukhopadhyay, S.C.: Wireless sensor network
based home monitoring system for wellness determination of
elderly. IEEE Sens. J. 12(6) (2012)
4. Whittle, A.J., Allen, M., Preis, A., Iqbal, M.: Sensor networks for
monitoring and control of water distribution system. In: The 6th
International Conference on Structural Health Monitoring of
Intelligent Infrastructures, Hong Kong, 9–11 Dec 2013
5. Chung, W.-Y., Caya, M.V.C., Chen, C.-L.: Wireless sensor based
monitoring and content management system for agricultural
application. Position papers of Federated Conference on Computer
Science and Information System FedCSIS, pp. 75–78 (2013)
6. Rasin, Z., Abdullah, M.R.: Water quality monitoring system using
Zigbee based wireless sensor network. Int. J. Eng. Technol.
IJET-IJENS 09(10) (2009)
7. Jiang, P., Xia, H., He, Z., Wang, Z.: Design of a water
environment monitoring system based on wireless sensor net-
works. Sensors 9, 6411–6434 (2009)
8. Zhang, X., Jiang, H., Zhang, L., Zhang, C., Wang, Z., Chen, X.: An
energy-efficient ASIC for wireless body sensor networks in medical
applications. IEEE Trans. Biomed. Circ. Syst. 4(1), 11–18 (2010)
9. O’Flynn, B., Martínez-Català, R., Harte, S., O’Mathuna, C., Cleary,
J., Slater, C., Regan, F., Diamond, D., Murphy, H.: Smart coast—a
wireless sensor network for water quality monitoring. In: 32nd IEEE
Conference on Local Computer Networks, pp. 815–816 (2007)
10. Labview User Manual &LabVIEW Run-time Engine Technical
Specification. Retrieved from http://www.ni.com
11. Johnson, G., Jennings, R.: LabVIEW Graphical Programming
12. Dargie, W., Poellabauer, C.: Fundamentals of wireless sensor
networks: Theory and practice (2010)
13. Sridharan, S.: Water quality monitoring system using wireless
sensor network. Int. J. Adv. Res. Electron. Commun. Eng.
(IJARECE) 3(4) (2014)
14. Zhao, F., Guibas, L.J.: Wireless sensor networks: An information
processing approach (2004)
212 P. Arun Mozhi Devan et al.
Learning Analytics: Developing
a Data-Centric Teaching-Research Skill
Alrence S. Halibas , Bobby Sathyaseelan ,
and Muhammad Shahzad
Abstract
This paper highlights the importance of developing
data-centric teaching-research skills of 21st-century
teachers. It critically examines the literature related to
the teaching-research nexus and learning analytics, and
presents a model of the integration of these concepts, and
their relevance to the teaching and learning process. This
paper also presents the desirable skills set of learning
analysts and identifies the analytic tools that they can use
to carry out this role. Finally, this paper suggests the
future direction of teacher training and professional
development programs that will equip teachers with the
right teaching-research skills and tools to help the
millennial learners gain academic success. This study
recommends that teachers need to be well informed about
their students by having access to their data and acquiring
the necessary competencies to perform appropriate data
analysis. Furthermore, they are expected to engage with
analytical tools and educational technologies in order to
realize a more effective teaching and learning experience,
and improve academic outcomes.
Keywords
Learning analytics Teaching-research nexus
Pedagogical approach
1 Introduction
Systematic collection and analysis of data informs educa-
tional practice and learning. Educational research on student
learning allows teachers to assess their teaching effectiveness
and make evidence-based decisions about their teaching.
With the advent of content management systems, learning
management systems, virtual learning environment, and
other digital learning environments, learning styles and
pedagogical methods for teaching are reinvented and trans-
formed to answer the learning needs of the 21st-century
students [1]. It is also in this regard that data-driven
decision-making in education has become increasingly
prevalent and relevant. Information systems and analytic
systems are currently being used by leading academic
institutions to better understand and meet the needs of stu-
dents, and are gradually gaining popularity and widespread
use in colleges and universities around the world. Online
learning management systems support teaching and learning
activities by providing access to course content, delivering
assessments, and allowing online communication and col-
laboration among teachers and students. Moreover, these
systems hold a great deal of learners’data that can possibly
reveal their online learning behaviors. Combining the
learning log data produced by these systems and data from
student information systems provide opportunities for aca-
demic institutions to apply business intelligence and ana-
lytics in order to improve their services as well as student
outcomes and retention [2].
The study of [3] imparted that with the aid of analytical
systems, academic institutions nowadays are able to use a
wider scope of data analytics. Thus, several institutions have
started to embrace analytics to drive business goals, and
address strategic management challenges of teaching and
learning, cost reduction, and organizational efficiency and
productivity [4]. These institutions have used data analytics
to monitor and measure large amounts of learners’infor-
mation that are produced by information systems, and gen-
erate data trends that are useful in the strategic decision
making [5]. They utilized student information to assess
learning progress, improve the student experience, predict
academic performance, and identify potential teaching and
learning issues [6]. Furthermore, the study of [7] reported
that there are two core analytic concepts, namely academic
analytics and learning analytics, which operates on the meso
layer and micro layer of an organization, respectively.
A. S. Halibas (&)B. Sathyaseelan M. Shahzad
Gulf College, Muscat, Oman
e-mail: alrence@gulfcollege.edu.om
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_24
213
This paper discusses the use of analytics in the micro layer,
which collects and analyses data to assess and optimize
student learning.
According to [8], the essence of Scholarship of Teaching
and Learning (SoTL), otherwise known as the “Nexus”,isto
inform teaching by means of inquiry and produce evidence
of student learning. It is through teachers’increase
accountability, responsibility, and understanding of the
impact of their practices that enables enhancement in the
educational process. Teaching in the 21st-century classroom
is a challenging profession that requires teachers to carry out
multiple tasks other than classroom instruction. This
includes the adoption of innovative technologies and
understanding learning in online and blended learning
environments [9]. Teachers are expected to assume various
roles such that of a lecturer, supervisor, advisor, researcher,
and the likes [10]. A teacher is expected to have a good
range of ICT skills needed for effective teaching, including
substantive skills related to data analysis. In order to acquire
this critical skill set, a teacher must be developed not only to
become a technically proficient individual, but also be
trained to become a skilled learning analyst who is able to
assess, interpret and explain the data, and perform suitable
actions to improve the learning process [11]. At present
times, there is a great expectation for teachers to engage in
active learning through research. This is further gravitated by
their continuing use of traditional approaches to education
that may not always address the learning needs of the new
breed of students.
Moreover, there are numerous barriers to adoption of
emerging technologies in the academic institutions, but a
significant percentage is due to teachers’lack of substantive
ICT skills which limit the adoption and integration of ICT in
their teaching and learning. There are still teachers who
prefer to use conventional teaching methods and are unac-
ceptably technology illiterate. Even with the availability of
Learning Management Systems (LMS), a significant per-
centage of teachers are using these systems by just doing the
usual tasks of uploading lecture materials, conducting online
quizzes, and engaging students in discussion forums. Most
of them are not fully aware that they can do so much more
with the student data being produced by these systems.
Nowadays, teachers are expected to practice a
learner-centered approach to teaching via the Internet that
provides a more flexible learning environment [12]. Hence,
teachers are expected to carry out the role of data analysts
who are able to customize learning in order to realize an
effective learning experience for students. Doing so requires
teachers to become learning analysts.
This paper critically reviews the teaching-research nexus
and learning analytics. Thereafter, the paper will present a
conceptual model on the utilization of learning analytics in
the teaching-research nexus. Subsequently, it examines the
role of teachers as learning analysts in addition to their roles
as researcher, and content and pedagogical expert. Likewise,
this paper identifies the limitations of analytic tools and
technologies, thus, recommends skills needed for data col-
lection, analysis, and presentation. It finally concludes by
recommending actions that teachers and management can
take.
This paper provokes educators to redesign their peda-
gogical practices in order to integrate learning analytics in
their practice. This paper hopes to impact the academic
institutions by influencing their teaching and learning prac-
tices. It further hopes to educate academic leaders and
practitioners on the usefulness of learning analytics in the
teaching-research nexus for a more data-informed educa-
tional management. Furthermore, this paper hopes to influ-
ence an institution’s preparedness in refining its teacher
training and development programs that include the acqui-
sition of learning analytic skills.
2 The Teaching-Research Nexus
There exist a strong integration and positive relationship that
links research and teaching [13]. The Teaching-Research
Nexus draws on several approaches and/or dimensions that
include learning through research that engages students in
research work, research-led teaching that uses research to
inform teaching, research on teaching that looks at the
effectiveness of teaching and learning using research for
continual improvement, teaching-informed research that
stimulates research ideas to assess specific teaching strate-
gies and approaches and evaluate student learning experi-
ences, learning how to do research that promotes a
community of academic researchers, and so on. Nonetheless,
the conduct of research into student learning to influence
teaching is the focus of this paper.
Teachers perform research that looks into their teaching
and learning effectiveness by collecting and analyzing rele-
vant student data, which includes academic performance and
learning behavior [14]. These data are extremely helpful for
teachers so that they can understand their students better and
make more informed evidence-based decisions to improve
the learning outcomes and gauge the effectiveness of their
teaching. Teachers must have access to student data that they
need for their scientific inquiry to gain insights into the
student experiences and tailor their instruction to meet their
needs. Additionally, teachers are encouraged to practice
evidenced-based teaching. Doing such necessitates teachers
to engage in scholarly teaching that systematically analyzes
evidence of student learning through research.
Accordingly, the findings of several educational resear-
ches that focus on student learning and experience have
helped enhance pedagogical practices of teachers. Moreover,
214 A. S. Halibas et al.
these researches have also been valuable in understanding
the complex nature of learners, which teachers must be
aware of so that they can give timely feedback to students.
Thus, teachers need to do more than facilitating knowledge
transfer and acquisition; they need to be effective educators
who are active in research.
On the other hand, academic institutions are challenged to
create communities of inquiry and foster the philosophy of
continuous improvement [15]. The management should
provide an environment that promotes academic inquiry on
student learning to improve learning and teaching practices
[16]. The next section discusses the importance of data
analytics in the teaching-learning nexus.
3 Learning Analytics
In order to keep pace with the digital revolution and the
exponential growth of data, numerous academic institutions
have started to adopt learning analytics and use the data
produced by their information systems, learning manage-
ment systems, and other digital learning environments to
efficiently deliver teaching and effectively facilitate learning.
Learning Analytics (LA) is an emerging field of study
brought about by Technology Enhanced Learning (TEL) and
uses techniques from related fields of study, including
Educational Data Mining (EDM), academic analytics, busi-
ness intelligence, and web analytics [17]. Learning analytics,
which is a combination of statistical analysis and predictive
modelling, enables academic institutions to systematically
and quickly gather, analyze, and distribute results to relevant
academic stakeholders. The study of [15]defines analytics as
“the use of data, statistical analysis and explanatory and
predictive models to gain insights and act on complex
issues”. Analytics is also defined as “the application of
analytic techniques to analyze educational data, including
data about learner and teacher activities to identify patterns
of behavior and provide actionable information to improve
learning and learning-related activities [18]”.
Learning Analytics involve analysis of learners’infor-
mation to better inform students regarding their perfor-
mance. Likewise, it provides teachers with insights that are
necessary to improve learning quality as well as influence
academic decisions of institutions by providing data-driven
reports [19]. Furthermore, several authors claimed that
learning analytics support learners’academic experience,
performance, and achievement [20], and helps teachers and
academic institutions understand and predict learners’needs
and demands, performance and retention [21,22]. The
teachers’involvement in learning analytics is essential,
especially in developing personalized learning mechanisms
that address students-at-risk. Analytics can improve student
performance [23], provide teachers with insights on the
effectiveness of their pedagogical approaches [24], and the
link between these two [25]. Likewise, analytics aid teachers
in identifying students at risk of failure, and enable teachers
to customize the teaching content and provide appropriate
educational opportunities.
Teachers collect various data that are produced by stu-
dents from different activities and platforms such as log files,
online test results, social interactions, discussion forums,
course material downloads, and other related activities that
assess the students learning and these data are combined
with students’demographic data for data analytics. Addi-
tionally, these data are gathered near to real-time, analyzed
and carefully interpreted, and serve as a basis for interven-
tion programs. The teachers utilized these analytic insights to
understand and quickly respond to their learners’needs,
apply appropriate teaching and learning strategies, and pro-
vide immediate educational support [26].
4 The Integration of the Nexus and Learning
Analytics
The conceptual model, as shown in Fig. 1, presents the
Learning Analytics-based Teaching-Research Nexus, which
is drawn from the focused literature review on
Teaching-Research Nexus and Learning Analytics men-
tioned beforehand. This paper also referred [25]’s 5-step
model of learning analytics that describes how data is cap-
tured, reported, predicted, acted and refined. Similarly, this
paper also referenced [27]’s combinatorial concept of
Learning Analytics and action research.
In the given model, the application of learning analytics
in the Teaching-Research Nexus is viewed as an iterative
process that improves teaching and learning. It usually starts
with teaching and learning problem identification of the
teacher. As in another case, it may start with data extraction,
analysis, and presentation to examine trends and patterns as
regards student learning behaviors. The next cycle proceeds
to the development and implementation of content, tech-
nology, and pedagogical solution, which comprise of goals,
success indicators, timelines, and benchmarks, to address the
teaching and learning problem. The cycle continues as these
programs are evaluated for their effectiveness and repeated
as necessary.
Student learning and academic outcomes are enhanced in
the teaching-research nexus where teaching and learning
practices are refined as a result of research. The model
demonstrates the critical role of the teacher who identifies a
teaching or learning issue and conducts a scientific investi-
gation or action research to test his/her research question(s).
The start point in the LA-based Teaching-Research Nexus
can happen anywhere in the cycle. Take for instance, a
teacher may extract and analyze data from LMS, MIS and
Learning Analytics: Developing a Data-Centric …215
other sources of student information to validate his/her
research hypothesis. The result of a teacher’s research may
transform teaching and learning practices through appropri-
ate intervention programs that influence innovation in con-
tent, pedagogical and/or technological approaches. In a
sample scenario wherein a teacher has a research question on
whether online mock exams contribute to students’academic
performance. The teacher needs to determine if students who
regularly practice for the exam scored better than those who
did not. Through the research result, a teacher is informed on
the impact of mock exams to student learning. The teacher
will use the result as a basis in formulating suitable educa-
tional programs and mechanisms aimed at the individual,
departmental, and institutional levels. The cycle continues
toward assessing the effectiveness of the new educational
approach. In a different scenario, a teacher can collect and
analyze of student data to determine learning trends and
patterns. This will enable the teachers to understand learning
behavior so that appropriate educational interventions are
applied. Again, the cycle continues towards evaluating the
effectiveness of the intervention program.
4.1 Limitations of Learning Analytics Tools
As new educational technologies emerge every second,
teachers must be able to innovate and utilize data analysis
tools and technologies to inform their teaching. Teachers use
Virtual Learning Environments (VLEs) in uploading teach-
ing materials, conducting exam drills and communicating
with students online through discussion forums and email
facilities. Most VLEs provide a dashboard for teachers to
manage course content, engage and interact with students in
a learning process. The VLEs and other learning manage-
ment systems are now integrated with add-on features that
track individual learner’s performance by measuring users’
online behavior, assignment submission rate, utilization of
learning materials, participation in discussion forums and
exams, and so on. There are also several LA toolkits for
teachers that have been designed and implemented to help
institutions visualize relevant data and evaluate their
technology-enhanced teaching and learning practices. As an
example, [28] designed and implemented an exploratory
Learning Analytics Toolkit (eLAT) that enable teachers to
Fig. 1 Learning analytics-based teaching-research nexus concept
216 A. S. Halibas et al.
analyze and correlate students’learning object usage, user
properties, user behavior and assessment results with an aim
to improve teaching and learning and identify appropriate
intervention programs. In addition, Purdue University’s
Course Signals is an early intervention solution that analyses
student performance and predicts students at risk [23] using
44 indicators in their predictive model. The courses that used
this tool showed improvement in student performance [29].
Similarly, IBM SmartCloud for Education offers predictive
analytics to get real-time insights of student performance.
Likewise, Blackboard Analytics and Moodle LA plugins are
some of the online learning platforms with built-in analytics
tools that provide learning indicators. Blackboard, for
instance, provides a platform for improving the instructional
design and presents teachers with reports that show trends
that affect students’achievements. It also helps teachers
identify struggling learners, understands relationships
between individual graded items and course grades, and
offers linguistic analysis and visualizations. The Moodle LA
plugins measure the student engagement through its report-
ing tools.
Unlike traditional approaches to evaluating and analyzing
learning, there is a massive amount of data that teachers can
use to support their research questions. LA toolkits collect
and analyze student data in this regard; however, most
monitoring tools and reports generated by VLEs have pre-
defined indicators and key metrics which are not customized
to a teacher’s research question(s). Hence, teachers can only
use the limited data available from VLEs which might not be
entirely useful to solve the learning issues. Furthermore, [30]
revealed that the available analytical tools, however
sophisticated, are not sufficient to answer the questions of
teachers. They maintained that the utilization of learning
analytics is merely a part of a larger process of academic
management, and institutions should also consider organi-
zational culture, practices, policies, technology infrastructure
in order to achieve academic success. Their finding is sup-
ported in the study of [29] that revealed the shortcomings of
LA toolkits and the lack of teachers’involvement in the
design process of LA tools. In this regard, it is necessary that
teachers are equipped with the skills needed for research and
data analysis. Dependence on VLEs to provide them the
necessary information can only do so much for them. Nev-
ertheless, academic institutions need to identify the appro-
priate analytics solution and support the professional
development of teachers.
4.2 The Teachers as Learning Analysts
A data analyst is a professional who is able to filter and
produce meaningful information from a massive amount of
data and conduct a thorough data analysis and interpretation
of these data and present these in a meaningful way. The
teachers, who act as data workers or data analysts, have
always been analyzing data pertaining to how their students
learn especially when evaluating and reporting assessments.
They have unknowingly played the role of data analysts, or
better known as “learning analysts”, in an academic context.
Teachers have long been using learners’data to monitor and
improve student learning for educational enhancement
and/or remedial action. Regrettably, some teachers often use
intuition rather than informed knowledge on handling stu-
dent data for academic judgment. To a significant extent, this
practice has its benefits; however, academic decisions can be
further improved if teachers have the right knowledge and
skills to utilize analytical systems in their decision-making.
The following items describe the essential skills for a
Learning Analyst.
Database Skills. Teachers should be able to know basic
database concepts such as information retrieval and data
warehousing. Furthermore, they should be able to utilize
basic database programs like MS Access that allows them to
create tables, store and retrieve data and most importantly,
query data. An ambitious teacher, perhaps an IT teacher,
might be able to query and retrieve data from more
sophisticated databases like MS SQL. More so, this teacher
might write computer programs that feed the data set to
machine learning algorithms, thereby, having better grasps
of the results for a more accurate interpretation.
Data Mining and Statistics Skills. Some data analyses
are derived from statistics. It has been observed that most
teachers are dependent on mathematical expert or statistician
to generate statistical models for them. Having strong sta-
tistical knowledge allows teachers to perform descriptive or
inferential analysis of their learners’data. Descriptive
statistics produce the quantitative analysis of data such as the
mean, median, and mode, on the other hand, inferential
statistics produces inferences of data using regression anal-
ysis, parametric and non-parametric tests [19]. The data
extracted from LMS may be analyzed by statistical software
packages like Excel, SPSS, Matlab, Mathematica and the
likes. These are analytics tools that provide a statistical
summary that recognized data configurations and patterns
and predict future events to improve educational outcomes
[31]. Teachers must know more than descriptive statistics,
they must have ground knowledge on inferential statistical
methods, especially regression analysis, which is a foremost
statistical approach being used in data mining [32]. More-
over, teachers need to learn the basics of Knowledge Data-
base Discovery (KDD) and other data mining concepts that
include clustering, classification, association rule mining,
social network analysis as well as its dynamics with statistics
using regression analysis for modelling relationships [28].
Presentation Skills. Unorganized student data is mean-
ingless and useless to teachers who possess limited
Learning Analytics: Developing a Data-Centric …217
knowledge in the use of learning analytic tools; therefore,
data visualization tools are necessary to support them. These
tools allow teachers to make sense of the data through a
logical organization. In a VLE, teachers are given dash-
boards that show analyzed data through graphical visual-
izations. The teachers will interpret the graphical
information and evaluate whether these data have an effect
on their students’learning. Such is not the case when
teachers are confronted with teaching and learning issues by
which a VLE cannot provide data visualization indicators.
Hence, teachers must be able to garner some insights into the
learning experience of students, extract data from the LMS,
feed to the statistical software, interpret its results and
effectively communicate it to the intended audience.
Teachers must have the essential problem-solving skills,
analytical skills, and creative presentation skills to effec-
tively communicate their research findings. They are
expected to design computer-based presentations using
commonly utilized tools such as MS Excel and MS Pow-
erpoint in order to make the data understandable to relevant
stakeholders. Conversely, they can use high-end presentation
tools that make use of interactive visualization to create
online dashboards like Javascript.
5 Conclusion and Recommendation
This paper proposed an LA-based Teaching-Research con-
cept that models a data-driven approach to decision-making
in teaching and learning practices. It is interesting to see how
academic institutions will implement this model to better
support student learning and improve academic outcomes.
Furthermore, this paper presented a need for academic
institutions to support teachers by investing in teacher
training and professional development programs on learning
analytics specifically focused on the acquisition and profi-
ciency of database, statistics, and data visualization and
presentation skills. This paper recommends that academic
institutions should take an active stance on the application of
analytics and evidence-based approach to teaching and
learning. Specifically,
Teachers should:
•Utilize and/or improve their research and analytic skill-
set; and
•Perform evidence-based research using appropriate
learning analytic methods.
Management should:
•Assess an institution’s’readiness for adoption of learning
analytics;
•Assess the skill set of teachers and check their profi-
ciency in data analytics through an institutional survey;
•Gauge the implementation of their research-teaching
nexus as regards the conduct of research to inform
teaching;
•Intensify the teaching-research nexus practice to include
learning analytics;
•Acquire the necessary infrastructure, tools, and software
that are needed to implement learning analytics;
•Provide professional development courses for teachers in
the use and practice of learning analytic tools in order to
develop their teaching practice; and
•Require teachers to utilize the analytics data that are
embedded in VLEs.
References
1. Beetham, H., Sharpe, R.: Rethinking Pedagogy for a Digital Age:
Designing for 21st Century Learning. Routledge, UK (2007)
2. Dietz-uhler, B., Hurn, J.E.: Using Learning Analytics to Predict
(and Improve) Student Success: A Faculty Perspective. J. Interact.
Online Learn. 12,17–26 (2013)
3. Mônaco De Moraes, E., Terra, M., Silva, D., Souza, M.C.: Models
to implement learning analytics: a literature review. In: POMS
27th Annual Conference, Florida (2016)
4. Mih, C.M.: Learning analytics solution for building personalized
quiz sessions. In: IEEE 2017 18th International Carpathian Control
Conference (ICCC), pp. 140–145, Sinaia, Romania (2017)
5. Mattingly, K.D., Rice, M.C., Berge, Z.L.: Learning analytics as a
tool for closing the assessment loop in higher education. Knowl.
Manage. E-Learn. 4, 236–247 (2012)
6. Johnson, L., Smith, R., Willis, H., Levine, A., Haywood, K.: The
2011 Horizon Report (2011)
7. Sergis, S., Sampson, D.G.: School analytics: a framework for
supporting school complexity leadership. In: Competencies in
Teaching, Learning and Educational Leadership in the Digital
Age: Papers from CELDA 2014, pp. 79–122 (2016)
8. Hutchings, P., Huber, M.T., Ciccone, A.: Why the Scholarship of
Teaching and Learning Matters Today. The Scholarship of
Teaching and Learning Reconsidered: Institutional Integration
and Impact, pp. 1–23 (2011)
9. Lodge, J.M., Corrin, L.: What data and analytics can and do say
about effective learning. npj Sci. Learn. 2, 5 (2017)
10. Grant, K., Fitzgerald, S.: The nexus between teaching and
research: a qualitative study using two focus group on academic
information systems teachers. J. Bus. Res. 3,37–56 (2005)
218 A. S. Halibas et al.
11. Siemens, G., Baker, R.S.J.D.: Learning analytics and educational
data mining. In: Proceedings of 2nd International Conference on
Learning Analytics and Knowledge LAK ’12, p. 252 (2012)
12. Zhang, D., Nunamaker, J.F.: Powering e-Learning in the new
millennium: an overview of e-Learning and enabling technology.
In: Information Systems Frontiers, pp. 207–218 (2003)
13. De Witte, K., Rogge, N., Cherchye, L., Van Puyenbroeck, T.:
Economies of scope in research and teaching: a non-parametric
investigation. Omega (United Kingdom) 41, 305–314 (2013)
14. Baldwin, G.: The Teaching-Research Nexus. Melbourne (2005)
15. Bichsel, J.: Analytics in higher education: benefits, barriers,
progress, and recommendations. Educ. Cent. Appl. Res. 1–31
(2012)
16. Killion, J.: Coaches help mine the data. National Staff Develop-
ment Council (2008)
17. Bienkowski, M., Feng, M., Means, B.: Enhancing Teaching and
Learning Through Educational Data Mining and Learning Ana-
lytics: An Issue Brief. Office of the Educational Technology, US
Department of Education, Washington, D.C., (2012)
18. Van Harmelen, B.M., Workman, D.: Analytics series analytics for
learning and teaching. CETIS Anal. Ser. 1,1–41 (2012)
19. Dawson, S., Mcwilliam, E., Tan, J.P.: Teaching smarter: how
mining ICT data can inform and improve learning and teaching
practice. In: Proceedings ASCILITE, pp. 221–230 (2008)
20. Clow, D.: An overview of learning analytics. Teach. High. Educ.
18, 683–695 (2013)
21. May, T.A.: Analytics, university 3.0, and the future of information
technology. Educ. Rev. 46, 66 (2011)
22. Kellen, D.A.: Utilizing technology as leverage for instructional
improvement in the classroom (2014). http://ovidsp.ovid.com/
ovidweb.cgi?T=JS&PAGE=reference&D=psyc11&NEWS=N&AN
=2014-99070-439
23. Arnold, K.E., Pistilli, M.D., Arnold, K.E.: Course signals at
Purdue: using learning analytics to increase student success. In:
2nd International Conference on Learning Analytics Knowledge,
pp. 2–5 (2012)
24. Greller, W., Drachsler, H.: Translating learning into numbers: a
generic framework for learning analytics. Educ. Technol. Soc. 15,
42–57 (2012)
25. Campbell, J.P., DeBlois, P.B., Oblinger, D.G.: Academic analyt-
ics. Educ. Rev. 42,40–57 (2007)
26. Johnson, L., Adams, S., Cummins, M.: NMC Horizon Report:
2012 Higher Education Edition (2012)
27. Dyckhoff, A.L., Lukarov, V., Muslim, A., Chatti, M.A.,
Schroeder, U.: Supporting action research with learning analytics.
In: Proceedings of the Third International Conference on Learning
Analytics and Knowledge—LAK ’13, pp. 220–229 (2013)
28. Dyckhoff, A.L., Zielke, D., Bültmann, M., Chatti, M.A.,
Schroeder, U.: Design and implementation of a learning analytics
toolkit for teachers. Educ. Technol. Soc. 15,58–76 (2012)
29. Scheffel, M., Drachsler, H., Stoyanov, S., Specht, M.: Quality
indicators for learning analytics. J. Educ. Technol. Soc. 17,
124–140 (2014)
30. Ahadad, S., Arnold, K., Baron, J., Bayer, I., Brooks, C., Little, R.,
Rocchio, R., Shehata, S., Whitmer, J.: The Predictive Learning
Analytics Revolution: Leveraging Learning Data for Student
Success. EDUCAUSE Center for Analysis and Research (ECAR)
(2015)
31. Ferguson, R.: Learning analytics: drivers, developments and
challenges. Int. J. Technol. Enhanc. Learn. 4, 304–317 (2012)
32. Benjamini, Y., Leshno, M.: Statistical methods for data mining.
Data Min. Knowl. Discov. Handb. 523–540 (2010)
Learning Analytics: Developing a Data-Centric …219
Measuring Ciphertext Randmoness Using
Die Hard Randomness Index
Mohammed M. Alani
Abstract
In this paper we present a novel quantitative measure of
randomness based on Diehard randomness tests. The
proposed method relies on the results of diehard tests in
calculating a randomness index; namely Diehard Ran-
domness Index (DRI). The presented index can be helpful
in measuring randomness in bit sequences generated from
pseudo-random and random number generators to iden-
tify which has better randomness properties. The paper
also show sample calculations of the proposed index to
measure randomness of ciphertext resulting from encryp-
tion using block-ciphers.
Keywords
Random Randomness test Ciphertext
Encryption Diehard tests Pseudo-random
1 Introduction
Random numbers have been the subject of study for a very
long time. Different researchers have worked on generating,
testing, and employing random numbers over the past dec-
ades. D. H. Lehmer have identified random sequences as “a
vague notion embodying the ideas of a sequence in which
each term is unpredictable to the uninitiated and whose digits
pass a certain number of tests, traditional with statisticians
and depending somewhat on the uses to which the sequence
to be put”[1].
In an empirical definition, random numbers can be
identified as sequences of real numbers generated either as
physical data obtained from random experiment or as a
computer-generated sequence produced by a deterministic
program.
In general, random sequences are generated from two
types of generators; random numbers generators, and
pseudo-random number generators. Random number gen-
erators employ a non-deterministic source along with a
processing function to produce a random sequence.
Pseudo-random number generators use one or more seeds
with a deterministic function to generate the sequence [2].
Throughout the years, many statistical testing suites were
developed to test the randomness of sequences. In 1995,
Diehard randomness tests battery was introduced by Prof.
Marsaglia [3]. In 2002, Marsaglia and Tsang introduced
three tests as “difficult-to-pass”. They claimed that a
sequence that passes these tests is highly likely to pass all of
the diehard tests [4]. These three tests were referred to as
Dieharder tests in some literature. In 2010, Alani introduced
a new way of interpretation of Diehard test results with
simplified graphical presentation [5].
In 1998, Crypt-XS tests suite was created by a group of
researchers at the Information Security Center in Queensland
University of Technology, Australia [6]. National Institute of
Standards and Technology (NIST) issued a detailed report
on randomness tests in 2001 and later a revised version in
2010 that was the product of collaborative effort of Com-
puter Security Division and Statistical Engineering Division
[7,8]. All of these testing suites were used to test random
and pseudo-random number generators of cryptographic
applications.
Other researchers also tackled the randomness testing
topic and provided new tests other than the three mentioned
above. Soto, who was one of the NIST group working on
[8], published a paper about statistical testing of random
number generators. In [9], Soto addresses issues like statis-
tical testing suites, evaluation frameworks, and the inter-
pretation of or results for testing randomness or random
number and pseudo-random number generators.
In [10], a comparison was made between the theoretical
of distances between consecutive n-tuples drawn in an
n-dimensional space, to the actual distances produced by a
specific random number generator to devise a randomness
M. M. Alani (&)
Khawarizmi International College, Abu Dhabi,
United Arab Emirates
e-mail: m@alani.me
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_25
221
test. In [11], a framework for a uniform test for algorithmic
randomness over a uniform space was introduced. The paper
tackled several questions related to Bernoulli distributions
and arbitrary distributions.
In 2006, randomness tests based on randomness walk
were introduced in [12]. The paper focused on statistical
properties of one-dimensional random walks. Three new
randomness tests were proposed based on probabilities
related to excursions, height and expansion of random
walks.
A software library for empirical testing of random number
generators was introduced in [13]. The software, written in
ANSI C, offered a collection of utilities for empirical statis-
tical testing of uniform random number generators. The
software included implementation of some classical statisti-
cal tests along with several other tests including original ones.
In 2010, research was published on the use of Bell’s
Theorem certification for random numbers in [14]. Although
the paper did not focus on randomness testing, it is
considered an important ground for further research in ran-
dom number generation. The paper introduced a method of
generating 42 new random numbers with 99% coincidence.
A new test for randomness was introduced in [2]. The
proposed test focuses on determining the number of different
fixed length patterns that appear along with the binary
sequence. The next section discusses the details of Diehard
tests as this paper introduces a method of calculating a
randomness index; namely Diehard Randomness Index. This
method depends on the counts of Failure, Doubt, and
Success points identified in [5].
2 Diehard Randomness Tests
Diehard tests were introduced by Marsaglia as a software
package to simplify the implementation on the test users.
The battery of tests includes twelve tests. Some of these tests
are repeated with different parameters. The main 12 tests are:
1. Birthday spacing: When choosing random points on a
large interval, the spacings between the points should
be asymptotically Poisson distributed. The test name
was taken from birthday paradox introduced in [15].
2. Overlapping permutations: This test is done through
analyzing sequences of five consecutive random num-
bers. The 120 possible orderings should occur with
statistically equal probability.
3. Ranks of matrices: This test is done by selecting some
number of bits from some number of random numbers
to form a matrix over {0,1}, then determining the rank
of the matrix. The count of the ranks should follow a
certain distribution.
4. Monkey tests (bit stream tests): This test takes its name
from the infinite monkey theorem [16]. The test is
performed by treating sequences of some number of
bits as “words”and counting the overlapping words in
a stream. The number of “words”that don’t appear
should follow a known distribution.
5. Count the 1s: The test is done through counting the 1
bits in each of either successive or chosen bytes and
converting the counts to “letters”, and counting the
occurrences of five-letter “words”.
6. Parking lot test: Randomly place unit circles in a
100 100 square. If the circle overlaps an existing
one, try again. After 12,000 tries, the number of suc-
cessfully “parked”circles should follow a certain nor-
mal distribution.
7. Minimum distance test: Randomly place 8000 points in
a 10,000 10,000 square, and then find the minimum
distance between the pairs. The square of this distance
should be exponentially distributed with a certain
mean.
8. Random spheres test: Randomly choose 4000 points in
a cube of edge 1000. Center a sphere on each point,
whose radius is the minimum distance to another point.
The smallest sphere’s volume should be exponentially
distributed with a certain mean.
9. The squeeze test: Multiply 231 by float random integers
on [0,1) until you reach 1. Repeat this 100,000 times.
The number of floats needed to reach 1 should follow a
certain distribution.
10. Overlapping sums test: Generate a long sequence of
random floats on [0,1). Add sequences of 100 consec-
utive floats. The sums should be normally distributed
with characteristic mean and sigma.
11. Runs test: Generate a long sequence of random floats
on [0,1). Count ascending and descending runs. The
counts should follow a certain distribution [17].
12. The craps test: Play 200,000 games of craps, counting
the wins and the number of throws per game. Each
count should follow a certain distribution.
All of these tests are aimed at testing randomness. Normal
or close-to-normal distributions are expected from all the
counts produced by these tests. In this context, the chi-squared
goodness-to-fit is used to produce p-values that should be
uniform on [0,1). The p-values obtained by p¼FXðÞ, where
Fis the assumed distribution of the sample random variable X;
often normal. In fact, the assumed Fis nothing but an
asymptotic approximation. In this asymptotic approximation,
the fit will be worst in the tails. Hence, a p-value near 0 or 1 is
an indicator of deviation from randomness.
In some tests, more than one p-value was produced. In
some of these tests, a Komogorov-Smirnov (KS) test was
222 M. M. Alani
run on the multiple p-values to yield a single p-value as an
indicator of randomness [18].
As it was indicated in [4], Birthday spacing test and
monkey tests are considered more important than the others.
Thus, the results of these tests are given in more details as
compared to other tests like Count the 1s. The number of
p-values produced from each test and the one used in the
proposed index can be different based on the importance of
the test. Table 1shows the number of p-values the index
calculation will employ.
3 Interpretation of Test Results
In this paper, we will adopt the interpretation introduced in
[5]. The 47 p-values are distributed over three distribution
areas in the range [0,1). The range will be divided into three
areas; Success Area, Doubt Area, and Failure Area. Table 2
shows the limits of these areas.
This interpretation indicates that have more p-values in
the failure area indicates divergence from randomness
properties, while having more p-values in the success area
indicates better randomness properties. The ranges identified
in Table 2can be expressed graphically as in Fig. 1.
The number of p-values produced by each test can be
thought of as the weight of the text and how it affects the final
result. For example, Monkey test is considered of highest
effect on the final result because it produces 20 p-values. In
the second degree of effect on the final result, the Birthday
Spacing test produces 9 p-values, and so on.
4 Diehard Randomness Index
Based on the previous section, we will use the following
naming convention:
sas the number of p-values in the success area
das the number of p-values in the doubt area
fas the number of p-values in the failure area
DRI as the Diehard Randomness Index
We will start from a simple expression:
DRI ¼sf
This expression is written with the notion that more
p-values in the safe area mean better randomness properties,
while more p-values in the failure area mean worse
randomness properties.
Table 1 Number of p-values
used from diehard tests Test name Number of p-values
Birthday spacing 9
Overlapping permutations 2
Binary rank 3
Count the 1’s2
3D spheres 1
Squeeze 1
Overlapping sums 1
Craps 2
Min. distance 1
Parking lot 1
Monkey test 20
Runs 4
Total number of p-values 47
Table 2 Success, doubt, and
failure areas ranges Area Range
Failure 0 < p-value 0.1
0.9 p-value 1
Doubt 0.1 < p-value 0.25
0.75 p-value < 0.9
Success 0.25 < p-value < 0.75
Measuring Ciphertext Randmoness Using Die Hard Randomness Index 223
Now, we will use dto dampen the DRI expression
because more points in the doubt area mean less effect of the
success points.
DRI ¼sf
d
To cancel the possibility of division by zero, we will add
one to the denominator,
DRI ¼sf
dþ1
As we have 47 p-values, the maximum possible value of
DRI is now 47, and the minimum is −47. To shift the index
to positive value, 47 will be added to it,
DRI ¼sf
dþ1þ47
To re-scale the index in the area (0,1), it will be divided
over its current maximum value, which is 94,
DRI ¼
sf
dþ1þ47
94
DRI ¼sf
94 dþ1ðÞ
þ47
94
Hence, the Diehard Randomness Index can be calculated by
DRI ¼sf
94 dþ1ðÞ
þ0:5ð1Þ
This index can be used in comparing the randomness
properties of different sequences. The higher the index value is,
the better randomness properties the sequence has. On the other
hand, the lower the index is, the worse randomness properties
the sequence has. Form the index equation above, the mini-
mum value of the index is 0, while the maximum value is 1.
5 Sample Calculations
Since most of the randomness tests focus on the randomness
properties in cryptographic applications, we will use data
resulting from block-cipher encryption as an example of the
index calculation. This test data was taken from [5].
5.1 Plaintext
A sample test file was created from combining .doc, .avi, and
.mp3 files to compose the plaintext file for the experiment.
The file was formatted to comply with the Diehard test
requirements. The final test sample size was around
13 MB. Table 3shows the resulting p-values of the plaintext
file and Fig. 2shows the graphical representation of
the p-values according to the description mentioned in
Sect. 3.
5.2 Ciphertext of 3DES
The sample file was encrypted using 3DES algorithm. The
168-bit key used in encryption was generated using a
pseudo-random number generator. Table 4shows the
resulting p-values of the ciphertext file and Fig. 3shows the
graphical representation of these p-values.
5.3 Ciphertext of AES
The sample file was encrypted using AES algorithm. The
256-bit key in the encryption was generated using a pseudo-
random number generator. Table 5shows the resulting
p-values of the ciphertext file ad Fig. 4shows the graphical
representation of these p-values.
5.4 DRI Calculation
Table 6shows the summary of the p-values of plaintext,
3DES-encrypted ciphertext, and AES-encrypted ciphertext
and the distribution of these p-values over safe, doubt, and
failure areas.
Using Eq. (1), we receive the following result.
DRIplaintext ¼047
94 0þ1
ðÞ
þ0:5¼47
94 þ0:5¼0
Fig. 1 Failure, doubt, and success areas [5]
224 M. M. Alani
Table 3 Diehard tests results for plaintext [5]
Test name p-value Test name p-value
Birthday spacing 1.000000 Monkey test 1.000000
1.000000 1.000000
1.000000 1.000000
1.000000 1.000000
1.000000 1.000000
1.000000 1.000000
1.000000 1.000000
1.000000 1.000000
1.000000 1.000000
Overlapping permutations 1.000000 1.000000
1.000000 1.000000
Binary rank 1.000000 1.000000
1.000000 1.000000
1.000000 1.000000
Count the 1’s 1.000000 1.000000
1.000000 1.000000
3D spheres 1.000000 1.000000
Squeeze 1.000000 1.000000
Overlapping sums 1.000000 1.000000
Craps 1.000000 1.000000
0.999899 Runs 1.000000
Min. distance 1.000000 1.000000
Parking lot 1.000000 1.000000
1.000000
Fig. 2 p-values of plaintext file
Measuring Ciphertext Randmoness Using Die Hard Randomness Index 225
DRI3DES ¼18 7
94 22 þ1ðÞ
þ0:5¼11
2162 þ0:5
¼0:50508788
DRIAES ¼25 9
94 13 þ1ðÞ
þ0:5¼19
1316 þ0:5
¼0:51443768
6 Discussion
The plaintext randomness index was zero as expected,
because the file was not a generated using a random or a
pseudo-random generator. A DRI of zero means that the
sequence does not have any randomness properties.
The 3DES-encrypted ciphertext produced a DRI of
0.5050. This means that this sequence does have some
randomness properties, but it did not satisfy most of the
tests. In general, a DRI value of less than 0.5, means that
sequence is closer to uniform than it is to random. Hence, the
DRI
3DES
cannot be categorized as very good.
The AES-encrypted ciphertext produced a DRI of 0.5144.
This means that this sequence has better randomness properties,
as compared to 3DES, but also did not satisfy most of the tests.
Generally, when a sequence scores a DRI of 0.5, it means
that it has equal number of p-values in the success area and
in the failure area. This indicates that the sequence in equal
distance between being random and uniform. A DRI value
less than 0.5 indicates that the sequence is closer to uniform
than it is to random, while a DRI value more than 0.5
Table 4 Diehard tests results for
3DES-encrypted file [5]Test name p-value Test name p-value
Birthday spacing 0.742890 Monkey test 0.91658
0.893112 0.07795
0.559102 0.78356
0.850000 0.16944
0.104397 0.43842
0.620756 0.93809
0.267198 0.03979
0.748315 0.24436
0.856381 0.76818
Overlapping permutations 0.780205 0.94594
0.145390 0.75295
Binary rank 0.389660 0.85963
0.780205 0.25775
0.159133 0.57658
Count the 1’s 0.599488 0.65755
0.305525 0.16651
3D spheres 0.928702 0.75736
Squeeze 0.542369 0.86222
Overlapping sums 0.834684 0.28326
Craps 0.523433 0.18585
0.023614 Runs 0.310885
Min. distance 0.541504 0.752972
Parking lot 0.238872 0.819962
0.298053
Fig. 3 p-values for 3DES-encrypted file
226 M. M. Alani
Table 5 Diehard tests results for AES-encrypted file [5]
Test name p-value Test name p-value
Birthday spacing 0.764805 Monkey test 0.64197
0.310685 0.76317
0.333483 0.18398
0.687379 0.96262
0.036211 0.31987
0.420004 0.88587
0.168696 0.03091
0.767771 0.81122
0.267583 0.46618
Overlapping permutations 0.530497 0.28484
0.999037 0.14852
Binary rank 0.326572 0.41916
0.385797 0.70826
0.318936 0.55267
Count the 1’s 0.983250 0.99172
0.301962 0.67958
3D spheres 0.441769 0.81185
Squeeze 0.876453 0.25926
Overlapping sums 0.012551 0.05466
Craps 0.787202 0.68707
0.359208 Runs 0.377076
Min. distance 0.173347 0.613504
Parking lot 0.861114 0.587110
0.037080
Fig. 4 p-values for AES-encrypted file
Table 6 Number of p-values in
success, doubt, and failure areas Data type fds
Plaintext 47 0 0
3DES-encrypted 7 22 18
AES-encrypted 9 13 25
Measuring Ciphertext Randmoness Using Die Hard Randomness Index 227
indicates that the sequence is closed, in properties, to random
than it is to uniform.
7 Conclusions
In this paper, we have introduced a quantitative measure of
randomness based on Diehard battery of randomness tests.
The randomness index, named Diehard Randomness Index,
can be useful in comparing the randomness of random
sequences generated using random-number or pseudo-
random number generators. The index resulting from the
calculation is in the area (0,1) in which the higher value
indicates better randomness properties and the lower value
indicates divergence from randomness properties.
The proposed index was calculated from plaintext, 3DES
encrypted ciphertext, and AES-encrypted ciphertext. The
calculations indicated that AES ciphertext has higher
randomness index (i.e. better randomness properties) as
compared to 3DES ciphertext.
References
1. Papoulis, A., Pillai, S.U.: Probability, Random Variables and
Stochastic Processes. McGraw-Hill, New York (2002)
2. Alcover, P.M., Guillamón, A., Ruiz, M.C.: A new randomness test
for bit sequences. Informatica 24(3), 339–356 (2013)
3. Marsaglia, G.: Diehard battery of tests of randomness (1995).
[Online]. Available: http://www.stat.fsu.edu/pub/diehard/
4. Marsaglia, G., Tsang, W.W.: Some difficult-to-pass tests of
randomness. J. Stat. Softw. 7(3) (2002)
5. Alani, M.M.: Testing randomness in ciphertext of block-ciphers
using diehard tests. Int. J. Comput. Sci. Netw. Secur. 10(4), 53–57
(2010)
6. I.S. Institute: Crypt-XS tests of randomness (1998). [Online].
Available: http://www.isi.qut.edu.au/resources/cryptx/
7. Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S.,
Levenson, M., Vangel, M., Banks, D., Heckert, A., Dray, J., Vo,
S.: A Statistical Test Suite for Random and Pseudorandom
Number Generators for Cryptographic Applications. NIST (2010)
8. Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S.,
Levenson, M., Vangel, M., Banks, D., Heckert, A., Dray, J., Vo,
S.: A Statistical Test Suite for Random and Pseudorandom
Number Generators for Cryptographic Applications (2001)
9. Soto, J.: Statistical testing of random number generators. In:
Proceedings of the 22nd National Information Systems Security
Conference, Virginia (1999)
10. Duggan, M.J., Drew, J.H., Leemis, L.M.: A test of randomness
based on the distance between consecutive random number pairs.
In: Proceedings of the 2005 Winter Simulation Conference (2005)
11. Gacs, P.: Uniform test of algorithmic randomness over a general
space. Theor. Comput. Sci. 341(1–3), 91–137 (2005)
12. Doganaksoy, A., Calık, C., Sulak F., Turan, M.S.: New random-
ness tests using random walk. In: Proceedings of National
Conference on Cryptology II, Turkey (2006)
13. L’Ecuyer, P., Simard, R.: TestU01: a C library for empirical testing
of random number generators. ACM Trans. Math. Softw.
33(4) (2007)
14. Pironio, S., Acín, A., Massar, S., de La Giroday, A.B., Matsuke-
vich, D.N., Maunz, P., Monroe, C.: Random numbers certified by
Bell’s theorem. Nature 464(7291), 1021–1024 (2010)
15. McKinney, E.H.: Generalized birthday problem. Am. Math. Mon.
73, 385–387 (1966)
16. Isaac, R.: The Pleasures of Probability. Springer, New York (1995)
17. Wald, A., Wolfwitz, J.: An exact test for randomness in the
non-parametric case based on serial correlation. Ann. Math. Stat.
14(4), 378–388 (1943)
18. Soong, T.T.: Fundamentals of Probability and Statistics for
Engineers. John Wiley and Sons, Chichester (2004)
228 M. M. Alani
Medical Grade QoS Improvement Using
IEEE802.11e WLAN Protocol
Luae’A. Al-Tarawneh
Abstract
This paper describes an adaptive service differentiation
scheme for medical grade QoS over WLAN healthcare
networks. The wireless transmission of medical applica-
tions over wireless networks needs special QoS require-
ments meanwhile, IEEE802.11 Standard does not fulfill
the QoS requirement yet. Enhanced Distributed Channel
Access (EDCA) of the IEEE 802.11e Standard is used to
enhance the QoS, where traffic priorities are categorized
according to their criticality. The simulation has been
performed to deliver three traffics with different priorities.
The proposed algorithm is evaluated using NS2 simula-
tion. The simulation results shows that the medical access
categorization and the contention window control mech-
anism significantly improve the performance of a medical
network over IEEE 802.11E. Comparison results show
significant advantage for the new proposed scheme.
Keywords
IEEE802.11 Standard WLAN Medical network QoS
1 Introduction
Using wires to communicate various medical information
such as medical images, monitoring and diagnostic signals,
and any other information belonging to patients, require
connecting a huge number of devices and equipments in a
hospital, which leads to a massive wired communication
environment that is costly and provides a potential hazard for
patient safety [1]. In [2,3], several factors are given that
should be taken into account to provide QoS thresholds for
medical data transportation over a healthcare network
including: availability, confidentiality and privacy, latency
of data delivery and support for mobility. The importance of
such factors is obvious, and in no way can it be underesti-
mated when considering the shift to using wireless networks
to provide these services.
Nowadays, wireless networks and information technolo-
gies are playing a revolutionary role in telemedicine and
e-health services. Medical applications driving the installa-
tion of wireless Local Area Networks (LANs) include
electronic medical records (EMR) updates, wireless infusion
pumps, barcode medication administration (BCMA), voice
over Internet Protocol (VoIP) and support for patient and
visitor convenience through Wi-Fi hotspots. As these
applications are served from different locations including
hospitals, ambulances, ships, and planes, the wireless com-
munication network availability and its quality for medical
information (MI) exchange are very important. So healthcare
networks should be able to convey data at any time while
ensuring the QoS for the specific healthcare applications.
In this paper, an adaptive scheme has been proposed for
the contention window (CW) of the access method of the
IEEE 802.11e standard, denoted as Enhanced Distributed
Channel Access (EDCA), where medical grade priorities of
traffic are defined according to service criticality. Adaptation
is carried out by adjusting the size of (CW) for each traffic
access category. This scheme is evaluated by simulation and
the results are compared with those obtained for conven-
tional IEEE 802.11e with and without medical grade prior-
itization. Comparison results show a pronounced advantage
for the proposed adaptive EDCA scheme.
The rest of this paper is organized as follows: In Sect. 2,I
discuss the concept of medical-grade QoS for healthcare
communication systems. In this regard, access categories are
defined according to medical criticality rather than by delay
constraint, as the case for conventional IEEE 802.11e stan-
dard. Section 3reviews the main characteristics of the IEEE
802.11e Medium Access Control (MAC) protocol, my pro-
posed adaptation scheme on (CW) is introduced in Sect. 4,
while in Sect. 5, simulation of the scheme is outlined. Per-
formance evaluations and results are presented in Sect. 6.
L. A. Al-Tarawneh (&)
Directorate of Biomedical Engineering, Royal Scientific Society
Amman, Amman, Jordan
e-mail: lu.tarawneh@gmail.com
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_26
229
2 Medical-Grade QoS Priorities
Depending on the characteristics of physiological signals
that are taken from the patient’s body through special sen-
sors, they can be divided into certain types of traffic with
priorities that indicate the level of their criticality [1]. Such
traffic types include: physiological signals like ECG, EMG,
EEG, EOG, body temperature, blood pressure, and medical
image and so on; and alarm signals like heart failure,
infusion pump alert and any other telemetry type signal.
In [1], a proposed access categorization for medical grade
wireless LAN according to medical criticality is shown in
Table 1. As given in this table, alert and alarm signals are
given highest priority; meanwhile, real time streaming data
(telemetry) like monitoring patients with heart disease are
given high priority. Medical applications such as medical
images, which could be compressed and stored in local
memory with no time sensitivity, are given medium priority.
Other non medical application (such as email), are given
lowest priority.
QoS requirements for medical grade traffic in healthcare
facilities are discussed in [1,4,5].
Representative values for such QoS requirements are
given in Table 2[1]. For example, maximum allowed values
of latencies for life critical information such as alarms and
alerts should not exceed more than 200 ms, while for non
medical applications, such as guest access through medical
network, a 1000 ms latency is no problem.
It follows that WLAN healthcare networks should convey
medical information with priorities and requirements con-
sistent with the information contained in Tables 1and 2;
thereby supporting human life conditions, where an unsuc-
cessful transmission or a significant delay would be a matter
of life and death.
3 IEEE 802.11e MAC Protocol
The legacy version of IEEE 802.11 protocol, released in
1997, operate on 2.4–2.5 GHz [6]. It uses Carrier Sense
Multiple Access with Collision Avoidance, (CSMA/CA) as
a medium access method. In this method, no differentiations
or priorities are assigned to different types of traffic.
Standard IEEE 802.11-2007 has incorporated the latest
IEEE 802.11e-2005 draft, as Amendment 8, for enhancing
the 802.11 MAC access methods to support Quality of
Service (QoS). This includes providing the security and
authentication mechanism, and enhancing the ability of all
the physical layers such as 802.11a and 802.11b to guarantee
parameterizing and prioritizing services. So new features are
becoming part of this standard including the access methods:
the Hybrid Coordination Function (HCF) and (EDCA) to
support new QoS applications.
EDCA is a contention based channel access method
which can provide differentiated services [6,7]. While it is
part of HCF for infrastructure networks, it may be used as a
separate coordination function for ad hoc wireless networks
[8]. The QoS supported by EDCA is provided by the
introduction of Access Categories (ACs) and other param-
eter entities. There are four ACs and four back off parameter
entities that exist in every QoS Station (QSTA). The ACs are
labeled according to the priority application such as AC_BK
(background), AC_VO (voice), AC_VI (video), and AC-BE
(best effort).
The standard defines eight User Priority (UP) values for
this traffic that are mapped to the different ACs as given in
Table 3.
Every one of those categories behaves as a single DCF
contending entity, and each entity has its own contention
parameters: CWmax [AC], CWmin [AC], Arbitration Inter
Frame Space (AIFS [AC]), and Transmission Opportunity
(TXOP) LIMIT [AC], which are announced periodically by
the Quality Access Point (QAP) via beacon frames. If those
parameters take shorter values, then the channel access delay
for the corresponding AC, will be shorter, and thus gain
higher priority to access the medium. The (AIFS)s intro-
duced by the EDCA are illustrated in Fig. 1.
This shows that the time to access the channel, when it is
sensed as idle, is configured to indicate relative priorities [7,
8].
EDCA also provides differentiation by varying the size of
the contention window (CW) depending on the i-th AC, AC
[i]. Both CWmin and CWmax are defined according to the
priority desired. The initial value for the back off counter is a
random number defined by the contention widow (CW),
similar to Legacy DCF. The contention window may be the
initial minimum size CWmin [AC].
Enhanced back off selects its counter as a random number
drawn from the interval [1, CW + 1] instead of [0, CW] as in
Legacy. However, the smaller CWmin [AC], the higher the
Table 1 Access categorization
according to medical criticality Application Criticality
AC0 Alarm signals, telemetry alarms, infusion pump alerts Highest
AC1 Real-time streaming data (telemetry, infusion pump) High
AC2 Other medical application Medium
AC3 Non-medical applications (guest access, email) lowest
230 L. A. Al-Tarawneh
priority in channel access, but collision probability increases
with smaller CWmin [AC].
While the priority differentiation mechanism used by
EDCA improves the QoS for multimedia real time traffic,
still there is room for improvement if the EDCA parameters
can be adapted to the network conditions. For example, after
a successful transmission, the backoff algorithm always
reduces the CW size to CWmin. Thus under conditions of
high channel load, this leads to more collisions, and conse-
quently a reduced QoS performance.
There exists a large body of recent research to support
service differentiation by providing different MAC parame-
ters that enabled high priority traffic to access the medium
over other traffic. One example is to use a smaller contention
window (CW) causing a smaller back off interval (BI), as
given in [9,10].
Table 2 Representative values
for QoS requirements of medical
application in healthcare facilities
Packets/s kb/packet Peak
(kb/s)
Average
(kb/s)
Events/h Maximum
latency(ms)
Telemetry
(diagnostic)
5 5.1 25.6 25.6 Stream 200
Telemetry
(alarms)
5 1.0 5.1 0.1 10/h 200
Infusion pump
(status)
1 1.0 1.0 1.0 Continuous 200
Infusion pump
(alert)
1 1.0 1.0 0.1 1/h 200
Clinician
notifier
5 2.6 12.8 0.1 20/h 200
BCMA 2 0.4 0.8 0.1 30/h 500
EMR images 200 20.5 41.00 41 1% 200
Guest access 100 10 1000 30 3% 1000
Email 200 20.5 4100 41 1% 200
Table 3 UP to AC mappings Priority UP (same as 802.1D user
priority)
802.1D
designation
AC Designation
(informative)
Lowest
Hi
g
hes
t
1 BK AC_BK Background
2–AC_BK Background
0 BE AC_BE Best effort
3 EE AC_BE Best effort
4 CL AC_VI Video
5 VI AC_VI Video
6 VO AC_VO Voice
7 NC AC_VO Voice
Fig. 1 Some IFS relationships
Medical Grade QoS Improvement Using IEEE802.11e WLAN Protocol 231
Studies in [11], proposed a new function which depended
on decreasing the contention window slowly after each suc-
cessful transmission using a fixed multiplicative factor,
instead of setting it to CWmin. In [12], an Adaptive Enhanced
Distributed Coordination Function (AEDCF), scheme was
derived from EDCF which is based on adjusting the size of
the contention window after each transmission. Results of
this scheme showed good enhancement over (EDCF), espe-
cially in conditions of high traffic load. In [8], a new approach
was introduced based on a dynamic adaptation of the Mini-
mum Contention Window (CWmin). Here, priority between
the access categories is provided by tuning the size of
(CWmin) adaptively after each successful transmission.
We are interested here to reset the CW to a new proposed
contention window such that each virtual window related to
its category or priority type. In queue will have its own
updated new contention. EDCA of the IEEE 802.11e stan-
dard, CW is doubled after each unsuccessful transmission as
a binary exponential retransmission (BER), until it reaches
the maximum value CWmax. After successful transmission,
CW is reset to CWmin. For long channel reservation with
heavy traffic load, the average throughput will be decreased
due to overall packet latency and loss. For medical appli-
cations, Qos requirements in healthcare networks, require
special medical–grade QoS through wireless transmission.
EDCA provide different Access Categories, AC[i] with
different priorities. Each AC[i] has its own parameters
(CWmin, CWmax, and AIFS), which are preset through the
MAC layer.
So I seek to propose an adaptive algorithm to avoid hard
and abrupt decreasing of CW from its previous value to the
value CWmin. Considering the medical traffic queue with
the highest priority AC[0], I note from Table 2that it is
characterized by small packet size and small frequency of
occurrence. With such low occurrence, the expected colli-
sions would have low probability. And with a small packet
size, retransmission could take place with no restrictions or
fragmentations.
4 Proposed Adaptive Control Mechanism
Hence, in my proposed scheme, I can make CW remain
constant and not be doubled after each unsuccessful
transmission.
Now, I consider the remaining traffic queues with prior-
ities AC[1] covering real time streaming (Telemetry) traffic,
as having high priority, and AC[2] covering other medical
applications as having medium priority. To fulfill the priority
differentiation with pronounced enhancement, my scheme
propose the following adaptive new contention window:
(a) After every successful transmission:
CWnew½i¼CWmin½iþ2i2fj
avgðCWmax½iCWmin½iÞ
for AC 1½and AC 2½;
ð1Þ
and
CWnew i½¼CWmin i½
for AC 0½:
ð2Þ
where fj
avg is the average collision rate at step j, where j refers
to the j-th update period T
update
, which is computed
dynamically in each period, in units of time slots, as an
exponentially weighted moving average as follows:
fj
avg ¼1aðÞfj
curr þafj1
avg ð3Þ
fj
avg denote the instantaneous collision rate for station P,
and is defined:
fj
curr ¼Num CollisionsjP½
Num data sentjP½
ð4Þ
Num (data_sent
j
[P]) is the total number of packets that
have been sent in the same period j by flows belonging to
station P, and Num (successful_Ack [P]) is the number of
successfully received acknowledgments for station P. In
other words, Eq. (4)defines the packet loss rate of station P
in the same period j by flows belonging to station P during
j-th time period. fj1
avg represents the previous (j −1) time
period averaging collision rate. adenotes a weighting or
smoothing factor that is determined by simulations. Period
(T
update
) and the smoothing factor (a) are usually selected
experimentally. When my simulation for 20 stations is run
for 25 times, and the averaged results are displayed to show
the dependence of the goodput and mean audio delay per-
formance parameters on a, for a fixed value of
T
update
= 6000 time slots, I find that by selecting a0.5 in my
simulations, a good trade off between mean audio delay and
goodput would be achieved.
(b) After every unsuccessful transmission CWnew[i] is:
CWnew i½¼Min 2 CWprev i½;CWmax i½ðÞ
for AC 1½and AC 2½
and
CWnew i½¼CWmin i½
for AC 0½:
ð5Þ
232 L. A. Al-Tarawneh
To guarantee CWnew not to exceed the upper limit
CWmax, the following condition is applied:
CWnew i½¼Min CWnew i½;CWmax i½ðÞð6Þ
5 Network Simulation
5.1 NS2 Simulation
The performance of the proposed adaptation scheme for CW
was evaluated by simulation using NS-2 simulator [13,14].
After each updated period of time (T
update
), the contention
window is updated according to the equations of parts
(a) and (b) of the proposed scheme for AC[0], AC[1], and
AC[2] in sequence. The network used covers a region of
500 m 500 m with one access point (AP) in the middle,
and user stations are spread randomly over the area. The
number of stations is increased from two to 45 stations,
where each station represents a Quality station (QSTA)
equipped with my adaptive CWnew[i] scheme.
Table 4shows the selected MAC parameters for the three
access categories ACs, according to their medical critically.
This indicates highest priority for alarms, high priority for
real time streaming (telemetry), and medium priority for
other medical applications. In this simulation, all nodes send
their packets to the access point (AP). All nodes up to
number 15 are specified to generate all three types of traffic
with corresponding priorities: AC[0], AC[1] and AC[2]. All
remaining stations generate only two types of traffic corre-
sponding to priorities: AC[2] and AC[1]. In each node,
alarm is implemented as an exponential traffic source and the
real time applications are implemented as constant bit rate
(CBR) traffic. Meanwhile, the other medical applications are
implemented using Pareto traffic[1].
5.2 Performance Parameters
To evaluate the performance of the proposed adaptation
scheme and be able to compare it with other schemes, the
following parameters are defined as measures of perfor-
mance [11,12]:
–Mean delay: it is the average delay of all the flows that
have the same priority in the different stations.
–Collision rate: this rate is calculated as the average
number of collisions that occur per second.
–Gain of goodput: it is the average goodput of a particular
scheme compared with the basic EDCA. For the pro-
posed CWnew[i], it is calculated as follows:
Gain of goodput ¼AGcwnew AGEDCA
AGEDCA 100%ð7Þ
where AG denotes average goodput.
6 Simulation Results
To evaluate the performance of our proposed adaptive ser-
vice differentiation scheme, I studied the effect of varying
traffic loads on certain performance parameters and com-
pared that with the same parameters as obtained using
conventional EDCA with and without medical grade prior-
ities. In my simulation, the traffic load is represented by the
number of stations and at which different types of traffic are
generated. The average delay and the average goodput for
AC[0] and AC[1] are selected as typical parameters, which
are calculated as defined in Sect. 5.2 [14].
Figure 2, shows the average delay of category AC[0], the
highest priority flow (alarms and faults). The proposed
adaptive EDCA gives lower delay than the conventional
scheme with and without medical prioritization. The graph
shows 40% reduction for the mean delay when the number
of stations reaches 45. This improvement even reaches 60%
at a load of 10 stations.
Figure 3, shows the simulation results of the average
delay for high priority traffic AC(1) [real time streaming
telemetry (diagnostic)]. Again, we can see from this figure
that my adaptive scheme, offers good improvement for AC
[1] over EDCA with medical grade and without medical
grade ACs. While this improvement is not noticeable when
the number of. stations is below 5, it reaches 29% at a load
of 10 stations, and 32% at full load of 45 stations.
Figure 4, displays the simulation results obtained for
collision rate. The collision rates are almost the same when
the traffic load is below 10. However, the proposed adaptive
scheme offers 50% for 15 stations, and 44% improvement
for 45 stations. This significant improvement could be
explained by noting that the adaptive adjustment for
(CW) reduces the aggregate collisions through the channel.
Table 4 Mac parameters for
three traffic categories Parameters Medium priority High priority Highest priority
CW
min
31 15 7
CW
max
1023 500 200
AIFS (µs) 52 43 34
Medical Grade QoS Improvement Using IEEE802.11e WLAN Protocol 233
Figure 5shows the Gain of goodput, reflecting the effect
of collision reduction which leads to increasing the number
of successful transmissions with low time delay. As expec-
ted, the proposed adaptive EDCA scheme shows enhanced
improvement on goodput, as the calculated values show an
improvement up to 24% at 40 stations, when compared with
EDCA without medical ACs.
7 Conclusion
This paper proposed a new adaptation scheme for QoS
enhancement based on previous development [15] for IEEE
802.11e WLAN with medical ACs. I extended the basic
EDCA with medical ACs, by varying the contention window
(CW) adaptively after each successful transmission. The per-
formance of my proposed scheme was tested and validated
using NS2 simulation software. The results obtained, were
compared with the basic EDCA with and without medical ACs.
Simulation results show that the proposed scheme
achieves better performance with respect to collision rate, to
average delay and to gain of goodput for all prioritized traffic
categories.
Future work could be extended to investigate the medical
WLAN under infrastructure networks where channel access
control is achieved by using hybrid coordination function
HCF and hybrid coordination channel access HCCA.
References
1. Park, K., Shrestha, D., Ko, Y., Vaidya, N., Sha, L.: IEEE
802.11WLAN for “Medical-grade QoS”. In: WiMD’09, New
Orleans, Louisiana, USA, pp. 3–8, May 2011
5 10 15 20 25 30 35 40 45
0
20
40
60
80
100
120
Number of stations
AC ( 0 ) Average delay (ms)
IEEE 802.11e without medical ACs.
IEEE 802.11e with medical ACs.
Proposed adaptive EDCA with medical ACs.
Fig. 2 AC(0) average delay versus number of stations
510 15 20 25 30 35 40 45
20
40
60
80
100
120
140
160
180
200
Number of stat ions
AC(1) Average delay (ms)
IEEE 802.11e without m edical A Cs.
IEEE 802.11e with medic al ACs .
Proposed adapt ive EDCA with medi cal A Cs.
Fig. 3 Ac(1) average delay versus number of stations
510 15 20 25 30 35 40 45
0
100
200
300
400
500
600
700
800
900
1000
Number of stat ions
Collision rate (collisions/s)
IEEE 802. 11e without m edical A Cs.
IEEE 802.11e wit h medical ACs.
Proposed adapt ive EDCA with medic al ACs .
Fig. 4 Collision rate versus number of stations
5 10 15 20 25 30 35 40 45
0
5
10
15
20
25
Number of stations
Gain on goodput (%)
Proposed adaptive EDCA with medical ACs.
IEEE 802.11e with medical ACs
Fig. 5 Gain of goodput versus number of stations
234 L. A. Al-Tarawneh
2. Zvikhachevskaya, A., Markarian, G., Mihaylova, L.: Quality of
service consideration for the wireless telemedicine and e-health
services. In: Proceedings of the IEEE Wireless Communications
and Networking Conference, Budapst, Hungary, pp. 5–8, Apr 2009
3. Cypher, D., Chevrollier, N., Montavont, N., Golmie, N.: Prevail-
ing over wires in healthcare environments: benefits and challenges.
IEEE Commun. Mag., pp. 56–63 (Apr 2006)
4. MD PnP Program—Medical Device “Plug-and- Play”Interoper-
ability Program. http://mdpnp.org/Home_Page.php
5. Baker, S., Hoglund, D.: Medical-grade, mission-Critical wireless
networks. IEEE Eng. Med. Biol. Mag. 27(2), 86–95 (Mar/Apr
2008)
6. Part II: Wireless Medium Access Control (MAC) and Physical
Layer specifications: Medium Access Control (MAC) Enhance-
ments for QoS, IEEE 802.11e/Draft D5.0, July 2003
7. Mangold, S., Choi, S., May, P., Klein, O., Hiertz, G., Stibor, L.:
IEEE 802.11e wireless LAN for QoS. In: Proceedings of European
Wireless ’02, Florence, Italy, Feb 2002
8. Gannoune, L., Robert, S.: Dynamic tuning of the contention
window minimum (CW
min
) for enhanced service differentiation in
IEEE. 802.11 wireless AD-HOC networks. In: PIMRC 2004, 15th
IEEE International Conference, vol. 1, 5–8 Sept 2014
9. Aad, I., Castelluccia, C.: Differentiation mechanisms for
IEEE802.11. In Proceeding Joint Conference of the IEEE Com-
puter and Communications Societies (INFOCOM), vol. 1,
pp. 209–218 (2001)
10. Ksentini, A., Naimai, M., Nafaa, A., Gueroui, M.: Adaptive
service differentiation for QoS provisioning in IEEE 802.11
wireless ad hoc networks. In: PE-WASUN, pp. 39–45 (2004)
11. Aad, I., Ni, Q., Castelluccia, C., Turletti, T.: Enhancing IEEE
802.11 performance with slow CW decrease. IEEE 802.11e
working group document 802.11–02/674 ro (2002)
12. Romdhan, L., Ni, Q., Turletti, T.: Adaptive EDCF: enhanced
service differentiation for IEEE 802.11 wireless ad-hoc networks.
Wirel. Commun. Netw. WCNC 2(Mar 2003)
13. NS Network Simulator 2. from: http://www.isi.edu/nsnam/ns.
Retrieved 20 Aug 2006
14. “AEDCF”, see http://wwwsop.inria.fr/planete/qni/Research/
AEDCF/, last accessed 15 Apr 2017
15. Al-Tarawneh, L., Ayoub, J.: Adaptive service differentiation over
802.11e MAC protocol. In: Proceeding of the 4th WSEAS
Cambridge, Harverd, USA, pp 54–59, 27–29 Jan 2010
Medical Grade QoS Improvement Using IEEE802.11e WLAN Protocol 235
Memristor-Based Tunable Analog Filter
for Physiological Signal Acquisition
for Electrooculography
Juhi Faridi and Mohd. Samar Ansari
Abstract
In this paper we demonstrate that Memristors can be used
in conjunction with CMOS to implement a
continuous-time tunable analog bandpass filter for use
in the area of biomedical signal acquisition. The idea here
is to implement a single band pass filter which can
provide frequency tuning between EEG, EOG and ECG
signals. Frequency tuning is achieved by varying the
resistance of the Memristor (Memristance). The proposed
circuit promises lower power dissipation and smaller-
sized implementations than CMOS counterparts. This
circuit is capable of filtering out biomedical signals
(specifically Electrooculography (EOG) signals) and the
same is demonstrated for the frequency range of 6–16 Hz.
The power consumption of the band pass filter designed
was found to be 127 nW at 0.25 V supply. The HSPICE
simulation results were found in accordance to the
qualitative discussion.
Keywords
Memristor Bandpass filter Electrooculography
1 Introduction
The idea of combining the design and problem solving skills
of engineering with medical/biological sciences for
health-care purposes has led to the emergence of the (rela-
tively) new field of research known as the biomedical engi-
neering. Most of the work in this field consists of research
and development of bio-compatible prostheses, various
diagnostic and/or therapeutic medical devices ranging from
clinical equipment to ultra-miniaturized implants, resonance
imaging and tomography set-ups etc. Almost all of the above
mentioned techniques and equipment work on the fact that a
human body constantly communicates information about its
health, and this data can be captured and used through
physiological-signal acquisition instruments that can measure
heart rate, blood pressure, brain state, eye movements, heart
activity etc. These biomedical indicators are very low voltage
and low frequency signals which need to be suitably pro-
cessed before recording and monitoring.
Processing of such biomedical signal involves the anal-
ysis of signal measurements to provide useful information
upon which clinicians can make decisions. Technological
advancements have led to miniaturization of monitoring
devices and power sources opening up a whole new world of
possibilities and innovations. An approach in this direction is
the employment of wearable and implantable technologies
which sense parameters of various diseases or disorders and
are capable to transfer data to a remote center; direct the
patient to take a specification; or automatically perform a
function based on the sensor reading. The idea of wearable
and implantable electronics on human body poses restriction
on the power consumption and size, and demands efficient
operations at reduced power supply voltages. The major
concerns of currently active research on such devices and
instruments are therefore: reducing the size; lowering the
power consumption; and to make the instruments measure
the minutest potential difference. This is where the new
device Memristor is expected to enable the chips to be
smaller and better, because it is smaller in size (as compared
to an on-chip resistor, or even transistor-based resistance
emulators); retains memory; and is two orders of magnitude
more efficient from power perspective as compared to tra-
ditional resistor technology.
A typical block diagram of a biomedical signal process-
ing unit is shown in Fig. 1where the band-pass filter
(BPF) forms an important block. In this paper the idea is
move the bandpass filter from the domain of discrete time
filtering to the analog signal processing domain, and
J. Faridi (&)Mohd. S. Ansari (&)
Department of Electronics Engineering, Aligarh Muslim
University, Aligarh, India
e-mail: faridij.262@gmail.com
Mohd. S. Ansari
e-mail: mdsamar@gmail.com
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_27
237
thereafter to implement a single tunable band pass filter
which can select different frequencies corresponding to
various physiological signal types.
This paper includes a brief introduction in Sect. 1
explaining the need and advantages of incorporating Mem-
ristors with typical transistors in analog front-end design to
obtain the desired benefits. Section 2briefly reviews the
literature presented on Memristor and their rapid rise to
importance in the field of biomedical engineering. Section 3
includes an overview of a previously presented work of
which this paper is an improved version with qualitative
discussion on how the frequency tunablity is much more
advantageous than the gain tunablity offered in the reference
paper. Section 4includes the HSPICE simulation results for
Memristance programming and frequency tunable bandpass
filter proposed in this work. Section 5concludes the paper
by presenting summary and concluding remarks.
2 Existing Works
In 1971 [1] came out with the seminal paper titled ‘Mem-
ristor—The Missing Circuit Element’in which he proposed
a new two-terminal circuit element-called the Memristor
characterized by a relationship between the charge and flux
linkage. He introduced it as the fourth basic circuit element
(the other three being R, L and C). It is to be noted that a
physical Memristor device was not feasible at that time, and
that became a reality later in 2008 when [2] reported an
actual working prototype in ‘The Missing Memristor Found’
where they showed, using a simple analytical example, that
Memristance arises naturally in nanoscale systems in which
solid-state electronic and ionic transport were coupled under
an external bias voltage. These results served as the foun-
dation for understanding a wide range of hysteresis
exhibiting current-voltage behavior observed in many
nanoscale electronic devices.
After the physical Memristor was made realizable in
2008, a significant quantum of research work in this field
was carried out including the Memristor modeling and
implementation of digital and analog circuits thereby
reducing the complexity of the circuits. This was possible
because the Memristor was supposed to have a striking
feature of memory as it was capable of remembering the
amount of current passed through it. Various Memristor
models were also put forward to enable researchers to design
simple and efficient circuits. In 2010, [3] presented a SPICE
model for the Memristor which was fabricated at HP Labs in
2008 and validated it by simulating simple circuits. The
proposed model opened avenues to design and simulate
Memristor circuits using SPICE. In the same year, [4] came
out with a new simulation program with integrated circuit
emphasis macromodel of the physically implemented
Memristor. It proved to be a powerful tool for engineers to
design and experiment new circuits with Memristors. In
2013, [5] presented mechanisms for reliable SPICE simu-
lations of Memristors, Memcapacitors and Meminductors
wherein they proposed a collection of models of different
memory circuit elements and provided a methodology for
their accurate and reliable modeling in SPICE. To aid the
aspiring researchers in this field, the authors were generous
enough to provide netlists for these models in various pop-
ular SPICE versions (PSpice, LTspice, HSpice).
While Memristor models were being developed as soon
as its physical implementation came into existence, another
dimension of research progressed to practically implement
the Memristor in analog and digital domains using existing
ICs. The first approach in this direction was in 2010 when
[6] presented a practical approach to obtain programmable
analog circuits with Memristors. The approach was to apply
low voltages to Memristors during their actual operation as
analog circuit elements and significantly higher program-
ming voltages to set/alter the Memristor’s states. They
demonstrated that the state of Memristors did not change
during analog mode of operation provided all the signal
levels were kept much lower than the programming voltage
levels. A year later, in 2011 [7] presented various Memristor
applications for programmable analog ICs. A fine-resolution
programmable resistance was achieved by varying the
amount of flux across Memristors. Resistance programming
Fig. 1 Typical physiological
signal acquisition and processing
flow
238 J. Faridi and Mohd. S. Ansari
was achieved by controlling the input pulse width and its
frequency. A Memristor was subsequently designed for a
pulse-programmable mid-band differential gain amplifier
with high resolution.
A research contribution demonstrating the Memristor
characteristics and Memristance variation with frequency
was presented by [8] in 2012, wherein they presented the
idea of Memristor resistance modulation for analog appli-
cations. It was shown that the linear resistance can be ran-
domly programmed with accuracy and reproducibility.
Analog circuits of tunable memristive low-pass and
high-pass filters demonstrated frequency tuning by resis-
tance modulation.
As the research progressed on Memristor to implement
analog filters, their application in the field of biomedical
signal acquisition and conditioning came into existence.
A major step in this direction was in 2014 when [9] pre-
sented analytical and dynamical models for a
Memristor-based high-pass filter and amplifier. In the same
year, the same authors also presented their work on fre-
quency and time domain characteristics of a Memristor-
based continuous-time low-pass and high-pass filters [10].
More recently, [11] put forward an ultra-low-voltage
ultra-low-power Memristor-based band-pass filter and its
application to EEG signal acquisition. Several analog
applications of Memristor, its SPICE macro-models and
`Memristor Emulators’with Memristor-like behavior were
presented. This paper was an extended version of the study
where the design of an ultra-low-voltage, ultra-low-power
DTMOS-based (emulated) Memristor was presented espe-
cially for the Memristor based low frequency biomedical and
chaotic applications, which was then used in a second-order
Sallen-Key band-pass filter for EEG data processing.
3 Memristor-Based Continuous-Time Analog
Filter
The band pass filter forms a basic building block of a
biomedical signal processing system as shown in Fig. 1.
This section includes: (i) a brief overview of the filter
topology used (Sallen-Key); (ii) a discussion on the previ-
ously published works on this topology, and how the
existing circuits offer limited advantage; and (iii) the pro-
posed band-pass filter circuit which can be employed to
select pertinent frequencies for different types of physio-
logical signals.
3.1 Traditional Sallen-Key Band-Pass Filter
A conventional Sallen-key band-pass filter is shown in
Fig. 2. The transfer function for such a second-order band-
pass filter can be expressed as
HðsÞ¼
1
R1C1ð1þR4
R5Þs
s2þsð1
R1C1þ1
R3C1þ1
R3C2R4
R2R5C1Þþ R1þR2
R1R2R3C1C2
ð1Þ
Further, the gain can be expressed as
H0¼K¼1þR4
R5
ð2Þ
The center frequency (x
o
) and the quality factor (Q) are
given in (3) and (4) respectively.
x0¼2pf0¼ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
R1þR2
R1R2R3C1C2
rð3Þ
Q¼ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
R1þR2
R1R2R3C1C2
q
1
R1C1þ1
R3C1þ1
R3C2R4
R2R5C1
ð4Þ
From (2) through (4), it is evident that there is no tun-
ablity in the circuit of Fig. 2. To obtain electronic tuning of
one or more filter parameters, some modifications/additions
are required in the circuit.
3.2 An Existing Sallen-Key BPF with Gain
Tunablity
As discussed in the previous section, Yener et al. proposed a
Memristor-based BPF, wherein the gain was made tunable
by replacing the resistor R5 in Fig. 2with a Memristor as
shown in Fig. 3, and demonstrated that this resulted in an
Fig. 2 Traditional Sallen-Key band pass filter
Memristor-Based Tunable Analog Filter for Physiological Signal …239
electronic control over gain as becomes evident from (5)
[11].
H0¼K¼1þR4
MqðÞ ð5Þ
However as was also mentioned in the previous section,
having the gain controlled electronically by varying the
Memristance is not of significance, as the signal level may
be amplified at several other points in the block diagram of
Fig. 1, if so required. The capability of tuning the center
frequency of the band-pass filter appears to be more
advantageous in the sense that the same filter circuit could
then be used for acquisition of different physiological
signals.
3.3 Proposed Memristor-Based Sallen-Key BPF
with Electronic Frequency Tuning
The proposed Memristor-based circuit for a continuous-time
analog band-pass filter with electronic frequency control is
presented in Fig. 4. A comparison between the circuits of
Figs. 2and 4leads to the fact that for the latter circuit, the
center frequency of the BPF would now be governed by the
Memristance M(q) instead of the resistance R3 [with the
dependence on all other passive components remaining the
same as in (3)]. Hence, the center frequency of the proposed
BPF can now be given by (6). The expression for the quality
factor for the proposed filter is now given by (7). The
expression for Ho remains the same as before i.e. as given by
(2).
x0¼2pf0¼ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
R1þR2
R1R2MqðÞC1C2
sð6Þ
Q¼ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
R1þR2
R1R2MqðÞC1C2
q
1
R1C1þ1
MqðÞC1þ1
MqðÞC2R4
R2R5C1
ð7Þ
It can be observed from (6) that in order to tune the center
frequency of the proposed filter, the Memristance M(q)
needs to be first set to an appropriate value using the
so-called programming voltage signal. Thereafter, the input
signal (to be filtered) may be applied at the input terminal of
the circuit of Fig. 4. It is assumed that the input signal
amplitude is several orders of magnitude smaller than the
programming voltage, and therefore the value of the Mem-
ristance M(q) remains unaltered on the application of the
input signal.
4 Simulation Results
HSPICE simulations have been performed to get a perfor-
mance evaluation of the proposed BPF of Fig. 4. 0.18 lm
TSMC models were utilized to implement the same
sub-threshold DTMOS operational amplifier which was used
in [11]. Variable Memristance M(q) was obtained by varying
the amplitude of the programming voltage applied across the
Memristor. The values of expected and obtained ON resis-
tances after programming the Memristor are listed in
Table 1. The average percentage error in Memristance
variation was found to be 0.04%.
The values of resistances and capacitances used during
simulations were: R1 = 17:5 kX; R2 = 12.4 kX;
R5 = 7.2 kX; C1 = 2.2 lF; C2 = 2.2 lF. The Spice model
for Memristor put forward by [5] was used. Power supplies
were kept at 0.25 V.
The feature of electronic tuning of the center frequency of
the proposed BPF was further tested using the HSPICE
simulations. Table 2lists the pass-bands obtained for the
circuit of Fig. 4with the Memristance M(q) set to different
values as mentioned in the table. The results of center fre-
quency tuning simulations are also presented in Fig. 4. With
a judicious selection of the Memristance value, the center
frequency may be set as per the requirement of the physio-
logical signal to be acquired. The estimated power con-
sumption of the circuit as returned by HSPICE simulation
software was approximately 127 nW.
Fig. 3 Memristor based Sallen-Key band pass filter for gain control
Fig. 4 Proposed Memristor based Sallen-Key band-pass filter with
electronic frequency tuning
240 J. Faridi and Mohd. S. Ansari
Fig. 5 Simulation results for frequency tuning of the proposed filter
Memristor-Based Tunable Analog Filter for Physiological Signal …241
5 Conclusion
In this paper, we present a frequency tunable band-pass filter
capable of selecting the biomedical signals which are low
voltages and low frequency signals. The proposed filter
designed is simulated using HSPICE wherein 0.18 lm
CMOS TSMC models were used during simulations along
with the Biolek Spice model for Memristors. The designed
circuit is found to have a pass-band range of 6–16 Hz
(Fig. 5) which can be employed in the filtering of EOG
signals. The total power consumed was found to be 127 nW.
Hence the designed circuit can efficiently be used in
biomedical signal filtering due to low voltage low frequency
operation with low power consumption and small size.
References
1. Chua, L.: Memristor-the missing circuit element. IEEE Trans.
Circ. Theory 18(5), 507–519 (1971)
2. Strukov, D.B., Snider, G.S., Stewart, D.R., Williams, R.S.: The
missing memristor found. Nature 453(7191), 80–83 (2008)
3. Mahvash, M., Parker, A.C.: A memristor spice model for
designing memristor circuits. In: 2010 53rd IEEE International
Midwest Symposium on Circuits and Systems (MWSCAS),
pp. 989–992. IEEE, New York (2010)
4. Rak, A., Cserey, G.: Macromodeling of the memristor in spice.
IEEE Trans. Comput. Aided Des. Integr. Circ. Syst. 29(4), 632–
636 (2010)
5. Biolek, D., Di Ventra, M., Pershin, Y.V.: Reliable spice simula-
tions of memristors, memcapacitors and meminductors. arXiv
preprint arXiv:1307.2717 (2013)
6. Pershin, Y.V., Di Ventra, M.: Practical approach to programmable
analog circuits with memristors. IEEE Trans. Circuits Syst.
I Regul. Pap. 57(8), 1857–1864 (2010)
7. Shin, S., Kim, K., Kang, S.M.: Compact models for memristors
based on charge-flux constitutive relationships. IEEE Trans.
Comput. Aided Des. Integr. Circ. Syst. 29(4), 590–598 (2010)
8. Lee, T.W., Nickel, J.J.: Memristor resistance modulation for
analog applications. IEEE Electron Device Lett. 33(10), 1456–
1458 (2012)
9. Yener, S.C., Mutlu, R., Kuntman, H.: A new memristor-based
high-pass filter/amplifier: its analytical and dynamical models. In:
Radioelektronika, 24th International Conference, pp. 1–4. IEEE,
New York (2014)
10. Yener, S.C., Mutlu, R., Kuntman, H.H.: Frequency and time
domain characteristics of memristor-based filters. In: 2014 22nd
Signal Processing and Communications Applications Conference
(SIU), pp. 2027–2030, IEEE, New York (2014)
11. Yener, S.C., Uygur, A., Kuntman, H.H.: Ultra low-voltage ultra
low-power memristor based band-pass filter design and its
application to EEG signal processing. Analog Integr. Circ. Sig.
Process 89(3), 719–726 (2016)
Table 1 Actual and measured
values of resistances for the
Memristor model
R
ON
expected (kX)R
ON
measured (kX) Percentage error (%)
3 3.046 1.53
4 4.010 0.25
5 5.072 1.44
6 6.029 0.48
7 7.013 0.18
8 8.002 0.02
9 9.000 0.00
10 9.990 −0.10
20 20.020 0.10
24 24.001 0.0004
Table 2 Frequency tuning for
different Memristance Memristance (kX) Pass band (Hz) Central frequency (Hz) Peak gain (dB)
24 3.4–8.6 6.02 8.9
14.6 5.8–8.2 7.00 17.4
10 10.4–6.8 8.07 12.5
9 6.5–12.1 9.03 8.9
8 6.5–13.6 10.07 6.4
7 6.3–15.8 11.08 3.4
6 6.1–19.2 12.09 0.9
242 J. Faridi and Mohd. S. Ansari
Migration from the Arab Spring Countries
to Europe: Causes and Consequences
Mohammed T. Bani Salameh
Abstract
This study aims to discuss the issues of migration from
the Arab Spring countries to the European countries in
terms of its causes and consequences. The study
concluded that migration from the Arab Spring countries
refers to what can be called as the factors of expulsion in
the countries of the Arab Spring and the factors of
attraction in the receiving countries of migrants, these
motives or factors can be classified as political, economic
and social factors. Furthermore, the revolutions of the
Arab Spring have created a disastrous situation for
migrants, both within their own countries and in the host
countries, especially in light of the increasing number of
migrants and the negative effects of their migration.
Migration has become a challenge faced by both export-
ing and receiving countries.
Keywords
Migration Arab Spring Europe
1 Introduction
The Arab Spring revolutions have brought about major
changes in the Arab world and its neighboring countries, and
more changes will occur in the coming years. The revolu-
tions have generally been followed by years, perhaps even
decades, of instability, resulting in deep and comprehensive
changes.
The changes taking place in the Arab world have sig-
nificantly affected migration, asylum seekers, and people’s
movement, as well as the policies pursued by countries on
migration-related issues. If these revolutions succeed,
democratic political regimes that respond to the people’s
demands for freedom and restore citizens’confidence in the
state on an economic level will be established. Poverty and
unemployment rates will decline, and there will be economic
growth rates reflected in the increase in citizens’quality of
life. These improvements will affect the emigration rates,
which are expected to decline in view of the stability of the
situation in the Arab Spring countries, and perhaps this will
lead to reverse migration; that is, if the situation stabilizes
and political freedoms and economic security prevail, the
migrants will return to their countries of origin.
The Arab Spring revolutions which raised European fears
of large waves of unwanted immigration have prompted
European countries to strengthen their border control efforts
to address the risks of illegal immigration.
In this study, we try to identify the causes and conse-
quences of immigration from Arab Spring countries.
2 Literature Review
A vast body of literature has been written on the Arab
migration to Europe. The task of exploring this tremendous
body of literature is further complicated by the different
arguments presented by the authors. However, to keep the
review to a compact size, the researcher reviewed some
exigent literature that shed light on the subject. Among the
major studies that address migration flows to Europe and
Europe’s response are the following.
2.1 Mohamed Mutawea Study (2015), Entitled:
European Union and Migration Issues:
Major Problems, Strategies
and Developments [1]
This study aimed at identifying the characteristics and ori-
entations of European policy on issues of migration and
political asylum as they became a pressing issue on the
European agenda after the Arab Spring revolutions, which
M. T. Bani Salameh (&)
Yarmouk University, Irbid, 21163, Jordan
e-mail: mohammedtorki@yahoo.com
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_28
243
led to an increase in the number of immigrants to Europe
from the countries of the Middle East and Africa in an
unprecedented manner in European history, prompting most
EU leaders to consider a strategic move aimed at countering
this unprecedented wave of immigration.
One of the findings of the study is that European policies
in the field of immigration and asylum are not uniform and
rely heavily on the national policies of each European
country in the first place. It can be said that Europe is
divided into two camps: Central and North Europe, in
exchange for the camp countries in the South, as the camp of
the South states that it is on the front line directly with the
issues of migration and bear the greatest burden in dealing
with them, and calls for redistribution of the burden of this
issue on the rest of the EU as a European problem, not an
internal issue, while Central and Northern Europe countries
consider the issue of immigration essentially as an internal
issue and they receive a great deal of illegal immigration and
asylum applications.
The study concluded that the Arab youth did not reap the
fruits of their revolutions and aspirations, but broke the
barriers of fear not only from dictatorships, but also from the
sea, so that he crossed the sea in dilapidated boats in order to
realize his dreams on the other side of the sea, even if his
dreams led to drowning.
2.2 Ben Bouaziza Esté Study (2015), Entitled: EU
Policy in the Face of Illegal Migration [2]
The study aimed to identify the policy adopted by the EU to
deal with the problems of illegal immigration, which has
become a concern for the EU countries because of the
problems it poses from various types, especially the potential
relationship between terrorism and migrants.
The study examined the motives and mechanisms of the
EU in the fight against illegal immigration. The study
reached a number of results, the most prominent of which is
the phenomenon of illegal immigration that has been linked
to European security by considering it a threat. European
countries are seeking to stop the increasing tide of illegal
immigrants. The security approach is the method adopted by
the EU countries in dealing with the issue of illegal immi-
gration. Security was and remains the subject that is included
every time in the policy of all the EU countries and seeks to
achieve it, but to no avail. This is due to several reasons
including most of the agreements relating to the regulation of
migration to the countries located on the two shores of the
Mediterranean, and did not move to all EU countries, and
that the support provided under these agreements is limited
and does not achieve the desired goals and that the majority
of projects that were launched to combat illegal migration
based on security solutions, were impractical.
2.3 James Hollifield Study (2014) Entitled,
Controlling Immigration: A Global
Perspective. Stanford University Press,
3 Edition [3]
This study aimed at providing a systematic, comparative
assessment of the efforts of a selection of major countries,
including the U.S., to deal with immigration and immigrant
issues—paying particular attention to the ever-widening gap
between their migration policy goals and outcomes.
Retaining its comprehensive coverage of nations built by
immigrants and those with a more recent history of immi-
gration, the study pays particular attention to the tensions
created by post-colonial immigration, and explores how
countries have attempted to control the entry and employ-
ment of legal and illegal Third World immigrants, how they
cope with the social and economic integration of these new
waves of immigrants, and how they deal with forced
migration. The core argument of this work is that immi-
gration policies are converging globally, but also failing to
achieve their goals.
2.4 Elena Ambrosetti and Angela Paparazzo
Study (2013) Entitled, Which Future
for Migration in Europe? A Brief Analysis
of the EU Migration Policies
in the Mediterranean [4]
The study aimed at identifying the EU policies on migration
before and after the events of the Arab Spring in order to
assess these policies and to determine their success in
reducing the issue of illegal migration. The study paid spe-
cial attention to Italy as one of the most receiving countries
of the migratory waves of the southern Mediterranean.
One of the main findings of the study was that the policies
of restricting or combating illegal migration were not
effective in preventing waves of migrants from the southern
Mediterranean towards Europe, and therefore, doubts are
raised about these policies, especially in light of the presence
of trans-boundary societies and the role of migrants who
succeed in reaching Europe in facilitating the arrival of more
migrants as well as networks of human trafficking and in
effective EU sanctions against illegal immigrants.
Overall, the study considers that the sterile policies pur-
sued by the EU countries, especially Italy before and after
the Arab Spring revolutions have not stopped migration.
244 M. T. Bani Salameh
On the contrary, these measures seem to have had a positive
impact in the sense that they encouraged more immigrants to
board the sea and migrate to Europe.
2.5 Philippe Forges and Christine Fandrich
Study (2012) Entitled, Migration After
the Arab Spring [5]
This study aimed to provide a statistical analysis of migra-
tion before and after the Arab Spring revolutions in the
countries of the Southern Mediterranean, as well as review
and evaluate the Arab and European policies on the issue of
migration. The study relied on statistical information and
data collected directly from the specialized offices of the EU
Member States, based on surveys conducted in a number of
Arab countries such as Tunisia, Egypt, Libya and Morocco.
One of the fundamental discoveries of the study was that:
The revolution in Tunisia did not lead to a significant
increase in the number of Tunisian immigrants to Europe,
but the rates of migration from Tunisia to Europe remained
at the same rates before the revolution. In contrast to Tunisia,
the Libyan revolution and the Syrian revolution led to a huge
increase in the number of immigrants from Libya and Syria
to Europe. The Libyan revolution and the Syrian revolution
led to the emergence of two of the largest refugee crises in
the European neighborhood. The European reaction to these
crises was the launching of a series of regional protectionist
programs to absorb the refugees and provide them with
protection in their home areas and in neighboring countries,
to prepare for their return home after the war and thus pre-
vent their migration to Europe, The countries of the world
and the international organizations have participated in these
efforts as well as the Arab countries hosting the refugees.
European countries also seek to finance projects and reform
initiatives in the southern Mediterranean countries to estab-
lish democratic political systems capable of managing the
state in a new way that prevents the conditions of conflict
and violence that ultimately lead to migration.
2.6 Michael Bommes, Heinz Fassman
and Wiebke Sieves Study (2012) Entitled,
Migration from the Middle East and North
Africa to Europe [6]
The study aimed to analyze the phenomenon of migration
from North Africa and the Middle East to Europe by reviewing
the history of migration, its models and its effects on European
countries, as well as the European policies on the issue of
immigration and the scenarios and future of immigration to
Europe in light of the available figures on this subject.
The main findings of the study was that, the main factors
driving for migration in the countries of North Africa and the
Middle East are the increase in the population of North
Africa and the Middle East, with limited employment
opportunities in the light of the slow economic growth.
Thereafter, the events of the Arab Spring and the resulting
violence and instability led to an increase in the pace of
migration to Europe.
And the effects of migration on the countries sending the
refugees as many of the countries of North Africa and the
Middle East lose as a result of the migration of this trained
manpower in economic terms. There are also the social
consequences of the high frequency of migration from these
countries to Europe, especially since the vast majority of
migrants are young males.
With regard to the European position on migration, the
study pointed out that EU countries see illegal immigration
from the Middle East and North Africa as a major threat to
European security. EU countries have therefore sought to
stop illegal migration flows using political, economic and
security mechanisms.
2.7 Joel Peters Study (2012) Entitled,
the European Union and the Arab Spring:
Promoting Democracy and Human Rights
in the Middle East. Lexington Books [7]
The study aimed to analyze the response of the European
Union to recent uprisings in the Middle East. The past years
had witnessed a wave of popular uprisings across North
Africa and the Middle East which the Western media dubbed
“the Arab Spring.”Demanding greater freedoms, political
reform, and human rights, the protesters swept away many
of the region’s authoritarian autocratic regimes. The events
of the Arab Spring have been truly historic. They led to
profound changes in the domestic order of Middle Eastern
states and societies and impacted the international politics of
the region. Additionally, these events necessitate a com-
prehensive reappraisal by the United States and most notably
by the EU in their relations with the states and peoples of the
region.
This collection investigates three central questions: What
role did the European Union play in promoting democracy
and human rights in the countries of North Africa and the
Middle East? How did the EU respond to the uprisings of the
Arab street? What challenges is Europe now facing in its
relations with the region?
Migration from the Arab Spring Countries to Europe …245
2.8 Andrew Geddes Study (2008) Entitled,
Immigration and European Integration:
Towards Fortress Europe, Manchester
University Press [8]
This study aims at providing comprehensive analysis of the
EU’s free movement framework, of the development of
co-operation on immigration and asylum policy, of the
mobilisation by groups seeking to represent migrant’s
interests in EU decision-making, the interface between
migration, welfare and the EU’s social dimension, and the
impact of enlargement on migration and asylum.
Geddes addresses three key questions that underpin EU
responses to migration policy. First, what role does the EU
play in the regulation of migration? Second, how and why
have EU measures developed to promote the integration of
migrants and their descendants? Third, what impact do EU
measures on migration and asylum have on new member
states and non member states? Migration is at the heart of the
contemporary European Union.
The updated edition covers important recent develop-
ments, addressing new migration flows and the external
dimension of EU action on migration and asylum and
placing in all these in the context of a ‘wider’Europe.
This paper build upon the previous literature in order to
better understand the Arab Spring migration to Europe as a
complex social fact which brings into play demographic,
economic, political, sociological, historical and other factors.
•Mohamed Mutawa, The European Union and Migration
Issues: Major Problems, Strategies and Developments,
(In Arabic). The Arab Future, Issue: 431, Center for Arab
Unity Studies, Beirut, Lebanon, 2015.
3 The Causes and Consequences of Arab
Spring Migration to Europe
Migration from the Arab Spring countries refers to what can
be called the factors of expulsion in the countries of the Arab
Spring and the factors of attraction in the receiving countries
of migrants, these motives or factors can be classified to be
political, economic and social factors as follows.
3.1 Political Factors
Tunisia, Egypt, Libya, Syria and Yemen have witnessed a
range of political conditions over the past few years as a
result of the accumulation of miserable situation of political
and civil rights, which led to a state of popular explosion that
began with peaceful protests and then developed into chaos,
persecution, civil war, instability and widespread violence.
These circumstances led to sudden large waves of migration,
including temporary displacement of citizens inside and
outside their countries. The effects of the conflicts and unrest
experienced by the Arab spring countries not only affected
the citizens of these countries but also affected the interna-
tional migrants who live and work in these countries at the
start of the unrest, especially Libya and Yemen [9].
The uprisings in Syria and Libya have had a profound
impact on migration patterns in the region. The conflict in
Libya has led to the displacement of large numbers of
migrant workers, Libyan citizens, and refugees to neigh-
boring countries. In late 2011, 422,000 Libyans left Libya,
most of them went to Tunisia, Algeria, Egypt and Chad [10].
As the violence escalates and public order collapses in 2014,
many migrants have left again, with some 400,000 displaced
within Libya.
In the midst of this chaos, the waves of mixed migration
to Europe increased through Libya, the Mediterranean, and
in 2014 there were about 140,000 refugees and immigrants
[11].
The conflict in Syria has had a significant impact, and its
repercussions have spread to all neighboring countries
(Jordan, Lebanon, Turkey, Iraq), as well as to Arab coun-
tries, Europe, South America and the United States. About
one third of Syria’s citizens have lost their homes, and over
two million have found refuge in neighboring countries (of
these, half are under 18 years old). The rest of the displaced
population (estimated at six million) is still in Syria. It is
difficult to verify the numbers, but the trend is clear.
Approximately 700,000 Syrian refugees are in Turkey, about
200,000 of them in refugee camps near the border, and it was
reported recently that the Turkish government has begun to
construct a fence along the border in order to prevent the
arrival of more refugees. A quarter of million Syrians,
mostly Kurds, have fled to Iraq, a country that itself suffers
from chronic political and security instability. Egypt is host
to about 125,000 Syrian refugees, in addition to tens of
thousands of refugees from Libya and Sudan. Some dis-
placed Iraqi and Palestinian refugees in Syria had been
displaced again [12].
Yemen was before the Arab spring revolutions and con-
tinued as a sending, receiving and transit country. It is
sometimes difficult to distinguish between migrants and
refugees who take Yemen as a final destination or transit
point to continue their journey to Saudi Arabia. The con-
tinued civil war in Yemen has caused the displacement of
millions, and the continuation and complexity of the conflict,
has made it difficult to obtain accurate and comprehensive
statistics on the Yemeni situation [13].
Although, the Tunisian and Egyptian revolutions were
less violent and bloody than the rest of the Arab Spring, the
stumbling of the democratic process, especially in Egypt
246 M. T. Bani Salameh
after the military coup, led to the migration of a large pro-
portion of Egyptian and Tunisians citizens to neighboring
countries that are most democratic, secure and stable.
3.2 Economic Factors
The economic conditions in the countries of the Arab Spring
are disappointing. The levels of poverty and unemployment
are high. The per capita income of the gross national product
has not increased during the past years; most economic
planning programs have failed, the problem of external
indebtedness has worsened, corruption has increased, all
economic structural adjustment programs which were fol-
lowed by debtor countries in cooperation with the World
Bank and the International Monetary Fund had failed. On
the contrary, these programs had increased poverty and
unemployment rates and have increased the gap between the
rich and the poor.
If the waves of migration in Tunisia, Egypt, Libya, Syria
and Yemen are the primary motive for escaping from con-
flict, widespread violence and persecution, escape from
economic hardship and seeking better livelihoods and
opportunities for life abroad is one of the main reasons why
many people flee or emigrate [14].
If the economic expulsion factors in the Arab Spring
countries are a cause of migration, in addition, we find
economic attractors in the receiving countries, in which their
economy helps to receive immigrants, especially European
countries where immigrants engage in certain occupations
such as agriculture, construction, cleaning and other pro-
fessions or sectors that domestic workers refuse and migrant
workers accept. These employers often warn that without
access to cheap foreign labor, the costs of producing their
products will rise and they may be forced to close their
businesses. Foreign labor is part of the economics of
industrial democracies, and this explains the continued flow
of migrants to Europe, despite stringent restrictions and high
unemployment rates in the receiving countries [15].
Economic factors are linked to the unbalanced population
growth factor in developing countries, including the Arab
Spring and the developed countries. The population in
developing countries is growing faster than in developed
countries. In Germany, for example, the program of
importing migrant workers began in the mid-1960s to
expand the industry. When it decided to stop importing labor
in 1973, the migration stream was supposed to stop, but that
did not happen because many years of attractions have
increased the importance of foreign labor, and German
businessmen are accustomed to the presence of foreign
labor, continued to use these labor and thus emigration to
Germany had continued [16].
With regard to migration from the Arab Spring countries,
statistics indicate that large numbers of Egyptians, Tuni-
sians, Libyans and Syrians have been able to get employ-
ment in the countries they went to. Several sectors such as
agriculture, construction, restaurants, hotel service and home
care for the sick and the elderly are benefiting from the
activity of these immigrants and led employers to tolerate
their informal residence. Furthermore, they do not pay taxes,
do not receive their civil rights, face difficult working con-
ditions due to the nature of their illegal residence, and are
subjected to many violations, pressures and exploitation
[17].
3.3 Social Factor
Social factors are closely linked to economic factors. Pov-
erty, hunger, unemployment and low standards of living,
despite being an economic factor, have social and psycho-
logical repercussions in the society in which they arise.
In the countries of the Arab Spring in general, the citizen
suffers from an unprecedented level of deterioration of social,
economic life, social exclusion, alienation and social
inequality, poverty is one of the secretions of chaos and civil
war experienced by these countries, and the resulted in mal-
nutrition and other problems. These factors are repulsive
especially with the presence of other political and economic
factors. These social conditions have led many Syrians,
Egyptians, Libyans, Tunisians and Yemenis to emigrate [18].
Among the social factors that have led many immigrants
from the Arab Spring countries to migrate, is the possibility
to live with relatives in the Diaspora large numbers of
immigrants from Arab Spring countries have decided to stay
rather than return to their countries with deteriorating
economies and unjust governments. Those who were able to
legalize themselves or get the right to asylum did their best
to obtain entry permits for their wives and children [19].
A significant number of migrants from Tunisia, Egypt,
Libya, Yemen and Syria have been able to use family
reunification laws in European countries to bring in more
migrants despite the obstacles faced by these communities in
previous countries.
4 The Consequences of Migration
The Arab Spring revolutions in Tunisia, Egypt, Libya,
Yemen and Syria have brought about the largest displace-
ment in the Middle East in recent times. Millions of people
have been compelled to flee their homes as a result of the
armed conflict, violence and chaos that followed the Arab
Spring protests.
Migration from the Arab Spring Countries to Europe …247
These migrations have had their effects and repercussions
both on the level of exporting countries and receiving
countries or of migrants themselves, as will be address in the
following section.
4.1 Implications for Arab Spring Countries
The waves of large-scale migration pose great challenges to
the countries of the Arab Spring, especially Egypt, Libya,
Yemen, Syria, and to a lesser extent Tunisia, especially since
these countries have limited capabilities to meet their needs
and fill the shortage due to migration. The situation is
exacerbated by the continuation and complexity of the
conflict, especially in Yemen, Syria and Libya and the
prospects for a peaceful solution and the return of the situ-
ation to what it was before the outbreak of revolutions have
diminished [20].
The negative repercussions are intensified by the lack of
funding especially for the internally displaced, especially in
Syria, Libya and Yemen, where the majority of assistance
goes to those who have refugee status, and the responsibility
for assisting the internally displaced in their own countries.
The migration of millions of Syrians, Yemenis, Libyans and,
to a lesser extent, Egyptians and Tunisians, have created
great implications for their countries especially when spe-
cialists, capitalists and business owners leave in large
numbers whose departure will have serious consequences for
the economy [21].
Even after the return of refugees and migrants, after years
of conflict, war and destruction of infrastructure, these
conditions have a significant impact. This is evidence in
Libya, Syria and Yemen, where social amenities have
deteriorated and in many cases displaced persons and
migrants were unable to return to their original homes and
found themselves compelled to live in temporary camps or
alleged irregular camps or public buildings, without access
to justice, security, and development.
The sudden return of migrants from crisis-prone countries
may pose major challenges, especially for countries with
large waves of returnees, whose economy relies on remit-
tances from abroad, and when returning migrants require
financial, emergency or other humanitarian assistance.
In Egypt, which is the largest recipient of remittances in the
Arab region, hundreds of thousands of migrants working in
Libya have been forced to return to their home countries in
recent years due to violence, prompting the Egyptian gov-
ernment to take the necessary measures to facilitate their
return, despite the economic and social difficulties Egypt
faces.
4.2 Effects on Migrants
Migration has many effects on migrants, especially those
forced to leave their homes and internally displaced persons
from the Arab Spring countries that are forced to live in
camps.
Refugees are often characterized by residing in remote
areas with limited natural resources, lack of basic infras-
tructure, poor planning and sometimes even restrictions on
the rights and freedoms of persons.
These conditions can lead to overcrowding and insecurity
within the camps, especially for women and boys, as well as
malnutrition and outbreaks of communicable diseases. In the
months following the establishment of the Za’tari camp in
Jordan, measles, scabies, diarrhea, hepatitis (A) and other
diseases were recorded due to overcrowding and lack of
sanitation facilities. Incidents of harassment and sexual
violence have led to high levels of insecurity, however, the
conditions have improved since then.
The camps may contribute to social tensions, adversely
affecting the local environment through deforestation that
leads to soil erosion, loss of habitats and wildlife, in addi-
tion, it leads to air pollution, water depletion and pollution,
and other energy and transportation problems. The needs and
capacities of refugees and displaced persons are linked to
their vulnerability and their ability to withstand. At the
height of some crises, everyone living close to the scene of
the crisis may face a lot of risk due to the spread of the
repercussions of resource scarcity and chaos. This was the
case in the 2011 famine that unfolds in Somalia and left 3.7
million people in need of humanitarian assistance and in
other cases, the case of internally displaced persons in
Sudan, and Yemen. The extension of the periods of dis-
placement or replication may lead to undermining the ability
of individuals to withstand the repeated risk. The ability to
withstand the repeated risks affected by demographic, social,
and economic characteristics. Some groups are vulnerable
because of their health or age, such as children, the elderly
and persons with disabilities. Some groups have special
needs because of the lack of support systems, such as
women heads of household, ethnic and religious minorities,
the poor and victims of trafficking and, in some cases, the
population is at risk of their legal status, especially those
residing in a particular country as non-regular refugees, such
as those from sub-Saharan Africa in Libya, and other factors
affecting vulnerability are sex abuse and sexual orientation.
Women and girls in conflict situations may be at greater risk
of sexual violence, while men and boys are at greater risk of
forced recruitment and joining armed groups, although they
are not immune to sexual violence, and the conditions
248 M. T. Bani Salameh
surrounding crises and displacement, with the collapse of
traditional support structures, the lack of the rule of law and
the resorting of populations to riskier coping strategies and
the use of irregular transport to ensure cross-border and
remittance migration will increases the vulnerability of
refugees, displaced persons and other migrants [22].
As for the effects of immigration on immigrants from the
Arab Spring countries in the countries where they are settled,
especially the European countries, the former countries are
considered by the immigrants from the Arab Spring coun-
tries to be the Promised Land. They are politically and
security ally stable countries and their economic conditions
are excellent compared to their countries of origin. Their
return to their country of origin is very unlikely. However,
this survival has its price as these immigrants suffer first
from the so-called cultural shock due to the difference of
language, environment, customs and traditions, and even
many customs and traditions of those immigrants are com-
pletely contradictory to what prevails in the new commu-
nities, especially within the social and family issues, and the
role of women and women’s rights. Western societies less
interaction and less cohesiveness makes immigrants dealings
with new communities difficult, and they become trauma-
tized as a result of these differences [23].
The other problem of migrants from the Arab Spring
countries to the European countries is the problem of social
integration. The cultural and historical specificities of
immigrants from the Arab Spring countries to the new
societies hamper their integration and exacerbate the prob-
lem. These immigrants, even in the case of getting foreign
citizenship, does not change a thing, as they are continue to
be seen as second-class citizens.
When migrants attempt to adhere to their customs and
cultural identities, they face many problems, especially in
raising children and trying to raise them in a way that reflects
their culture and identity. Finally, immigrants from Arab
Spring countries face the problem of marrying foreigners
which entails the impossibility of raising children resulting
from this marriage in line with the culture and identity of
migrants [22].
5 Effects on European Countries
The European countries face great challenges as a result of
the influx of large numbers of immigrants from the Arab
Spring countries. These challenges have political, security,
economic, cultural and social repercussions. These reper-
cussions vary according to a range of factors, including the
number of migrants to the population, the wealth of the host
country, the demographic, economic, and social character-
istics of migrants, and measures taken by both official
institutions and civil society organizations to address the
problem of migration from the Arab Spring countries. The
burdens borne by European countries vary according to the
Geographical location of these countries, nations of the
South, such as Italy, Spain, Greece and France. Dealing with
the issue of immigration varies from northern countries such
as Germany, the Netherlands, Denmark, Norway, Sweden
and others, and Britain, which has become outside the
European Union has a totally different position [24]. The
following is a presentation of the main effects of migration
from the Arab Spring countries to Europe.
5.1 Political Impacts
The mass exodus from the Arab Spring countries, whether
those suffering from civil wars such as Libya, Syria and
Yemen, or those suffering from political crises and deterio-
rating economic conditions such as Tunisia and Egypt, has
become a major political challenge to European countries,
resulting in enormous pressures, political divisions, disputes
and disagreements among European countries, on how best
to deal with the problem of migration and work to resolve or
mitigate its consequences, especially the way that some
European countries deal with the problem of migration
considered by other European countries as a means to
stimulate and encourage immigrants to migrate to Europe
[25].
For example, human trafficking gangs are hauling
migrants from Libyan shores by dingy wooden and rubber
boats to trade them towards the Italian shores, where Italian
relief ships are rescuing them and allowing them to enter the
country.
As in the case of Germany, where some European
countries take a lot of drawbacks to Germany in that, it is
more caring and more welcoming to immigrants. Many
European countries considered Italian and German policies
as a sort of behaving recklessly and could seriously damage
the cohesion and unity among European countries.
Europe has been under the pressure of immigration to
forcedly build physical barriers on its national borders now
than during the Cold War. Many European countries are
planning to build border walls and security fences across the
continent after the Berlin Wall was removed and made
tremendous progress on the path of economic and political
integration. The pace of integration has declined, and the
voices calling for withdrawal from the Union have
increased. If Britain is the first of these countries, it is
unlikely to be the latter [26].
If the reasons for secession are multiple, security con-
cerns and migration are at the highest priority for secession.
The mass migration of hundreds of thousands of desperate
Migration from the Arab Spring Countries to Europe …249
people fleeing the Arab and Islamic countries, which have
been spared by civil wars, is a continuous migration and
there are no indications of stopping them.
European anti-immigration attitudes, whether or not from
the Arab Spring or the Middle East in general, have revealed
the falsity of the European claims of openness and global-
ization, the opening of borders, the transfer of funds, infor-
mation, ideas and commodities, and human rights and
fundamental freedoms. The advocates of globalization,
freedom and democracy, they themselves are calling for the
fight against immigration on the grounds of national sover-
eignty and national interest. If each State has the right to
protect its national borders and to maintain its security,
stability and interests, sovereignty cannot be divided so that
there is sovereignty against migration, and other sovereignty
with freedom of movement, information, ideas, capital,
goods and others [27].
Among the political implications of migration from the
Arab Spring countries to Europe is the escalation of the
extreme right in European countries, especially in Belgium,
the Netherlands, Spain, France, Italy and Britain, where
there were terrorist attacks in the scene that claimed the lives
of many innocent people. The results of these terrorist acts
was the growing hostility towards Arab and Muslim immi-
grants, linking immigration to extremism, distorting the
image of Arabs and Muslims and portraying them as a threat
to Europe’s security and stability [28].
The anti-immigration process has become a popular
European demand, as it is clear that many Europeans are
turning to anti-immigration political parties or extremist
slogans against foreigners. If these demands may not be met
by moderate political parties and decision-makers in Europe,
so that the process of immigration is adjusted and its
repercussions reduced, the extremist force and racism will
adopt the demands of stopping migration, increasing its
popularity in raising society, and if these parties arrive into
power, it will exercise racist policies that bring to mind the
arrival of Nazi and fascist parties into power before the
Second World War [29].
There is no doubt that the growth of the repercussions of
anti foreigners in general and the Arabs and Muslims
especially in Europe, and the increase in the proportion of
extremist right currents in the decision-making centers and
hence the tightening of migrants exacerbates the serious
political repercussions of the migration problem. The
approach of security in dealing with the problem of migra-
tion, and the justification of aggression and racism practiced
against immigrants could lead to more chaos and disruption
of daily life, undermining stability in Europe [30].
5.2 Economic Impacts
There are many negative economic effects of the influx of
immigrants from the Arab Spring countries to Europe. With
the influx of immigrants, the economic burden is increasing
due to increased pressures on housing, education, social
services and employment opportunities, which affects the
political stability and economic situation of European
countries.
The arrival and sheltering of immigrants from the Arab
Spring countries has had enormous financial burdens. These
countries have been obliged to secure such basic expenses as
shelter, food, school costs, language learning, etc., as well as
increased security spending to combat migration [31].
European countries suffer not only from migrants who
come from conflict zones and who deserve to be granted
asylum but from other types of migrants who come from
safe areas and are called economic migrants seeking greater
wealth and a better standard of living through asylum or
migration. European countries are tougher in dealing with
this segment; however, the issue of return to their countries
of origin is a thorny issue and cost European countries a lot
of effort and expenditures for legal and political reasons [32].
One of the economic implications of the crisis of immi-
grants from the Arab Spring countries to Europe is how the
EU can deal with the fundamental problems in the countries
of migrants, which started the migration crisis in the first
place. The handling of the migration crisis requires the EU
countries to provide financial, economic and military assis-
tance to these countries. The relationship between migration,
economic conditions are closely linked, so migration has
become a factor of pressure on European countries and push
them to work to find economic alternatives to migration such
as easing restrictions on trade and the creation of partner-
ships and assistance for economically distressed countries to
help these countries raise living standards and create job
opportunities in countries exporting migrants. The freedom
of trading of goods and capital is an approved recipe for
limiting migration. Economic development in countries
exporting migrants, including the Arab Spring countries, is
one of the best recipes to reduce the phenomenon of
migration [33].
Among the economic impacts of migration from the Arab
Spring countries to Europe, has been that European countries
have in the past preferred to channel their financial and
economic assistance to the countries of Eastern Europe for
cultural reasons at the expense of the countries in the
southern Mediterranean such as Egypt, Tunisia, Algeria,
sub-Saharan countries and others. As the conflict in Libya
250 M. T. Bani Salameh
escalates and the deterioration of economic conditions in
Egypt and Tunisia increased, the rates of migration from
former countries to Europe, which forced the European
countries to change their vision so that these countries will
not, directed a large part of their economic assistance to the
southern Mediterranean countries.
Many EU countries have been forced to transfer a large
part of their economic assistance to the southern Mediter-
ranean countries and the Arab Spring countries. These
countries urgently need huge and urgent economic assis-
tance to respond to the needs of citizens, displaced persons
and migrants. This humanitarian assistance requires the joint
efforts of the international community in general, not only
European countries, but the support of rich and remote
countries that are not affected by migration such as Japan,
China and the United States of America whose contribution
is well below the required level. In Lebanon, for example,
the World Food Program (WFP) announced in 2012 that
food vouchers for Syrian refugees would be reduced by half.
In general, the countries hosting refugees as a result of the
Arab Spring revolutions from Turkey, Lebanon and Jordan
to Egypt, Tunisia and Algeria were underfunded, weakening
their ability to withstand the crisis and mitigate its conse-
quences [34].
Despite the various adverse economic impacts of migra-
tion from the Arab Spring countries to Europe, there are
positive impacts on migration. The age structure of the EU
population is changing rapidly. In 2015, one out of every
three Europeans in the labor market is more than 50 years
old, while the number of people between the ages of 20–29
is 20% lower. This means that Europe’s labor force is aging.
Migration is 70% of the population growth in Europe.
However, every retired European person needs the support
of three workers, and if population trends in Europe continue
to be like that, then migration becomes the solution due to
population requirements, and shrinking population and the
aging workforce in Europe solved through migratory flows
that address demographic problems [35].
5.3 Cultural and Social Impacts
The large and unexpected migration from the Arab Spring
countries to Europe has many social and cultural effects.
Most of the immigrants from the Arab Spring countries to
Europe are Arabs and most of them are Muslims. The entry
of hundreds of thousands into European societies will have
many social and cultural repercussions. These immigrants
need along period of time so that they can overcome the
cultural and social trauma and to assimilate new conditions
and coexistence or integrate with them [36].
There is no doubt that the influx of immigrants from the
countries of the Arab Spring to Europe, with the values and
cultural values they carry, is totally different from what is
happening within the receiving countries of the European
Union, which leads to the question of the possibility of
coexistence or clash between the two civilizations: the Arab
Islamic civilization and the European civilization. Many
immigrants from Arab Spring countries try to preserve their
cultural and religious identity. This is evident in their dress,
eating, customs, traditions, practices, and other cultural and
social activities. Political systems in the European Union
countries in many European cities have many features of
Arab cities in terms of markets, shops, restaurants, places of
worship and others, which impede the integration of immi-
grants in new societies, while at the same time promoting
racist discourse towards them, especially linking migration
to extremism and terrorism, This is common in many
European media and literature, especially after the involve-
ment of Muslim immigrants in a series of bloody events in
Europe.
The feeling of division and confrontation is reinforced by
Europe’s expectation that after the demise of the Soviet
Union and the end of the Cold War, conservative danger are
its southern border overlooking the Mediterranean Sea
through the influx of illegal immigration and radical Islamic
movements, especially the Islamic State Organization(ISIS),
which has succeeded in penetrating security and European
barriers, thus recruiting many Muslims living in Europe and
carrying out terrorist operations in a number of European
countries [37].
The Europeans also link migration to the threat of their
identity, culture and civilization, in view of the migrants who
are adhering to their customs, traditions and identity, and
refusing to adopt the customs, traditions and identity of
European host countries. Some explain the anti-immigration
attitude of many Europeans, regardless of whether they are
officials or ordinary citizens, the European countries fears
that this space will become a Muslim Arab, especially since
Islam is the fastest spreading religion in the world including
Europe, which fuel incitement against Arab and Muslim
immigrants to Europe, and translates its attacks on these
migrants.
Among the cultural and social effects associated with the
issue of Islamic civilization is that the European Union, in its
current form, is a club of Christian countries. With hundreds
of thousands of immigrants flowing into Europe through
Turkey, many European countries have become more rigid
in Turkey’s accession to the Union. This position is rein-
forced by the fact that Turkey is an Islamic state, it has
borders with Syria, Iraq and Iran and they are among the
most unstable countries in the world and the most exporting
of migrants.
Among the cultural and social effects of migration from
the Arab Spring countries to Europe is the change in the
patterns of production and consumption of food. Many of the
Migration from the Arab Spring Countries to Europe …251
immigrants from the Arab Spring countries who settled in a
number of European countries have had an impact on
changing many of the habits of Europeans in the food and
other changes in theater and even sports [38].
There are also large-scale effects of immigrants on the
media by broadcasting programs dedicated to immigrants
and minorities dealing with issues of concern to them. The
spread of the Internet and the means of social media have led
to the fact that Arab immigrants in Europe have their own
websites and discussion forums that are managed, monitor
and analyze by them to relate their issues and interests, etc.
Here, it must be stressed that there is no justification for
European countries to adopt a policy of hostility towards
Arab and Muslim migrants, rather cooperation, partnership,
coexistence, social and political upbringing based on toler-
ance, dialogue, citizenship and pluralism, are the best means
of achieving stability in the society and facilitates the inte-
gration of migrants. In addition, after some time, cultural and
social norms weaken among the children and grandchildren
of immigrants and the Arab countries from which they
originate.
5.4 Security Implications
European countries have faced significant security chal-
lenges as a result of hosting large numbers of migrants from
the Arab Spring countries. Many European countries have
taken border measures dominated by security concerns such
as the use of sanctions, occupation and security control, and
despite all these measures, as is common in various countries
of the world, concerned with the issue of migration, which
integrate the conclusion that it is physically impossible to
exercise effective border control in open countries, as in
industrialized countries, that explains large numbers of
clandestine immigrants in European countries. The closure
of borders and standing order against the movement of the
transition to European countries put at stake the reality of
Western democracies and their enrichment by the slogans of
democracy, freedom and human rights.
In addition, maintaining the freedom of movement of
European citizens among the various EU countries under the
Schengen Agreement requires that the borders be open and
that the European borders are safe and controlled. If these
limits can not be secured, the flows of migrants will continue
which would threaten the political stability of the European
Union and could lead to the strengthening of separatist
tendencies in it, leading to the weakening and dismember-
ment of the Unions [39].
The security concerns in the European countries have
been reinforced by the outbreak of the Arab Spring revolu-
tions and its consequences, for example, the emergence of
the extremist terrorist organization ISIS, which has claimed
responsibility for many terrorist operations in a number of
European countries such as France, Germany and Britain,
despite ISIS geographically distant from Europe, it suc-
ceeded in penetrating the European barriers and the
recruitment of many European immigrants who joined the
ranks of the organization in Syria and Iraq, or who remained
in Europe and carried out many of the terrorist acts [40].
Thus ISIS has become a serious threat to European
countries.
What increased the European fears is that, the threat of
Arab and Muslim immigrants to Europe is no longer asso-
ciated with an increase in their numbers, but they are even
more linked to smuggling of arms, drugs and human beings,
the recruitment of terrorists, the practice of robberies, loot-
ing, theft and assault on public property. A report prepared
by the European Police Agency (EPA) noted that human
trafficking and illegal migration are run by gangs using the
usual drug smuggling routes to enter the countries of the
continent. Women, children and illegal immigrants are
trafficked. Security reports confirm that traffickers and
organized crime play a major role in this lucrative trade. In
2015, more than one million people reached the European
Union illegally and with the continuation of the conflict in
the Arab Spring countries, especially Syria, Libya and
Yemen, the flood of migrants to Europe will continue.
Thousands of migrants from the Arab Spring countries
have tried to reach Europe through Turkey and Greece, but
the construction of the iron fence between these two coun-
tries has closed the door on this road and boat trips have
become a refuge for migrants on the Mediterranean, hoping
to reach Italy or Greece as transit countries to the rest of the
European Union.
There is no doubt that most of the immigrants from the
Arab Spring countries to Europe are looking for hope for life
and stability, but the fears are caused by some Muslim
immigrants who carry extremist ideas or some terrorists who
disguise themselves as immigrants and commit terrorist acts
thereby causing a great burden on the Europe.
6 Conclusions
The primary objective of this paper was to document and
explain the massive population displacement of Arabs as the
most manifestation of the crisis in the Arab Spring countries.
Since the beginning of the so-called Arab Spring, the Arab
Spring countries witnessed a significant increase in the
number of immigrants and displaced persons and their pro-
portion of the total population. The years 2010–2020 might
well go down in history as the “decade of Arab refugees”.
The beginning of the 21st century will be remembered for
the large numbers of Arab people evicted from their homes
and communities and forced to find a living elsewhere.
252 M. T. Bani Salameh
The magnitude of this displacement serves as a poignant
example of the importance of the phenomenon in the Middle
East as well as of its complexity. There are several reasons
behind the migration from and through the Arab Spring
countries, and although the economic factor is always the
most important motive for migration, under the Arab Spring,
there are political, social, security and religious factors no
less important than the economic factor. The study reached
several results, the most prominent of which are:
1. The Arab spring revolutions have had a significant
impact on migration from the Arab Spring countries,
especially in Syria, Libya and Yemen. In 2014, the
Syrian refugees constituted the largest group of refugees
in the world. The violence in Libya led to the displace-
ment of nearly 1 million people of migrant workers,
refugees and asylum seekers, while the number of
internally displaced persons in Yemen reached more than
11% of the total population.
2. The question is not of which the main causes of dis-
placement (war or underdevelopment) is more important
or prevalent. Nor is it always the number of people dis-
placed that determines the significance of the event.
Rather, the important point to draw is that displacement
needs to be seen as an outcome of a combination of
causes involving a multiple set of factors.
3. There are many negative effects of the phenomenon of
migration from the countries of the Arab Spring, and
these effects are not limited to the host countries, but
extends to the countries of origin, and these effects are
economic, cultural, social, political and security.
4. Forced migration in the countries of the Arab Spring has
placed great burdens on countries of destination, asylum,
transit and origin, as well as migrants themselves. For
countries of origin, large-scale internal displacement
poses major challenges to these countries, while the
negative impact on host countries is exacerbated. Refu-
gees and displaced persons are suffering from extremely
difficult and tragic conditions, especially those relying on
networks of organized crime.
5. As the EU countries removed their internal boundaries,
they became increasingly concerned about strengthening
external boundaries, to prevent an influx from Middle
East and North Africa. The successful mobilization of
extreme right groups over immigration and supposed
threats to national identity helped bring these issues to
the centre of the political stage.
6. It is certain that immigrants from the Arab Spring countries
have an urgent reason to emigrate a lot, and if the European
countries are right to combat this phenomenon in order to
preserve its security and stability and interests, they must
take into account as much as possible the balance between
combating immigration and considerations to human
rights and human dignity.
7. Migration is a global problem and not a national or
regional problem of a particular country or continent,
efforts to combat or control immigration is a global issue.
The globalisation of migration provides grounds for
optimism, because it does give some hope of increased
unity in dealing with the pressing problems which beset
our small planet.
References
1. Mutawa, M.: The European Union and migration issues: major
problems, strategies and developments. In: The Arab Future Confer-
ence, Center for Arab Unity Stuies, Beirut, Leanon (2015)(in Arabic)
2. Bouziza B.: EU Policy Against Illegal Immigration, Studies and
Research. University of Djelfa, Algeria (2015)
3. Hollifield, J.: Controlling Immigration: A Global Perspective, 3rd
edn. Stanford University Press, USA (2014)
4. Ambrosetti, E., Paparazzo, A.: Which Future for Migration in
Europe? A Brief Analysis of the EU Migration Policies in the
Mediterranean Area. Universities Roma, Italy (2013)
5. Forges, P., Fandrich, C.: Migration after the Arab Spring.
Migration Policy Center, European University Institute, Florence,
Italy (2012)
6. Bommes, M., Fassman, H., Sieves, W.: Migration from the Middle
East and North Africa to Europe. Amsterdam University Press,
Amsterdam (2012)
7. Peters, J.: The European Union and The Arab Spring: Promoting
Democracy and Human Rights in the Middle East. Lexington
Books, Lanham (2012)
8. Geddes, A.: Immigration and European Integration: Towards
Fortress Europe. Manchester University Press, Manchester (2008)
9. International Migration Report: Migration, Displacement and
Development in a Changing Arab Region (2016)
10. Attir, M.: Illegal Migration in Libya after the Arab Spring. Middle
East Institute, USA, 18 Sept 2012
11. Guzansky, Y., Striem, E.: The Arab Spring and Refugees in
Middle East, INSS. Insight, No. 496 (2013)
12. Levion, D.: Addressing the Debate on the Economic Impact of
Migration. IMF (2017)
13. UNHCR: Yemen’s Brutal Conflict Pushing One Million Displaced
to Return to Danger (Joint UNHCR-IOM Press Release) (2017)
14. Malik, A., Awadallah, B.: The Economics of Arab Spring. World.
Dev. 45, (2012)
15. Najmi, R.: Arab Spring and its impact on migration to Europe, at
the following link: www.dw.com/ar/a-15661959
16. Martin, P. Zurcher, G.: Managing Migration: The Global Chal-
lenge. Translated by Fawzi Sahawneh. University of Jordan
Publications, Amman, Jordan (1999)
17. Hassan, O., Awad, Y.: Illegal Immigration and Crime. Naif Arab
University for Security Sciences, Riyadh, p. 17 (2008)
18. On the relationship between the Arab people and their govern-
ments, see for example the report of Carnegie endowment, Arab
fractures: citizens, states and social contracts, at the following link:
carnegieendowment.org/2017/02/01/arab-fractures-citizens (2017)
19. Mufleh, M.: Social Migration Interactions, in a series of seminars
for Moroccans Emigrating Abroad, Al-Natour (2012)
Migration from the Arab Spring Countries to Europe …253
20. The Arab Spring is causing the largest wave of immigrants since
World War II. The Center for Strategic Research and Strategic
Studies. http://rawabetcenter.com/archives/2430. Last accessed 2015
21. Shuaibati, M.: Migration of competencies and their economic,
political and social implications. Addiyar. http://www.addiyar.
com/article/800643. Last accessed 2014
22. Wagner, R.: How Europe fights against Muslim assimilation. Arab
News (2012)
23. Abdelou, A., Amkor, A.: European Arabs: identity education and
citizenship. Contemp. Arab Aff. 8(2) (2015)
24. Barry, A.: Europe dilemma: immigration and the Arab Spring.
Foreign Policy. http://fpif.org/europes_dilemma_immigration_
and_the_arab_spring/. Last accessed 2012
25. Meaken, J.: European migration: crisis and consequences. Tomor-
row’s World. https://www.tomorrowsworld.org/magazines/2016/
march-april/european-migration-crisis-and-consequences. Lasted
accessed 2016
26. House of lords, library note: leaving the European Union: future
UK-EU relationship. http://researchbriefings.parliament.uk/Research
Briefing/Summary/LLN-2016-0063. Last accessed 2016
27. Houboub, M.: The Secret Immigration and the Press of the Two
Banks. Antoine Society, p. 37 (2005)
28. The most prominent terrorist attacks in Europe and its repercus-
sions on the Muslims. Sasa Post. https://www.sasapost.com/
terrorist-in-europe/. Last accessed 2015
29. Rollins, T.: Refugee VS economic migrant: are EU policies
changing? www.aljazeera.com/indepth/features/2016. Last accessed
2016
30. North, B.: The Rise of Right. Wing Nationalist Parties in Europe
(2017)
31. Vake Walk Staff: Arab Spring negative impact on european
economy. Polities (2012)
32. Saif, I.: Re-examination of Euro-Mediterranean Relations. Carne-
gie Middle East Center. http://carnegie-mec.org/2011/10/11/ar-
pub-45704. Last accessed 2012
33. Khalil, H.: The Arab Spring between European Interventions and
Arab Aid (2016)
34. Ruwij, A.: Migration to Europe a crisis of the Eurozone. Building
Information Network. http://annabaa.org/arabic/development/415.
Last accessed 2015
35. Stokes, B.: The immigration crisis is tearing Europe apart. Foreign
Policy (2012)
36. Zakai, N.: Geopolitics of secret immigration in the mediterranean
sea. Arab Polit. (19), 29 (2016)
37. European Migration Network: Impact of Immigration on Europe’s
Societies (2016)
38. Al-Naqaz, S.: Turkey cannot join the European Union and these
are the reasons, raialyoum. 16/5/2016 at the following link: www.
raialyoum.com/?p=441052
39. Noak, R.: These 8 places in Europe could be the next to try for
independence. Washington Post (2014)
40. Deaden, L.: Isis recruiting violent criminals and gang members
across Europe in dangerous new crime terror nexus. The
Independent, Monday, Oct 2016
254 M. T. Bani Salameh
Multi-channel Buffer Enabled Technique
for Video Streaming in IEEE 802.15.4
Razi Iqbal
Abstract
Increase in the use of wireless technologies has opened
doors for development of various wireless applications to
provide solutions to different problems in domains like,
security and surveillance, entertainment, transportation,
communication and education. To reduce the overall cost
and power consumption of the systems to be deployed in
developing countries, short range wireless technologies
like ZigBee (IEEE 802.15.4) are gaining popularity.
However, due to limitation of data rate, some applications
that involve transmission of heavy data are still consid-
ered far-fetched. This paper presents a technique that
enables ZigBee to be utilized for heavy data transmission
such as video streaming. For this purpose, a technique
based on the concept of multi-channel and buffer is
introduced in this article. In order to illustrate the
efficiency and reliability of the proposed technique, it is
compared with currently available video streaming tech-
niques like, single channel buffer less, single channel
buffered and multi-channel buffer less. Several simula-
tions are performed on these available techniques to
gauge the efficiency of these techniques at low data rate of
around 250 kbps. The results of the simulations are then
compared with the simulation results of the proposed
technique to ensure its efficacy.
Keywords
ZigBee Video streaming Short range wireless
technologies
1 Introduction
Video streaming is a concept of sending images in a com-
pressed form over the Internet and displaying this data to a
user in real time. In video streaming the user does not need
to download the file as data is unceasingly transferred from
sender to receiver in continuous stream. Videos are large
amount of data which needs to be compressed before
sending over a small data rate. At the receiver compressed
data is decompressed and displayed to the user. Most
modern browsers use compressing and decompressing
techniques for video streaming. Streaming media has many
types like videos, images, sounds and animations. There are
many applications of video streaming on the Internet like
online television, YouTube and Skype etc. There are two
main types of video streaming, live streaming and archived
streaming.
Live streaming is the type of video streaming that refers
to the data delivered over the Internet from source media
(like digital camera or audio interface). In this method, an
encoder is used to encode the signals and a media publisher
and a network is used to send data to a receiver. Live
streaming also enables the users to interact with each other
using video chats in real time. A popular example of live
streaming for chats is Skype video chat.
The second type is archived streaming that is referred to
the data stored on server. In this system videos are stored on
a server that is connected to the Internet and the client can
access the video by connecting to the Internet. The main
examples of this type of streaming are video streaming
websites like YouTube and Dailymotion. In video stream-
ing, bandwidth of the network is very important. If the
bandwidth of the network is good, the quality of streaming
would be decent but if the bandwidth is low the quality of
the streaming would be below par.
There are several short range wireless technologies
available now a days. For instance, ZigBee is gaining pop-
ularity due to its low cost and low power consumption. It is a
R. Iqbal (&)
American University in the Emirates, Dubai,
United Arab Emirates
e-mail: razi.iqbal@aue.ae
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_29
255
sister technology of Bluetooth and IrDA. In this technology
signals travel in zig zag style that is why it is called ZigBee.
It works on 868 MHs/915 MHs/2.4 GHz frequencies. It has
very low data rate of 250 Kbps but has very low complexity.
In developing countries where providing energy is a key
challenge, a low power technology is required. However,
some applications need heavy data transfer to operate, e.g.,
video streaming. An efficient technique is required to enable
the use of low data rate for communication in such appli-
cations. Currently, there is a gap in literature that provides a
reliable technique to enable short range and low data rate
technologies to transmit videos. This paper provides an
efficient technique that enables short range wireless tech-
nologies like ZigBee to transmit images and videos over
100 m distance.
Rest of the paper is organized as follows: Sect. 2provides
the review of literature, Sect. 3presents the available video
streaming techniques. Section 4highlights the proposed
model for transmitting videos over low data rate technolo-
gies using multi-channel and buffer. Section 5provides the
flow of the proposed system, Sect. 6presents the simulation
results and Conclusion part concludes the article.
2 Literature Review
ZigBee technology is suitable for Wireless Sensor Networks
[1]. The WSN (Wireless Sensor Networks) is used for many
purposes like remote monitoring, sensor readings, vehicular
ad hoc network and many more. Wireless Sensors Networks
consist of many petite nodes. These networks face many
problems like energy usage, network lifetime and topology
maintenance. In this research study the author uses two new
schemes for lifetime maximization of a network. In these
schemes, physically powerful node arrangement based
method is used. This scheme is used to wrap the fast
preservation of node failure.
ZigBee technology and fundamentals about the network
have been described by the experts [2]. He also provides
details about the architecture of these standards and briefly
enlightens the layer architecture. He also elucidates the RF
(Radio Frequency), Physical Layer and MAC (Media Access
Control) layer. He briefly describes about how IEEE MAC
Layer works and how to establish a connection in a network.
ZigBee is a low cost and power efficient PAN technology
[3]. It can be used to transmits diversity to transfer image
from one node to another. It is proved that it is possible to
save transmission time up to 40%. The proposed system
used multi-channel with multiple radio interface system to
maximize the throughput of a network.
Compression techniques are used to compress large
amount of data before sending. Authors explained that old
data compression techniques and encoding methods were
not sufficient for this problem [4]. Because the bandwidth of
medium was low and range of communication was very
short. The receiving image was not clear. He used MPEG-4
standards for audio and video compression because it is a
new compression method that provides better compression
rate than the older version MPEG-2. He further explained
that MPEG-4 is a suitable standards for low bandwidth and
has better error detection and correction mechanism. In his
studies author tries to find the best solution to the problem.
According to this study a better compression technique can
significantly improve the quality of video. In this research
study Bluetooth technology is used for communication. But
the main drawback of Bluetooth is it not energy efficient.
Compression techniques are used to compress large
amount of data before sending [4]. There is the need of
encoding and compression of the video data [5]. In this study
author tries to explain the basic concepts, algorithms and
systems of video streaming. They explained different types
of video streaming like point-to-point, multi cast and broad
cast. The authors further described key challenges in video
streaming by highlighting the transport and bit rate control
according to band width and error detection and correction
for overcoming channels.
A reliable application to transfer pictures of MPEG over
ZigBee Networks has been researched by authors [6].
MPEG VBR (Variable Bit Rate video) is data starving and
current undue time wait and data loss over wireless com-
munication. For this purpose a traffic shaping buffer is used
to handle the transmission over ZigBee channel. The author
developed NF (Neural Fuzzy) scheme to alter the traffic
shaping buffer output rate and RFB (Ruled Base Fuzzy)
scheme to regulate the input data rate of traffic shaping
buffer.
ZigBee reliability and efficiency in multi hop wireless
standards is studied [7]. The core requirements of WSN is
low energy consumption and reliability of the network. The
authors evaluated the performance of ZigBee in multi-hop
WSNs where sleep/Wakeup scheduling protocols are used
for low energy consumption. The authors worked on med-
ium access control layer and tuned its parameters to improve
the reliability of the communication.
The review of literature provides a view of the gap in the
transmitting videos over the network using shot range and
low data rate wireless technologies like ZigBee. Some
studies use Wi-Fi technology for wireless communication. In
Wi-Fi Energy consumption is main issue. The main advan-
tage of Wi-Fi is bandwidth and the range of network is better
than then the Bluetooth and any other wireless technology.
However, it is not suitable to be used in areas where several
wireless modules are required, since it will increase the
overall cost and power consumption of the system. This
problem can be solved using ZigBee because of its low
power consumption and inexpensive hardware modules.
256 R. Iqbal
3 Video Streaming Techniques
Video streaming has been an attractive field of research
throughout the world because of its potential for delivery of
services and type of applications. Growth of connected
devices has significantly increased the demand of applica-
tions based on videos, e.g., video streaming for watching
online videos, transmitting surveillance videos to security
rooms and video conferencing for business purposes etc. The
key requirements for these applications are quality of
delivery, cost, efficiency and reliability. In order to fulfill
these requirements different techniques are used based on the
application [8]. Below are some of the current available
video streaming techniques for short range wireless
technologies.
3.1 Single Channel Buffer Less Video Streaming
A traditional way of streaming videos over the wireless radio
is to transmit the whole video through the available band-
width. This technique has been around for decades that
provides a simple and cost effective solution to video
streaming. However, one of the drawbacks of this technique
is the loss of packets while transmitting heavy data like
videos over a single channel due to packet collision [5]. In
case of low bandwidth, this technique is not suitable as the
packet collision is high and delivery is low. To evaluate this
technique, simulations are performed and the results are
presented in Fig. 1.
As illustrated in Fig. 1, although, the total bandwidth of
ZigBee is 250 kbps, however, the maximum throughput
using Single Channel and Buffer Less technique yields less
data rate (100 kbps) for video transmission because of high
packet loss. This technique is efficient for use of small data;
however, the results show that this technique is not capable
of transmitting heavy data like videos.
3.2 Single Channel Buffered Video Streaming
In order to enhance the capabilities of Single Channel data
transmission techniques, a concept of using Buffer is intro-
duced. Buffer is a temporary storage that stores the data
before actually displaying it to the output device. Keeping
the data in the buffer allows the recipient devices to improve
the performance of the data before presenting the final output
[5]. This technique of using buffer is extremely popular for
video streaming. However, one of the drawbacks of this
technique is although the buffer still has capacity to store
Fig. 1 Single channel buffer less video streaming simulations using ZigBee on NS2
Multi-channel Buffer Enabled Technique for Video …257
data but reception of the data at the recipient is very slow
due to low data rate transmission of the communication
technology like ZigBee. Simulations are performed to gauge
the efficiency of this technique for transmission of videos
through ZigBee. Figure 2presents the results of the
simulations.
As illustrated in Fig. 2, although, the total bandwidth of
ZigBee is 250 kbps, however, the maximum throughput
using Single Channel and Buffered technique yields less data
rate (150 kbps) for video transmission because of high
packet loss. This technique is efficient for use of small low
quality images; however, the results show that this technique
is not capable of transmitting high quality images or
low-resolution videos.
3.3 Multi-channel Buffer Less Video Streaming
To further enhance the quality of delivery of data, a tech-
nique of using multi-channels for data delivery is used these
days. In this technique, data is sent through different chan-
nels that enables the avoidance of collision of packets and
hence results in better transmission. This technique is widely
used in current short and long range wireless technologies
for transmission of data, however, low data rate technologies
are still prone to delays in data transmission when it comes
to heavy data communication like videos [7]. Simulations
are performed to measure the efficiency of this technique for
delivering the videos over ZigBee by utilizing all 16 chan-
nels provided by ZigBee. Figure 3illustrates the results of
the simulations.
As illustrated in Fig. 3, although, the total bandwidth of
ZigBee is 250 kbps, however, the maximum throughput
using Multi Channel Buffer less technique yields less data
rate (190 kbps) for video transmission because of high
packet loss. This technique produces better results as com-
pared to Single Channel Buffered and Buffer less technique;
however, the results show that this technique is not capable
of transmitting high quality images or low-resolution videos.
4 Proposed System Model
The proposed model presents a technique of using
multi-channel with buffer integration to transmit heavy data
like videos over the network using ZigBee as a
Fig. 2 Single channel buffered video streaming simulations using ZigBee on NS2
258 R. Iqbal
communication medium. A ZigBee sender module is used to
send images by utilizing all 16 channels offered by ZigBee.
A buffer is used at the receiver to hold the data and ulti-
mately the data is decompressed to display the video.
Figure 4illustrates the proposed model.
In the proposed model, the image of the video is first
compressed using MPEG-4 compression technique. These
compressed images are then handed over to the ZigBee
module (sender) which uses its multi-channel transfer tech-
nique to send this image to the destination. It is important to
note here that ZigBee has 16 channels, which makes it a
good choice for multi-channel transmission by avoiding
packet collision and traffic congestion. When image is
received at the receiving end by another ZigBee module, it is
first placed in the buffer. The buffer will keep the images till
its full. At the same time, the buffer will keep on sending this
information to final destination where each image is
decompressed using same MP4 technique. One of the rea-
sons of keeping the images in the buffer is to make the
stream of images smooth for viewing by the user. If images
are sent as they arrive, sometimes user has to wait for the
images to arrive. This technique of having images in the
buffer before they are actually displayed to the user would
make user experience better.
5 Proposed System Flow
The process starts by compressing the image using MP4
compression technique. When the image is ready to be sent,
the channel is checked for congestion; if the channel is not
congested, the image is sent in the form of the packets over
the network. However, if the channel is congested, next
available channel is checked for availability. Similar process
is followed for each packet and each channel. As soon as the
data is received at the receiver side, it is checked for errors
and the data is placed in the buffer which is then ultimately
decompressed into the original image using the same com-
pression technique, e.g., MP4 in this case and finally the data
is displayed to the user. Figure 5illustrates the proposed
flow of the system.
Fig. 3 Multi channel buffer less video streaming simulations using ZigBee on NS2
Multi-channel Buffer Enabled Technique for Video …259
6 Simulation Results
Several simulations were performed to measure the efficient
and reliability of the proposed method. In the simulations per-
formed on NS2 simulator, packet loss and delivery of
transmission are measured to ensure that the proposed tech-
nique can be used for developing applications that involve
transmission of videos over low data rate of around 250 kbps.
In order to ensure the proper communication between the
nodes, communication range is kept to 30 m, however, with
typical ZigBee modules, the range can be increased up to
Fig. 4 Proposed system model based on multi-channel buffered technique
Fig. 5 Proposed system flow
260 R. Iqbal
100 m. Similarly, to ensure reliable data delivery, packet size is
kept to 1024 bytes with burst time and idle time set to 2 ms.
Simulations are carried out based on the following criteria
(Table 1).
The proposed technique provides a robust approach of
transmitting videos over low data rate wireless technology,
e.g., ZigBee etc. Simulation results show that the bandwidth
is efficiently utilized by stipulating around 230 kbps out of
maximum 250 kbps. Packet losses are still occurring, how-
ever, the rate at which the data is delivered has improved as
compared to techniques like Single and Multi Channel
buffered and buffer less. Figure 6presents the simulation
results for the proposed technique.
This technique sets a foundation for further research
where improvements in reduction of packet losses can be
made to enhance the efficiency of the proposed technique.
Similarly, improvements in delivery time can be made by
increasing the packet size and fluctuating the burst and idle
time. The range of the communication can also be increased
by introducing the concept of multi-hop communication for
Table 1 Simulation parameters
Parameter Values
Max. bandwidth 250 kbps
Max. distance between the nodes 30 m
Packet size 1024 bytes
Burst time 2 ms
Idle time 2 ms
Antenna type Omni antenna
Max. nodes in IFQ 50
No. of hopes 1
Fig. 6 Simulation results for proposed multi-channel buffered technique using ZigBee on NS2
Multi-channel Buffer Enabled Technique for Video …261
short range wireless technologies, however, it will have an
impact on the delivery time and reliability of the data
delivery which can be another research direction in this
regard.
7 Conclusion
The paper presents a technique for transmitting heavy data
traffic over the short range and low data rate communication
technology ZigBee. The technique proposed the use of
multi-channels integrated with buffer to improve the video
streaming over the network. The use of multi-channels
provides smooth path for the packet without collisions to
reach the destination. Later at the destination, each packet is
stored in the buffer to ensure sleek operation for the user to
view the video. Simulations were performed to gauge the
efficiency, accuracy and reliability of the proposed tech-
nique. The simulation results of the proposed technique are
compared with the results of currently available techniques
for transmitting heavy data over low data rate. The results
showed that the proposed technique provides high data
delivery by consuming more than 90% of the bandwidth
through multi-channel technique. The delivered data still
requires some refinement as packet losses are still occurring,
which will be a future work in this research.
References
1. Diongue, D.: A new sentinel approach for energy efficient and hole aware
wireless sensor networks. Int. J. Comput. Sci. Inf. Secur. 11(9) (2013)
2. Jon Adams, T.: ZigBee wireless technology and 802.15.4
radio-enabling simple wireless: semiconductor. Retrieved from
http://s3.amazonaws.com/zanran_storage/www.utdallas.edu/
ContentPages/8133370.pdf
3. Pirak, C., Chantharat, W.: Image transmission over ZigBee network
with transmit diversity. In: 2011 International Conference on
Circuits, System and Simulation IPCSIT, vol. 7. IACSIT Press,
Singapore (2011)
4. Smith, B.: Video over Wireless Bluetooth Technology. Department
of Electronics and Computer Science, University of Southampton
5. Apostolopoulos, J.G., Tan, W., Wee, S.J.: Mobile and Media
Systems Laboratory. HP Laboratories, Palo Alto, HPL-2002-260,
18 Sept 2002
6. Kazemian, H.B.: An Intelligent Video Streaming Technique in
ZigBee Wireless. FUZZIEEE, Korea, 20–24 Aug 2009
7. Anastasi, G., et al.: Reliability and energy efficiency in multi-hop
IEEE 802.15.4 wireless sensor networks. In: 2010 IEEE Sympo-
sium on Computers and Communications (ISCC) (2010)
8. Kalashnikov, A.N., Challis, R.E., Unwin, M.E., Holmes, A.K.:
Effects of frame jitter in data acquisition systems. IEEE Trans.
Instrum. Meas. 54(6), 2177–2183 (2005)
262 R. Iqbal
Multimedia Applications in Education
Smilen Antonov Savov, Rumiana Antonova, and Kamen Spassov
Abstract
The aim of this paper is to focus on some of the
multimedia applications used in educational process. This
paper offers several definitions of multimedia, identifies a
sample of the most popular multimedia technologies, the
most important tools and provides a discussion of their
content and sources for further information. The paper
stresses on five major multimedia components such as:
text, sound, video, graphics design, and animation. The
paper illustrates how the students learn, improve, update
their knowledge and test themselves through multimedia
technologies. The paper shows the pros and cons of
multimedia education technologies, using some tradi-
tional and experimental techniques. In the various stages
of the application of multimedia in education, the
importance is described in the visualization of industry
4.0 and in the software tools of digital transformation.
Keywords
Multimedia Digital transformation Education and
social innovation Oral cultures Creative industries
1 Introduction
The cultures are diversified in accordance of their informa-
tion channels. In the oral culture exist an equality of infor-
mation channels. That is why the communication here is of
multimedia type. When we use the word “multimedia”in
today’s complicated informational highway world, we have
to say that this “new”type of communication is not new!
There is also a popular term of “NEW MEDIA”often used.
The german composer Wagner uses this type of communi-
cation in his gigantic opera show spectacles. “Wagner was
convinced that the separate branches of art—music, archi-
tecture, painting, poetry, and dance—would attain new
poetic heights when put to the service of the drama, which
he viewed as the ideal medium for achieving his vision. His
totalizing approach to music theatre also foreshadowed the
experience of virtual reality.”[1: p. 4]. He used in his
“virtual world”libretto (text), musical score and acoustical
design (sound), lighting effects (dramaturgy of light), “Deus
Ex Machina”stage technologies (special effects as anima-
tion), “Camera Obscura”(proscenium arch acted as the
interface, TV screen or video), and of course “graphics
design”presented as stage sets and props.
The result was a spectacular grandiose show that touched
all the human senses [1]. So to speak, the multimedia
experience and usage for entertainment and educational
purposes is not “new”. In our present world the Digital,
Cyber, WWW revolution, sets the framework and base of
“Multimedia Digital Renaissance”. With the help of new
hardware and software we experience a revival of multi-
media world that can be used largely for better communi-
cation, education, and for artistic purposes. The focus of this
paper is the usage of present multimedia applications in
educational processes. In today’s world of multimedia we
understand a harmonious simultaneous existence of five arts
such as text, graphics design, video, animation, and sound
(Fig. 1). We can also add one very important element:
Interactivity (Fig. 2). With the recent development of the
multimedia education technologies we must add the WWW
Internet and “Long Distance Learning”, Virtual Reality
training, “3D Mapping”, software assisting disabled indi-
viduals, artificial intelligence technical innovations, “retinal
implants”, and many others.
The multimedia education communication consists of
synchronized presentation and perception of its five ele-
ments, which are integral aspects of communication system.
S. A. Savov (&)R. Antonova K. Spassov
Sofia University, Sofia, Bulgaria
e-mail: smilen.savov@abv.bg
R. Antonova
e-mail: E-Mail-Family@web.de
K. Spassov
e-mail: kspassov@gmail.com
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_30
263
“The Medium is the Massage”, said Marshall McLuhan, and
he was right because the communication message is an
integral part connected with the verbally active individual
and that is why it acquires a performance character [2]. Here
the oral communication requires and produces presentation
which is visual and concrete, direct and local. According to
Mr. McLuhan, the stages of communication are: primary
oral culture,literal written culture,typographic (Gutten-
berg) galaxy, and present electronic era [3]. McLuhan
claims that all human created innovations represent additions
Fig. 1 Multimedia components
Fig. 2 Interactivity
264 S. A. Savov et al.
to his/her body, and more specifically the media technology
is enlargement of our senses. Oral cultures live in an “Ear
World”, and written societies live in an “Eye World”, which
is an Yin and Yang type of co-existence. In the present
postmodern electronic era (Digital World), the “Eye World”
is enriched by the “Sound sensitivity”component, creating
the New Media, so to speak Multimedia (Fig. 3).
The secondary oral communication is influenced by tech-
nical innovations that form the recent decades (Radio, Televi-
sion—Cable and Satellite, Cinema, Mobile Phone
Communication, and Internet). The “new media”technologies
allow immediate transfer of text, video and sound messages all
over the world. In teaching, the synchronicity of message
transfer-receiving, gives a possibility of simultaneous visual
dialogue communication, via Internet using Skype and Face-
book Phone or other messaging applications. The technical
innovations lead towards abandoning of dominating medium—
text. The education process now is enriched with Hyper Text,
Hot Spots,andText Translate when we use Internet. Using the
WWW-Internet offers various ways of showing and sharing
information via Web sites, Web blogs, Social Media, online
courses and interactive tutorials. We witness a new communi-
cation event called Staging, which is present in primary oral
communication as well as modern communication [3].
Staging is linked with arrangement of cultural predeter-
mined elements of communication process in a social
framework via communication channels perceived “in situ”.
Influenced by the Digital “New Media”, the communication
is again approaching the spoken word, it becomes immediate
and expressive, and distinguishes it from the traditional
written communication. The contemporary communication
is mandatory to be “Global”. Even “Reality TV Shows”are
boasting that they are happening right now, at the present
moment, and are staged and aired “LIVE On the Air”. The
reality phenomenon requires local characteristics to be
replaced by expressive forms of the global culture. The
present multimedia communication is heading towards the
diffuse space of the global society. This means to rediscover
of situational-gestural, additive method and to transform the
humanity through the electronic (digital) communication
into a Global Tribe, according to McLuhan: “We now live in
aglobal village…a simultaneous happening.”[2: p. 63].
The communication in education using Multimedia is
reaching all of us. There are four main styles of communi-
cation: oral (previously mentioned), written language,
audio-visual, multi (plural) medial [3]. In Multimedia type
exist a social succession of several ways of communication.
Important communication channel is the Internet Global
Network, seeming uncontrollable, giving access to anyone,
which is a possibility of social communication articulation of
geographically, ideologically and economically isolated
students to the universities’Internet Cyber Campuses [3].
The long-distance learning methods offer new possibilities
of reaching and a chance to spread out the information but
also to test the students with on-line test quizzes. Nowadays,
the online Universities and courses are widely used. The
courses are including text, video, audio tutorials, 3D ani-
mation presentations, e-books, tests, more interesting
WYSIWYG (What You See is What You Get) Interfaces
with “hot spots”, buttons and “drag and drop”options. With
Fig. 3 McLuhan’s communication
Multimedia Applications in Education 265
the help of E-Commerce web-based applications, the web
server databases store and retrieve important information
faster and secure.
2 Multimedia as an Intellectual Educational
Tool
2.1 Learning with Educational Multimedia
Applications
Starting always first with text (script, scenario, copyright, or
storyboard) the first art is a frame to our multimedia
applications used in education. The revolutionary “Hyper-
text”with its “Hyperlink”is a study aid that provides
multi-dimensional Cyber space note taking. The hypertext
leads the student to other links of valuable information. It
gives more information via accessing the large databases and
gives enormous knowledge references.
In such way is created a “new literature”form called
Softpoetry. Softpoetry transforms literature into visual art
where words become theatre. Here the communication and
interactivity with the reader is provided by the hypertext
technology [3: p. 121].
The collection of information does not guarantee that the
student learns effectively. The student learns only by creat-
ing hypertext (Adobe Dreamweaver [4]). The students create
their own nodes and links among them. The student can
explore the topic to be structured. He/she organizes and
restructures it and links the sub-structures all together.
Applications, which provide the user with the possibility to
create or construct objects by using graphic programs or
linking nodes together, are not only component objects but
also “cognitive concepts or models”, which are dependent on
the learners’current knowledge base.
Multimedia can be used to demonstrate complicated
processes such as the human body circulatory system or the
TV weather report system (cloud, rain developments). Fur-
thermore, the student can use the software to take many
more accurate measurements and explore creatively a phe-
nomenon and consider additional factors. With the help of
multimedia interactive features, the student controls the pace
and the content of what will be seen on the screen. The
student can understand complex interrelationships. They
control the learning process.
According to prof. Todorov, the Edutainment (combining
education and entertainment) multimedia titles are gaining
popularity. They include multimedia fairytales, games,
musical programs, and encyclopedias- dictionaries, with
virtual reality components. One example is Eyewitness Vir-
tual Reality Cat, an e-book with videos, photos, images, and
sound. The student becomes a cat-investigator, in a museum
virtual environment full of various artifacts, history, and
mythology information. “The edutainment titles are the
newest hit of present multimedia.”[3: p. 119].
2.2 Learning Through Computer-Supported
Problem Solving e-Games
When it comes to problem solving, is recommended the use
of computer-based tests and quizzes. In particular, using
problem sets in the context of so called ‘on-line adventure
games.’Multimedia adventure games can be seen as infor-
mation sets where possible pathways and the questions,
which can be asked, are predetermined. Normally, this type
of games varies in the number of possible pathways, in the
level of difficulty and sophistication, and in the complexity
of answers to predetermined questions or problems. The
following aspects support the use of adventure games for
problem-solving approaches.
(a) Help and support. Due to the interactive nature of this
type of games, the students get feedback, help and support
from the computer. It is likely that students in this learning
environment still needs an instructor for some guidance.
(b) Coping with a variety of acquired responses. The
range of responses is one of the key elements in determining
the level of cognitive demand within these games. Problems
can be solved in many different ways. One advantage is that
students are confronted with different response possibilities
in the sense of responding according to different perspec-
tives. From a more negative point of view, this prescribed
feature of giving possible solutions can limit students’
creativity.
(c) Time effectiveness. Most games are well designed
and offer the possibility to save the data at any point and
return to this point at a later time.
(d) Trial and error e-learning. Computer games offer
opportunities for boundless experimentation in the field of
problem solving. The students can experiment with the
different possibilities in a very short period of time. In
reality, it is difficult to provide this type of trial/error learning
in an appropriate period of time and very often it is not
possible to test different possibilities in the fields of science.
(e) Interest and commitment. Students really like this
type of games because the games place everything in the
meaningful context of a compelling fictional (virtual) world
that seems to be real and living. Problem solving is a
complex intellectual process involving the coordination of a
range of demanding and interrelated skills, which include:
•understanding and representing the problem and identi-
fying what type of information is relevant for the
solution;
266 S. A. Savov et al.
•gathering and organizing relevant interactive
information;
•constructing and managing a plan of action or an inter-
active strategy;
•reasoning, hypothesis-testing and decision-making
process;
•using various problem-solving tools, monitoring solu-
tions, and evaluating interactive results.
3 Interactive Learning with Multimedia
Materials
The computer can support different forms of collaborative
interaction depending on what form of collaborative activity
is desired. Airplane pilots, police officers, doctors, race car
drivers are taught by computer-based multimedia Virtual
Reality game-type training and testing units (air-craft
trainers) to improve their knowledge and safety skills.
When trying to solve a problem while participating in
computer-based group work, the focus should be on a clear
task structure and the provision of feedback on solutions.
Multimedia offers unique opportunities for the production
and representation of shared classroom experience. The
interactive character of modern technology can support
reasoning by amplifying the nature and boundaries of sci-
entific models of objects and events. We can “control”the
video, sound, and game. We can stop, rewind the video,
choose an information channel, take notes, and test ourselves
using the interactive multimedia quiz applications. Via
interactivity, the students create knowledge which is essen-
tially a matter of learning to argue, ask questions, search
information, and be more curious. The technology replaces
the need for students to participate in ongoing conversations
with partners sharing interests and commitments. Technol-
ogy should not be seen as replacing such communication but
rather as providing a resource for supporting it. Students
need support from responsive and more competent others,
such as instructors and professors, to think through the many
problems and to achieve progress. Professors can support
students’interactions around digital technologies in different
ways. They can encourage and enable students to practice
critical thinking in the classroom by having an exploratory
talk (discourse talk).
The present Multimedia revolution in education merges a
high-tech unit with art. This endeavour is a collaborative
work of computer specialists from the Silicon Valley and the
film producers of Hollywood. “It is possible the new hybrid
term of Siliwood to be synonymous with the new creative
potential”[3: p. 122].
3.1 Web-Based Multimedia Applications
in Education
Various web-based multimedia applications are “uploaded”
on servers to provide information, knowledge, tests, “know
how”helpful information to all students. Here are some of
them:
Podcasts and vodcasts [5]
Podcasts (or netcasts) are audio files and vodcasts are
audio-video files stored on a public or private domains or on
websites specialized on audio and audiovisual files (i.e.
iTunes, Podcast Alley, Podcast Directory). Podcasting is the
—private or public—creation and distribution of these files.
YouTube and YouTubeEdu [6]
YouTube is a video portal owned by Google. It provides the
possibility to watch, edit and comment videos. It has a simple
structure and is available in 15 different languages. Looking at
Youtube.com [6], a popular video and audio portal, we see the
fast development of podcasts within the last years that is due to
the fact that nowadays audio and video files are easy to create
(using students’“smart phones”), edit, download, and dis-
tribute. It is possible to subscribe to a podcast series which
enables the subscriber to be alert when a new podcast episode
is created. In comparison with traditional audio or video
media, podcasts are much easier to produce and make avail-
able to a global audience. Using their i-phones, students can
create and upload movies and animations to film festival sites
and also get awarded.
The use of podcasts
One opportunity to use podcasts in class could be the cre-
ation of radio shows, or podcasts for language or science
lessons. Like in the case of blogs, there are practically no
limits here. By creating their own podcasts, students can
experience their own knowledge and learning processes,
present their opinions, their understanding of complex
topics. Furthermore, getting acquainted with storyboards (for
video or animation movies) make students plan carefully,
reflect on the order, prominence, and emphasis of the ele-
ments of the podcast [5].
3.2 Editing Graphics, Video, and Sound [7]
“Live television Shows”—Live streaming web TV
Student performances such as musicals, ballet, character or
(period) dances, drama pieces, school conferences, and
interviews can be easily broadcasted by student TV channels
“Live television”online. Prerequisites for a school’s own
Multimedia Applications in Education 267
television station are a fast and stable Internet connection, a
computer with a microphone, a HD (high definition) video
camera or webcam or built-in video camera and a free
account at an online video streaming site (ustream.tv)[8].
Another opportunity would be to follow up regular podcasts
by scientists because the students are involved in discussing
a similar topic. By subscribing to the podcast, the user will
be alerted when new podcasts are available.
Adobe TV [9]
The multimedia collection contains a number of websites with
content relevant to the subject of education in general. Others
provide information on topics related to particular pieces of
software. It is closely related to the portfolio of products
developed and sold by the company. The content, however, is
more general than the content of traditional user guides.
Software to turn photos into video
Students and teachers can use free software like Photo to
Movie. They can use the software, among other things, to
display photos, add titles, backgrounds, music, effects, and
zoom into specific parts of photos [10].
Video-editing software: Windows Movie Maker,
Adobe Premiere and Adobe After Effects
Software to select particular video clips and/or add cover
text. Students can also add speech, sounds and music [11].
Other professional editing tools are Adobe Creative Cloud
Premiere Pro [11] and Adobe Creative Cloud After Effects
[12]. Also iMovie,JayCut.com are often used for editing
video content.
Audio editors and recorders
Students can handle elements like speech, sounds and music.
Students can record audio files from microphone, edit and
convert existing sound files, change the speed of a recording,
and mix sounds together. Free software of this kind is
Audacity [13].
3.3 Multimedia Web Development Tools
Authoring freeware to assist teachers and students in the
publishing of web content and e-learning objects (without
the need to become proficient in HTML) includes Exe
Learning [14]. Students and teachers can also apply com-
mercial tools like Adobe Captivate or Articulate [15]. Stu-
dents knowing HTML code, can use Adobe Creative Cloud
Dreamweaver for creating web sites with main HTML code,
JAVA Applications, JAVA Script applets [4].
Adobe Edge, a web motion and interaction design tool
that allows students and professors to bring animated content
to websites, using the web standards HTML5, JavaScript,
and CSS3 (Cascading Style Sheets) [16].
Asynchronous JavaScript and XML (AJAX), a group
of web development techniques that students and teachers
can use to create asynchronous web pages that send data to
and retrieve data from a server in the background without
interfering with the display and behavior of displayed con-
tent [17].
jQuery, a JavaScript Library that simplifies HTML
document traversing, event handling, animating, and Ajax
interactions for rapid web development [18].
Dojo, a tool that enables rapid development of web
applications, including JavaScript and CSS features [19].
PHP, a scripting language that is suited for web devel-
opment and can be embedded into HTML code [20].
Java, a programming language, which the students and
teachers can use to build client-server web applications. It is
a complicated language and requires many hours of pro-
gramming experience [21].
Flash, a development tool for animations and a
browser-based ‘player’produced by Adobe Creative Cloud.
The software provides viewing of 2D or 3D animation
applications, content, and videos [22].
Silverlight, a development tool and browser-based plug-in
produced by Microsoft. It can be used for creating web
applications with a relatively high level of interactivity [23].
3.4 Collection of Multimedia Education
Applications on the Web
Wikimedia [24]
It is operated by the Wikimedia Foundation, distributes free,
multilingual content, and provides the full content of various
wiki-based projects to the public free of charge. The Foun-
dation operates the world’s largest collaboratively edited
reference projects. These projects include:
Wikipedia, an encyclopedia applying the latest database
search engines for more and quality information;
WikiBooks, open-content e-books in different languages;
WikiSource, an online library of rare historical publications,
collected and maintained by various users. Applying one or
more of these sites into an educational setting, the students
can be assigned the role of end users as well as the role of
producers. Due to the limited amount of time in practice,
educators may want to focus on the first role, i.e. on pre-
senting and retrieving linear and non-linear information
about a given subject matter. The information is usually
considered valid, since it is provided and edited by many
users, but learners can criticize the content based on com-
parisons with similar content from another updated source.
268 S. A. Savov et al.
WDL [25]
The objectives of the WDL (The World Digital Library) are,
among other things, to expand the volume and variety of
cultural content on the Internet and to provide resources for
educators, scholars, and general audiences. Their mission is
to make available on the Internet cultural treasures around
the world. These resources include manuscripts, maps, rare
books, musical scores, recordings, films, prints, pho-
tographs, and architectural drawings. The learners can be
assigned the role of end users of WDL. Since the multimedia
resources are categorized, the learners can look for resources
regarding a particular topic, place, time, or institution.
Moreover, they can browse for specific types of items. They
can enter their own search words.
MERLOT [26]
(Multimedia Educational Resource for Learning and Online
Teaching) is a website, which gathers free and open online
resources. The aim is to share high quality learning materials
and pedagogy. The content is assembled from various
sources worldwide. The activities of the MERLOT website
are based on the collaboration and support of its individual
members, institutional and corporate partners, as well as the
editorial board. Key services include building and sustaining
online academic communities, online teaching and learning
initiatives, and building, organizing, reviewing and devel-
oping applications of online teaching-learning materials.
Input comes from an ongoing communication with its
worldwide supporters and contributors. The users can
browse a collection of subject categories in order to search
for learning materials (arts, business, education, humanities,
mathematics and statistics, science and technology, and
social sciences). Students can find submitted materials,
authored materials, commented, learning exercises or pro-
vided personal collections.
OCW Consortium [27]
The OCW (Open CourseWare) Consortium is a worldwide
community of education institutions and associated organiza-
tions committed to advancing open courseware, i.e. free and
open digital publication of educational materials for colleges
and universities. Educators can search courses using a spe-
cialized search engine, browse courses by the language in
which they are published. Educators can also explore courses
from a particular source or publishing institution. This unit
introduces the challenges for disabled students who may use
computers in different ways when taking part in e-Learning. It
covers the technology and techniques used by disabled stu-
dents, the adjustments to teaching methods that might be rea-
sonable, design decisions which affect the accessibility of
e-Learning tools and strategies for evaluation.
Open educational resources portal [28]
The title of this website, ‘temoa’, represents the words ‘to
seek, investigate, inquire’. It is proposed by Tecnológico de
Monterrey. The website is a multilingual catalogue of open
educational resources described and evaluated by an aca-
demic community. The resources are categorized by area of
knowledge, educational level and language. Moreover, the
website provides a search engine with ‘intuitive filters.’The
educational materials are, among others, provided by:
Massachusetts Institute of Technology; Exeter Research and
Institutional Content archive (ERIC); Access to Research
Resources for Teachers (ARRT); Rice University; The Open
University; HowStuff Works (A Discovery Company).
FREE (Federal Resources for Educational Excellence)isa
website hosted by the federal government of the United
States and maintained by the U.S. Department of Education.
The aim of this site is providing high quality educational
resources for free [29].
ERIC (Educational Resource Information Centre)isan
online digital database of education research and information
resources [30].
World Lecture Project [31]
The website is hosted by the World Lecture Project associ-
ation. It contains video lectures on a variety of topics from
all over the world.
MIT World (Massachusetts Institute of Technology)
hosts a website called MIT World, which is a free and open
site that provides on-demand video of significant public
events at MIT [32].
BioDigital Human [33]
Multimedia web site with video, text, sound, graphics and
animation about human body and its anatomical functions.
Google Earth [34]
Various maps and areal views of the Planet Earth.
3.5 Multimedia Applications for Graphics
and 3D Authoring
Software to view and edit images
Software to view and edit images. Students and teachers
can pick figures, crop images or produce a variety of effects.
Moreover, they can change the format of images. Since size
matters on the Internet, editors can also be used to compress
images. Most often, the office software mentioned above
includes software for image processing. An example of
freeware for this purpose is IrfanView [35].
Multimedia Applications in Education 269
Adobe Photoshop Creative Cloud, Adobe Creative
Lab, Adobe Illustrator [36]
These are the best professional images, photos, graphics, and
special effects software used by all, such as: photographers,
artists, moviemakers, editors, PR specialists, and graphics
artists. Photoshop creates raster image files, compared to
Illustrator, specialized in a vector graphics with Alpha
channel. The created graphics after manipulation can be used
in a various multimedia applications and presentations.
Professional 3D Animation and software to produce
3D presentations
Students and teachers can use Poser, and Blender software
to create interactive 3D content [37]. Professional software
includes 3D Studio Max for 3D modeling and animation
[38], AutoCad, and Mudbox produced by Autodesk, and
Adobe Creative Cloud—Character Animator. The most
advanced 3D software applications are Pixologic ZBrush-
Core (for sculpting and modeling) and Autodesk MAYA (for
computer animation) [39].
3.6 Software to Produce e-Learning Objects, VR
Objects, and Presentations
KNOT-Mac (Knowledge Network Organizing Tool for
Macintosh)
These are tools that introduce many online applications,
supporting higher order thinking strategies and creativity for
students [40].
QuickTime VR engine Can help create a Virtual Reality
area in a web site, showing an interior of buildings, for
examples VR 3D Models of ancient fortresses, castles, hotel
interiors etc. The students can create their VR files and
embed them into HTML code [41].
Multimedia Education Presentations
And finally all the students can create their own Multimedia
presentations, using Microsoft Office Power Point and Prezi
[42]. These modern multimedia applications can incorporate
graphics, sound, video, animation, text, and interactivity.
4 Conclusion
Effective teaching and learning is impossible nowadays
without the use of various Multimedia applications tech-
niques and innovations of the so-called ‘digital’pedagogy.
Within a high-tech information-educational environment,
multimedia components (sound, graphics, video, animation,
and text) are most powerful tools, when creatively
combined, to assists teachers to enhance their professional
capacity and helps students to enrich their knowledge
potential and to achieve their educational goals. Moreover,
modern multimedia in combination with Internet, social
media and open educational resources contribute to the
Global Student network where quality education is more
accessible for all no matter time and distance.
References
1. Packer, R., Jordan, K.: Multimedia from Wagner to Virtual
Reality. Norton & Company, USA (2001)
2. McLuhan, M.: The Medium is the Massage. Bantam Book, USA
(1967)
3. Todorov, J.: Audiovisual & IT in education. Veda Slovena (2009)
4. Adobe creative cloud dreamweaver. http://www.adobe.com/
products/dreamweaver.html
5. Podcasts for students. http://www.bookwink.com;http://www.
storynory.com
6. Video and audio portals. http://www.youtube.com;http://www.
iTunes.com;http://www.youtube.com/education
7. Editing movie. http://www.JayCut.com;http://www.iMovie.com
8. Ustream TV application. http://www.ustream.tv
9. Adobe TV. http://tv.adobe.com
10. Photo to movie. http://www.lqgraphics.com/software/phototomovie.
php
11. Professional video editing: windows movie maker. http://explore.
live.com/windows-live-movie-maker; Adobe creative cloud pre-
miere. http://www.adobe.com/products/premiere.html
12. Professional video special effects: adobe creative cloud after
effects. http://www.adobe.com/products/aftereffects.html
13. Audacity. http://audacity.sourceforge.net
14. Exe learning. http://exelearning.org/wiki
15. Adobe captivate & articulate. http://www.adobe.com/dk/products/
captivate.html;http://www.articulate.com
16. Adobe creative cloud and adobe edge. http://www.adobe.com/
creativecloud.html;http://labs.adobe.com/technologies/edge
17. AJAX. http://en.wikipedia.org/wiki/Ajax_(programming)
18. jQuery. http://jquery.com
19. Dojo. http://dojotoolkit.org
20. PHP. http://www.php.net
21. JAVA. http://en.wikipedia.org/wiki/Java_(programming_language)
22. FLASH. http://www.adobe.com/products/flashplayer.html
23. Silverlight. http://www.microsoft.com/silverlight
24. Wikimedia. http://Wikimedia.org
25. WDL. http://www.wdl.org
26. MERLOT. http://www.merlot.org
27. OCW consortium. http://www.ocwconsortium.org
28. Open sources. http://www.temoa.info
29. FREE. http://www.free.ed.gov
30. ERIC. http://www.eric.ed.gov
31. World lecture project. http://world-lecture-project.org
32. MIT world. http://www.mitworld.mit.edu
33. Biodigital human. http://www.biodigitalhuman.com
34. Google earth. http://www.google.com/intl/en/earth/index.html
35. Irfan view. http://www.irfanview.com
36. Adobe photoshop creative cloud and adobe creative lab. http://www.
photoshop.com/;http://labs.adobe.com/technologies/photoshop/
37. Poser and blender. http://my.smithmicro.com/;http://www.
blender.org
270 S. A. Savov et al.
38. 3D studio max. http://usa.autodesk.com/3ds-max
39. Pixologic Zbrush and Autodesk MAYA. http://pixologic.com;
https://www.autodesk.com/products/maya/overview
40. KNOT-Mac (Knowledge network organizing tool for macintosh).
http://ictmindtools.net
41. QuickTime VR. http://www.easypano.com/panorama-software.
html;http://sky.easypano.com/panoramic-images/Panoramic%
20Image-160.html
42. Microsoft office power point and Prezi. https://products.office.com/
powerpoint;https://prezi.com/
Multimedia Applications in Education 271
Non-invasive Extremist Identification
and Asset Maintenance
Vladimir Tomaševićand Stanko Bulajić
Abstract
Reactivity plagues academics and field operatives alike
and generates false data that invariably lead to inappro-
priate resource allocation and ultimately failure to attain
the desired operational and strategic goals. The only field
tried and proved method of asset management, in terms of
extremism control and successful prevention and/or
damage control, is to maintain non-invasive identification
and tagging methods that are the prerequisite for later
intelligence gathering. Migratory crisis generated by the
conflicts in Syria has opened a new gateway in interna-
tional flow of extremism and increased migrant flow has
given cover for transnational communication from
Afghanistan, via Iran, Syria, and the Balkans into the
EU and onwards. Furthermore it has given an opportunity
for known and identified elements to disappear of the
radar and become reintroduced in extremist activities
back from where they have originated. Three main
non-invasive methods of identification have been devel-
oped and tested; all of which are grounded in inter-group
social interactions within the migrant “community”.
Despite being publicly debated; they for the time being
are insurmountable for extremists as they rely on two
main causalities which they cannot control: behaviour of
children and numbers of migrants.
Keywords
Extremist identification Anti-terrorism
Balkans
1 Reactivity and Relating Issues
1.1 Theoretical Implications of Reactivity
Researchers in the field of social sciences are well
acquainted with the so called “Hawthorne effect”, the
quintessential example of the reactivity in observation.
Reactivity means that the subjects of observation change
their behaviour when/if they are aware that their behaviours
are being observed [1]. This important aspect of qualitative
studies, including security studies, has a contamination effect
of the natural social environment and thus on the final
findings [2]. Reactivity presents the most important threat of
the validity of scientific research findings when the research
is focused on human behaviours or characteristics [3]. Thus,
the scientists have to take great efforts in reducing the par-
ticipants’reactivity [2].
Obtrusive observation exists when a participant is com-
pletely aware that is being observed and changes the beha-
viour in a way that he or she believes it would satisfy the
observer’s expectations [4]. Also, participants change their
behaviour when seeking positive impressions of themselves
[5]. Unobtrusive observation exists when a participant is not
noticing the observation [4]. Researchers should unequivo-
cally address reactivity by training field observers to be able
to be unobtrusive. Facial expressions, posture, movements
and reactions of the field observers to the situations and
events can also change participants’behaviours, so training
of the field observers to be unresponsive is extremely
important in any field survey.
Different researchers point out the five factors that con-
tribute to reactivity that has to be taken into the account
when conducting research in security studies:
1. Social (non)acceptability of certain behaviours, so
socially undesirable behaviours are suppressed and
desirable behaviours expressed.
V. Tomašević(&)S. Bulajić
Belgrade School of Engineering Management,
Union “Nikola-Tesla”University, Belgrade, Serbia
e-mail: vladimir.tomasevic@fim.rs
S. Bulajić
e-mail: stanko.bulajic@fim.rs
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_31
273
2. Personal characteristics and age may influence if a sub-
ject or subjects (e.g. children) react less to the direct
behaviours than the other participants.
3. The closeness of an observer and visibility of observation
instruments may cause conspicuousness of subjects.
4. Some characteristics of observers (age, gender, etc.) can
influence the participants’responses.
5. The rationale of observation can influence participants’
involvement [6].
It is clear that the scientists have to determine if they
observed natural activities of the subject and not their
reaction to the observers. In theory, reactivity is not a
problem when participants are unaware of the research
context so that they can behave naturally [6].
Many researchers agree that the most valid results are
obtained from observations when reactivity is scaled down.
Scaling down of reactivity is achieved through so called
participant observation, when the real role of the observer is
not known to the participants [7]. To accomplish that, the
observer must be able to completely take the “participant”
role, but even in those situations, the observers’behaviour
might change the course of the observation study. Even in
the cases of observing someone’s behaviour through one
way mirror, the participant’s behaviour might be changed if
he or she is aware of the situation. In many cases, in security
studies it is impossible to organize participant observations
due to problems with the concealing the observers true
identity (ethnical origin, language, culture, etc.). In many
cases the data collected might be tainted because the
observations were not being recorded (or were poorly
recorded) and the observer’s relying only on memory [8].
Some of the researchers, while observing family inter-
actions through audio taping, found out that participants
followed the same behavioural patterns when they didn’t and
did know if the tape recorder was on or off [9]. Also, some
market research (e.g. the research done for Kimberly Clark
and their brand Huggies) in 1980s suggested that using the
video to tape the observed behaviour, changed the partici-
pant’s behaviours only at the beginning of the study. After a
while, the participants were behaving like the cameras were
not recording their behaviours [10].
1.2 Practical Field Implications of Reactivity
One of the largest challenges of security studies research is
that in the last two decades, even in situations where the
observers are not visible, people change their behaviours in
circumstances when they believe they are under the obser-
vation of security cameras (in the major streets, airports,
train stations, government buildings, etc.). Airport security
practices include observations of specific emotions and
behaviours and profiling [11], thus airport security proce-
dures being the most obvious example.
In security studies, it is also necessary not to forget, in
terms of research design, the issue of the validity of the data
collected through interviews and questionnaires when the
participants (e.g. refugees) may try to give socially desirable
answers in order to reach certain personal goals.
Taking all of the aforementioned into account it is clear
that subjects of observations and those that may perceive to
be so, exhibit behaviour that both invalidates scientific data
collection, and more importantly annuls all efforts of
extremist identification and latter tagging methods that are to
follow. Therefore this article focuses on unobtrusive iden-
tification methods of potential extremists and thus enables
security services to maintain a secure channel of tagging and
personal following that this article refers to as “asset
management”.
2 Refugee and Migrant Movement
as Extremists’Opportunities
2.1 Conditions for Migrant and/or Refugee
Generation
International survey of international crises has yielded a
summary of events that generate a steady flow of migrants
into Serbia through its’southern border with the FYR of
Macedonia: unresolved status and stressful situation of
refugees and displaced persons from Syria, Afghanistan,
Iraq, Eritrea, Pakistan, Nigeria, Somalia, Sudan, Gambia
and Mali; organized crime, robbery, rioting and the
expression of dissatisfaction with the authorities and indi-
vidual incidents; human; illegal migration and border
breaches; disputes with neighbouring countries; the inability
of the EU to resolve the issue of migrant crisis and indi-
vidual decisions of neighbouring countries in the long run;
import of terrorism; illegal trafficking and smuggling of
weapons; the rise of right-wing extremism; problems with
economic development; endangering energy security
activities [12]. Complexity and the seriousness of threats to
the security to the EU and other nations is partially generated
by the migratory crisis as it creates a window for extremists
to perpetrate borders under false auspices as genuine
refugees.
The aforementioned current international affairs have
created conditions under which refugees and or migrants are
now a force that needs to be taken into account when ana-
lysing security aspects of developed nations.
274 V. Tomaševićand S. Bulajić
2.2 Migrant and/or Refugee Defining
Definitions state that an economic migrant is a person whose
primary motivation for leaving is economic gain. Lately, the
term ‘migrant’is seen as an umbrella term for three groups
of individuals seeking a new location for settlement [13],
although according to the UNHCR this is not justifiable [14].
According to the UNHCR “So, at UNHCR we say ‘refugees
and migrants’when referring to movements of people by sea
or in other circumstances where we think both groups may
be present—e.g. boat movements in Southeast Asia”.
This article takes the position that a ‘refugee’is a person
or persons fleeing war or persecution across an international
border. This article takes the position that ‘migrants’are
people moving for reasons not included in the legal defini-
tion of a refugee. This is the current position of UNCHR
[14].
2.3 Current Migrant and/or Refugee Situation
in Serbia
The migrant crisis that is shaking Europe is the result of
long-standing conflicts in the Middle East, Afghanistan and
North Africa, which arose due to the political and economic
instability of states in the region and the deep social and
cultural contradictions of societies within them, followed by
physical violence against the population, war crimes,
flagrant violation of human rights, the destruction of material
and cultural goods. These factors have caused mass migra-
tions of the population from the conflict-affected area first to
neighbouring countries, and then to Europe as their final
destination. In 2015, Europe faced the biggest humanitarian
catastrophe since the end of the Second World War. The
massive and uncontrolled flow of migrants was a great
surprise for the European Union, as well as other countries
on the European continent. “According to the UN refugee
agency [14], in 2015 more than 820,000 illegal migrants
arrived in the EU by sea, mostly in Greece (673,000) and
Italy (142,000). Most of these migrants arrived from Syria
(52%), Afghanistan (19%), Iraq (6%) and 145 Eritrea (5%),
but this wave also includes people from Pakistan, Somalia,
Nigeria, Sudan, Gambia and Mali”[15].
The migrant crisis, created in Syria, has expanded to the
Balkan region, which has become the main area for the
transit of migrants to the countries of Western Europe. Due
to the increased number of migrants, and based on the
decision of the Government of the Republic of Serbia, all
elements of the security and defence system have been
engaged, who have taken appropriate measures within their
jurisdiction.
The goal of the response is to efficiently manage the
migrant crisis through the establishment of security,
financial, social and humanitarian mechanisms and proce-
dures for a comprehensive and efficient analysis, monitoring,
forecasting and managing the migrant crisis, while ensuring
a stable state of security on the territory of the Republic of
Serbia and respecting and applying international and
national legal norms and standards, in cooperation with
neighbouring countries, the EU and other relevant interna-
tional actors and organizations. This is achieved through the
definition and implementation of specific tasks related to
military security, political, legal and diplomatic, as well as
socio-humanitarian activities [16].
Since May 2015, as well as other candidate countries in
the Western Balkans, Serbia has faced a massive influx of
refugees and migrants in transit from Greece to Hungary or
Croatia. Most of them are displaced from Syria, Iraq and
Afghanistan. In 2015, the government registered more than
815,000 refugees who went through Serbia. After the closure
of the so-called Western Balkan migration route in March
2016 and implementing the EU and Turkey agreements, the
number of entries reduced drastically.
2.4 Refugees and Migrants as Cover
for Extremists
The constant flow of refugees and migrants has proven to be
a window of opportunity of transferring extremists across
borders into their intended destination countries under cover
and pretence of refugee status.
This article does not seek to analyse migrants which may
be a result of economic or social (including politically,
sexually or otherwise defined) backgrounds or refugees
(weather genuine or not) but only extremists which use these
covers in order to achieve their goal of reaching their final
destination. Current field intelligence indicates that about 3%
of all migrants or refugees could potentially be extremists
(terrorists, common criminals, and/or those escaping justice
from their countries of origin). This would imply that
approximately 50–75 extremists’transit through Serbia daily
into Western Europe constantly for the past 3 years [17].
2.5 Need for Unobtrusive Extremist
Identification
Taking into account how the theory indicates that the best
method of observation is unobtrusive and agent field expe-
rience which confirms that once subjects are publicly iden-
tified or “compromised”; a clear need for unobtrusive
extremist identification arises.
The following text clearly identifies how tested scientific
methods have been used to identify extremists amongst
migrants and refugees, three models of how this is done and
Non-invasive Extremist Identification and Asset Maintenance 275
evidence is given to how the results have been tested and
validated.
The authors need to point out that significant elements
have been edited in order to protect secondary inferences on
how valid models of identification are still in use. The
models described are now termed as “un-stared”which
denotes that their classified status has been removed and
they are now readily available for academia to use, study and
share publicly. Elements which pertain to this and related
studies that are still deemed as classified may and can be
accessed once appropriate clearance is granted.
3 Extremist Identification
3.1 The Need of the Observed to Become
Unobservable
Extremists and those that have been identified as those with
reasonably close family and/or organisational ties to those
that have proven terrorist track records continuously main-
tain the need for subversive, under the radar, and unob-
servable behaviour [18]. By the nature of this behaviour,
individuals that have an aim of reaching their final destina-
tion in Western Europe exhibit this primary trait: they
remain low-key even when presented with credible chances
of advancing their passage from the main legal channels
available such as the Red Cross/Crescent, UNCHR, Caritas
or other similar organisations [19].
Using this observed trend, field tests, in vivo, in the
period 2015–2017 have been conducted. Field testing has
been conducted in Belgrade Refugee Centre with aid of
professional social and intelligence workers as well as
impartial volunteers. The results have show that out of a
sample of 1000 individuals accompanying adolescents that
have clearly and visibly remained passive when offered
organised and officially sanctioned help; secondary security
screening of the 1000 individuals has shown that 91% of
examined individuals have claimed to have lost their per-
sonal identification papers, whilst 71% of the sample have
after secondary search and extensive interviewing been
discovered to have been giving a false country of origin, and
84.5% of those giving false information of point of origin
have a criminal record of some form in their native countries
(note definition of criminal record is taken as a crime in the
country of origin) whilst through undisclosed genetic
matching; 97% of the tested individuals did not have a
genetic match with those that claim to be their dependants.
The results point out that clearly, those who avoid contact in
terms of assistance from officials and are accompanied by
children that they claim as their own, once in Serbia, have
something to hide, which is the precursor to potential sub-
versive behaviour.
Although it is appreciated that there may be research
limitations due to the fact that only migrants and refugees
have been examined in this particular Centre, however, this
Centre itself is responsible for processing all of the migrants
and refugees before they either legally leave the country or
disappear once they fail to report i.e. illegally leave the
country and enter the EU.
3.2 Identified Incongruence of the Expected
and Unexpected
Assadi et al. [20] have demonstrated that parents (originating
from some of the countries from where refugees or migrants
appear) that have higher formal educational backgrounds
maintain a more authoritarian stance towards their children.
However, certain individuals of clearly lower formal edu-
cational levels have demonstrated same behaviour with
children in their surroundings, while the children in their
immediate environment do not seem to respond to traditional
parental stimuli [21] from the same individuals. In other
words, there is incongruence both on the side of parental and
child behaviour to what should be observed in the field.
Furthermore, once these individuals realise that they are
in the focus of attention of local authorities, or those that
they perceive as persons of decision making capabilities,
they exhibit in-ordinarily high levels of interaction and care
with their children or adolescents that they present as such,
or present themselves as victims on behalf of their
dependants.
3.3 Modes of Identification
Three main modes of identification have been derived from
the study of 1000 individuals in Belgrade Refugee Centre:
1. Individuals that are accompanied by adolescents and
those that pose as their family members exhibit beha-
viour that is not congruent with widely defined family
values: children although obedient are note completely
familiar with one member of the group (it does not have
to necessarily be a male member; in 25% of the cases it
was the false mother that was the perpetrator). Within
96 h of intensive observation, children in 100% of the
cases where extremists were identified, gave away the
real nature of the relationship between the perpetrator and
other members of the group (family, friends from the
neighbourhood, or other associates).
2. Certain individuals are inaccessible by those that pose as
Security services. Whenever field operatives, or even
false probes, that are identified amongst the migrant
community as those that work for the Police, Military or
276 V. Tomaševićand S. Bulajić
Immigration approach or attempt to approach a specific
individual; some form of incident or commotion appears
and that individual disappears. They are generally
shielded by 2–3 aids that are those that divert attention
and who’s task it is to divert attention to themselves.
These individuals are those that are not accompanied by
adolescents and appear very low key. However, they are
easily identified by clearly being avoided by what would
be perceived as middle-income and/or educated migrants
that are clearly not refugees but economic migrants.
3. Social migrants, those travelling for economic benefit,
those that are being smuggled for the illegal sex industry
in Europe, common petty criminals, those perceived as
sexual deviants in their countries, or all those that stand
to gain from reaching their final destination as a means to
an end in terms of financial prosperity rather than simple
avoidance of war-devastated countries avoid any contact
with potential extremists. They are generally afraid of
being seen with then publicly, they avoid any contact
with them in order to avoid conflict or being recruited to
help. Thus, economic and social migrants may some-
times share common spaces with genuine refugees, but
will avoid those they perceive as criminals; and in return
for safe passage to their country of choice: in a controlled
test of 100 individuals that were selected, as social and
financial migrants rather than genuine refugees, 100%
were willing to participate, while 76% of those tested
have successfully identified potential extremists (those
that were later confirmed as individuals with connections
to organised crime).
3.4 Testing of Results
One of the fundamental tests is repeatability under controlled
circumstances. Unfortunately, in social sciences, experi-
ments are difficult to repeat, especially from the aspect of
reactivity and repeatability in security studies once original
postulates and methods are publicly announced.
However, a large sample of studied subjects that accounts
for 0.1% of the entire refugee and migrant population that
has passed through Serbia and the fact that up to date, 1 year
after to completion of this research, no change in behaviour
in the field has been noticed even though these methods have
been abandoned for more advanced ones indicate validity of
the data. Furthermore, once identified, subjects are through
certain nanotechnologies tagged, followed, maintained and
managed. Over the past year, once having left Serbia and
having reached their destination in the EU, over 80% have
been proven, in terms of successful arrests and conviction
rates, to be clearly connected to extremist elements and
criminal organisations, further confirming the validity of the
obtained data.
4 Asset Management
Once the potential perpetrator has been identified, they are
located and tagged. Tagging/marking is done using latest
advancements in nanotechnology (further information only
upon security clearances have been granted). These indi-
viduals are then treated as assets to field operatives even
though they themselves are not aware that their position has
been compromised.
From the point of view of the experimentation and
research conducted, asset management is important only for
up to 20 weeks from identification at the Refugee Centre.
Their management once leaving Serbia is passed on to the
relevant authorities in their respective countries.
4.1 Asset Confirmation
Confirmation of the successful identification comes in the
form of continued interest in the subjects on the part of the
host nations’intelligence services. The fact that so far, our
cooperation has not ceased but in fact increased indicates
further confirmation of this model and validates the results.
4.2 Time of Asset Transition
Assets are managed in three distinct phases:
1. Phase 1 is the time from the moment they are identified
as potential perpetrators or as those that may belong to an
extremist or criminal organisation until they leave the
territory of the Republic of Serbia. This phase has
traditionally proven to be between 4 and 10 weeks.
2. Phase 2 is the time from when they enter EU and their
journey within the EU where they settle (their trail and
traces of communication may serve as vital intelligence
to those that are already operating within the boundaries
of the EU but have not been identified yet). This phase
has traditionally proven to be between 8 and 10 weeks.
3. Phase 3 begins from the moment they are deemed to have
reached the destination from where they may commit
certain illegal activities or plan to leave the EU or other
countries such as the US or Russian Federation. This
phase has traditionally proven to be between 16 weeks
and several years.
Non-invasive Extremist Identification and Asset Maintenance 277
Further information only upon security clearances has
been granted.
5 Conclusions
Identification of extremist or individuals affiliated to known
criminal organisations is prone to reactivity and this paper
has tried to address this issue by showing that it is possible to
take known academic approaches and known parameters of
social experiments and research and gain valid and valuable
data. This research including 1000 refugees/migrants in the
Refugee Centre in Belgrade over a period of two years and
has shown that there are three main models in observation in
social interaction that enable intelligence officers in the field
to gather data. Three main models are social interaction
incongruence’s between grown individuals and adolescents
which appear to be solely staged for the benefits of what they
think social workers need to see in order to grant safe pas-
sage. In this model, the key to identification are children
which even with years of training or being fed false infor-
mation give away the fact that they are not related to their
guardians. Any suspicion can be eliminated by simple
readily available genetic testing whereby the subjects need
not be aware of this. The second method is grounded in the
inability of getting in touch of those that are perceived as
security services through sequences of staged events on the
part of the migrant refugee community. The third method
again arises from social interaction and is grounded in the
fact that social and economic migrants are happy to identify
suspicious individuals in exchange for safe passage and as a
rule of thumb always avoid any contact with extremists and
criminals.
Once threats have been identified, they are given the
status of an involuntary or subconscious field asset that is
managed in three specific phases. These phases are geo-
graphically a timer restrained and defined. Further infor-
mation only upon security clearances has been granted.
References
1. Oswald, D., Sherratt, F., Smith, S.: Handling the hawthorne effect:
the challenges surrounding a participant observer. Rev. Soc. Stud.
(RoSS) 1(1) (Autumn 2014)
2. Pellegrini, A.D.: Observing Children in Their Natural Worlds: A
Methodological Primer, 2nd edn. Lawrence Erlbaum Associates,
Mahwah, NJ (2004)
3. Corbetta, P.: Social Research. Theory, Methods and Techniques.
SAGE Publications, Thousand Oaks, CA (2003)
4. Rubin, A., Babbie, E.: Essential Search Methods in Social Work,
3rd edn. Brooks/Cole, Cengage Learning, Belmont, CA (2011)
5. Lewis-Beck, M.S., Bryman, A., Futing-Liao, T. (eds.): The SAGE
Encyclopaedia of Social Science Research Methods, vol. 3. SAGE
Publications, Thousand Oaks, CA (2004)
6. Hartmann, D.P., Barrios, B.A., Wood, D.D.: Principles of
behavioral observation. In: Haynes, S.N., Heiby, E.M. (eds.)
Comprehensive Handbook of Psychological Assessment, Behav-
ioral Assessment, vol. 3. Wiley, Hoboken, NJ (2004)
7. Monette, D.R., Sullivan, T.J., Cornell, R.D.: Applied Social
Research. A Tool for the Human Services, 8th edn. Brooks/Cole,
Cengage Learning, Belmont, CA (2011)
8. Coolican, H.: Research Methods and Statistics in Psychology, 5th
edn. Routlege, New York, NY (2009)
9. Kantowitz, B.H., Roediger, H.L. III, Elmes, D.G: Experimental
Psychology, 9th edn. Wadsworth, Cengage Learning, Belmont,
CA (2009)
10. Bernard, R.H.: Social Research Methods. Qualitative and Quan-
titative Approaches. Sage, Thousand Oaks, CA (2013)
11. Frowd, F.M., Leite, C.C.: Effect at the airport. In: Salter, M.B.,
Mutlu, C.E. (eds.) Research Methods in Critical Security Studies.
An Introduction. Routledge, US, Canada (2013)
12. Group of Authors: Strategic Forecasting and Development of
Scenarios of Crisis Development in Strategic Planning and Crisis
Resolution. Department of Strategy, Military Academy. Belgrade,
Serbia (2016)
13. Park, J.: Europe’s migration crisis. CFR Backgrounders. Council
of Foreign Relations (2015). URL: http://www.cfr.org/migration/
europes-migration-crisis/p32874. last accessed 2017/2/28
14. Edwards, A.: UNHCR viewpoint: ‘Refugee’or ‘migrant’—Which
is right? (2015). URL: http://www.unhcr.org/55df0e556.html. Last
accessed 2016/2/5
15. Bagdonas, Ą.: The EU migration crisis and the Baltic security.
J. Baltic Secur. 1(2), 7–27 (2015)
16. ibid 12
17. Group of Authors: Strategic Forecasting and Development of
Scenarios of Crisis Development in Strategic Planning and Crisis
Resolution. Department of Strategy, Military Academy, Belgrade,
Serbia (2017)
18. Janković, D.: Bezbednosne anomalije migratornih kretanja-borba
protiv krijumčarenja i trgovine ljudima, Thesis submitted in patrial
fulfillment for the requirements to the degree of Bachelor of
Engineering Management, Union “Nikola-Tesla”. School of
Engineering Management, Institute for Security Studies, Belgrade,
Serbia (2017)
19. Vukadinović, M.: Rešavanje azilantskog pitanja kao uslova u
zaštiti granice kao kritične infrastrukture države, Thesis submitted
in patrial fulfillment for the requirements to the degree of Bachelor
of Engineering Management, Union “Nikola-Tesla”. School of
Engineering Management, Institute for Security Studies, Belgrade,
Serbia (2017)
20. Assadi, S.M., Zokaei, N., Kaviani, H., Mohammadi, M.R., Ghaeli,
P.: Effect of socio-cultural context and parenting style on
scholastic achievement among Iranian adolescents. Soc. Dev. 16
(1), 169–180 (2007)
21. Dwairy, M., Achoui, M., Abouserie, R., Farah, A.: Parenting style,
individuation, and mental health of Arab adolescents: a third
cross-regional research study. J. Cross Cult. Psychol. 37(3), 1–11
(2006)
278 V. Tomaševićand S. Bulajić
Open Platform for Network Functions
Virtualization in the Digital Era
Stela Ruseva, Rumyana Antonova, and Nikola Naidenov
Abstract
Network Functions Virtualization (NFV) is a network
architecture philosophy, which offers a new way to
design, deploy and manage networking services. NFV
enables a new level of service agility and manageability,
while also allowing better asset utilization. To achieve
these and other goals NFV can be used in combination
with Software Defined Networking, another technology
that uses network abstraction. This article analyses Open
Platform for NFV (OPNFV), an open source project, and
its significance in providing for an open source reference
platform to validate multivendor, interoperable NFV
solutions. The OPNFV platform architecture and some
of the components, integrated into OPNFV from
upstream projects to build the NFV Infrastructure are
also covered in the article. OPNFV is a carrier-grade
platform, aimed at accelerating the deployment of new
NFV products and services that meets the industry’s
needs by introducing specific technology components,
based on their use cases and deployment architectures. To
ensure consistency, performance and interoperability
among virtualized network infrastructures, OPNFV
encourages an open ecosystem of participants and enables
broad industry collaboration.
Keywords
Open platform for NFV (OPNFV) Network
functions virtualization (NFV) VNF Cloud
computing OpenStack Software-Defined
networking (SDN)
1 Introduction
The industry’s attention is presently focused on software
configurable SDN networks as well as virtualization tech-
nologies with NFV functions. Some topics, connected to this
matter, are discussed in this article [1]: How the operator and
its business as a whole transform; What can be offered to the
telecom operators by Operations Support Systems manu-
facturers; How today’s IT industry players can adequately
meet the revolution in networking technologies with proper
management systems in telecommunications.
According to the article [2], the basic necessities in
industry are:
•Increased flexibility of services;
•Increased operative effectiveness;
•Cloud-based models of offered services;
•Dynamic allocation of services to provide necessary
flexibility;
•Possibility to equip the hardware for general use with
new functionalities;
•Integration of the existing open-source NFV systems;
•Complete collaboration, coordination and testing of the
interacting systems;
•Proved, guaranteed quality of network services.
NFV picks out network functions (such as NAT, fire-
walling, intrusion detection, DNS and cashing) from the
patented hardware devices so that they are able to work on
software. NFV has been designed to provide network com-
ponents necessary for the maintenance of the completely
virtualized infrastructure—virtual servers, storage and even
whole networks. It uses conventional IT virtualization
technologies which operate with large amounts of data,
switches and storage hardware in order to virtualize network
functions. NFV can be applied to any functions related to
data transfer or to control functions in cable or wireless
network infrastructure [1,3].
S. Ruseva R. Antonova (&)N. Naidenov
Faculty of Mathematics and Informatics, Sofia University
“St. Kliment Ohridski”,Sofia, Bulgaria
e-mail: Dr.Antonova@t-online.de
S. Ruseva
e-mail: stela@fmi.uni-sofia.bg
N. Naidenov
e-mail: niknn@ucc.uni-sofia.bg
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_32
279
A glimpse back in time sheds light and confirms the
benefits from NFV, respectively the development of the
OPNFV project in the context of these problems. It is
obvious that the idea of NFV comes from the network
providers who have looked for a way to accelerate the
introduction of new network services in order to achieve
their own aims at increasing their income. The constraints of
hardware have compelled them to apply conventional
technologies for IT virtualization in their networks. A few
suppliers have united and established The European
Telecommunications Standards Institute (ETSI). ETSI
Industry Specification Group for Network Functions Virtu-
alization (ETSI ISG NFV) is a group which has been
charged with the development of the virtualization specifi-
cations and the architecture for various functions in the
telecom nets, for instance the NFV MANO standard. ETSI
also takes part in and supports the recently announced
OPNFV joint project [1].
As NFV uses virtualization technologies and practices,
known in cloud computing, it is reasonable to think of
including OpenFlow-based Software Defined Networking in
the NFV infrastructure. Though NFV and SDN are not
dependent on each other, they are highly complementary.
The practical applications of NFV need dynamic, automated
control of flow routing deployed by various providers. These
problems can be solved with OpenFlow.
SDN is a dynamic, manageable architecture for optimal
using of resources. It can reduce prices and it is adaptable to
the needs of modern applications like high-speed connec-
tion, dynamic changes in the network infrastructure, etc. Just
like NFV, SDN uses network abstraction, capitalizes from
virtualization and heavily depends on it.
SDN is an approach throughout the computer networks
which allows the network services to be managed by
abstraction of lower-level functions. The SDN architecture
helps direct programming of control functions, according to
various situations. This is done by separating the system
which makes decisions where to send the traffic (control
plane) from the lower-level systems which forward the
packets (data plane). Thus the operating network infras-
tructure is separated from the applications and network
services. SDN requires methods by which these systems
(control pane and data plane) exchange information. Open-
Flow is used for this purpose.
OpenFlow [1] was the first standard communication
interface defined between the controls and forwarding layer
of the Software-Defined Networking (SDN) architecture.
OpenFlow allows manipulation and direct access to the data
forwarding layer of network devices, such as routers and
switches—physical or virtual ones.
In the conventional router or switch the functions of the
data path and the control path are performed by the same
device. OpenFlow separates these two functions. The data
path section is still the switch, while the high-level router
functions are placed in another controller, usually a server.
The OpenFlow switch and the controller exchange infor-
mation through OpenFlow protocol which defines the format
of the messages, e.g. packet-received, send-packet-out,
modify-forwarding table, get-stats, etc.
The Data-path section of the OpenFlow switch is an
abstraction of a flow table. Each flow in the table contains
information about the packet heathers: they are scanned for
coincidence in the heather fields and if found any, operations
are carried out with the packets, for instance, sending a
packet through a certain port, modification of a field in the
heather of a packet or dropping of a packet. When the
OpenFlow switch receives a packet which does not corre-
spond to any of the lines in the table, the packet is sent to the
controller. Then the controller decides what to do with the
packet: to drop it or to add a record in the flow table and
define how to proceed with such packets in the future.
OpenFlow allows the introduction of new innovative
protocols for routing or commutation in the existing net-
work. Its applications include mobility of virtual machines,
high-security networks and new generations of IP-based
mobile networks.
OpenFlow is an open standard which allows testing of
experimental protocols in common campus networks.
OpenFlow can be added as functionality to commercial
Ethernet switches, routers and wireless access points (AP).
Experiments can be carried out with no necessity for pro-
ducers to reveal information concerning the operation of
their network devices.
Figure 1shows a specific case of the NFV use: Managed
Router Service introduced by means of NFV [4]. NFV is
used to virtualize the router function, that way instead of
installing a number of expensive dedicated appliances: a
router in every customer site and a separate aggregation
router, the routing function runs on top of a virtual machine
on general-purpose server hardware. The purpose of SDN
(in this case an OpenFlow enabled switch) is to separate the
control and data planes. By combining NFV with SDN, we
can achieve even more optimization, as the control of the
data plane has been abstracted and standardized, allowing
for network and application development without the need to
upgrades the network devices involved and moving all the
control functions to a centralized location (for ex. a data
center).
2 OPNFV Project
The benefit of source projects, which enable broad collab-
oration and testing, is ever more obvious in the IT industry.
OPNFV operates with organizations, which define standards
(including ETSI’s, NFV, ISG) in order to coordinate a
280 S. Ruseva et al.
long-lasting integration and test NFV solutions. This close
coordination of principally independent processes is crucial
to the creation of a NFV ecosystem. It can timely eradicate
contradictions, identify solutions and set actual standards. It
results in a faster and economical approach to introduction of
NFV. NFV platform performs functions like management
and observation of components as well as failure recovery. It
provides security mechanisms—anything that is needed for
data transfer to public networks.
Figure 2shows a general view of the platform and the
current activities which aim at achieving the desired inte-
gration, systemized in three ranges [5]. The specific idea is to
mainly use other “upstream”Open source projects as com-
ponents. The main efforts are concentrated on their inte-
gration. A lot of system tests of the so created platform
follow. Testing is based on specific cases of NFV use. In the
course of the process, the platform has to respond to new
requirements as well as to new functionalities.
All that being said, it is obvious that Network Functions
Virtualization needs to be managed properly from its early
stages. For that reason NFV MANO was created. It is a
working group of ETSI ISG NFV. NFV MANO is also the
framework appointed by ETSI for the management and
orchestration of all resources in the cloud data center. This
includes computing (processor power), network data storage
resources and virtual machines. NFV MANO is divided into
three functional blocks: NFV Orchestrator, VNF Manager
and Virtualized Infrastructure Manager (VIM) [6].
The initial aim and first step of OPNFV is to provide
NFV Infrastructure (NFVI), Virtualized Infrastructure
Management (VIM) and APIs with other NFV elements,
which all form the basic infrastructure, needed for the Vir-
tualized Network Functions (VNFs) and Management and
Orchestration (MANO) components.
Figure 3shows the OPNFV architectural framework [7].
The OPNFV project focused initially on the so called
NFV infrastructure layer/plane. Both network functions—
virtualization infrastructure (NFVI) and virtualized infras-
tructure manager (VIM) are the two functional blocks
making up the base for the introduction of application
software which would be working in virtualized
environment.
Fig. 1 An example of NFV in
combination with OpenFlow
Fig. 2 A general view of the
platform, focusing on basic
activities and collaborations
Open Platform for Network Functions Virtualization …281
•NFVI allows access to basic resources for computing,
data storing and network services by means of hypervi-
sors and SDN functions.
•VIM controls NFVI and has the managing functions
necessary for the introduction of applications working in
a virtualized environment. The term “virtual network
functions”(VNFs) usually refer to these applications.
OPNFV is working on creating of a reference platform
and is not trying to re-invent these already existing com-
ponents. The project focuses mainly on concordance
between the interfaces of the components and aims at
establishing a standard of a functional platform.
In the computer industry, there are a lot of initiatives
about the mentioned above components and functionalities
discussed in private or public forums. The OPNFV project is
trying to join these components in a modular, widely known
model for introduction of NFV technologies accessible to all
partners in industry.
To achieve this goal OPNFV focuses on the interfaces
throughout the components and the way these components
interact. These interfaces can be brought to four basic fields.
The purpose of the Virtual Network Function interfaces,
referring to the VL-Ha, is to create common interfaces
between the platform and the operating hardware underneath
or to separate the software from the hardware. In this way,
the software will not be dependent on the hardware it is
operating with. One can expect the appearance of numerous
standard implementations which enable the operators to:
•Share infrastructure resources for different purposes.
•Redistribute resources for different purposes.
•Improve simultaneously software in hardware.
•Use software and hardware components from different
producers.
The interfaces whose applications are used to operate
with the virtual infra-structure (Vn-Nf) are OPNFV inter-
faces belonging to the applications. They are a cut-point
between the software of a platform and hosted services.
Application developers directly develop them for virtualized
media or migrate their applications towards a virtualized
infrastructure. In both cases they need guaranteed capacity
and reliability of the platform they work on as well as its
ability to operate on different scale.
These basic principles and the ability of the platform to
operate on/with a common/mutual packet of APIs (interfaces
for application programming) provide a long lifespan and
compatibility of these applications.
The interfaces between the Virtual Infrastructure and the
VIM (Nf-Vi) are internal to the OPNFV interfaces which
control the NFVI virtualized resources and set coordinated
Fig. 3 OPNFV architectural framework focusing on the infrastructure layer
282 S. Ruseva et al.
and comprehensible behavior of the processes within the
platform. These interfaces generate critical functions for
maintenance and for the system operations like:
•Organized management of the NFVI virtual systems for
calculations, data storage and network services.
•Distribution and connectivity of the virtual infrastructure
resources.
•Monitoring of the system—the already used part of the
resources, capacity, failures etc.
The interfaces from the VIM to the VNF manager and the
organizing system (Or-Vi and Vi-Vnfm) are interfaces which
enable the application control systems and the organizing
systems to interact with the virtual infrastructure manager.
These interfaces realize visibility of the operations and the
virtual system itself. Thus, the application control systems
can accomplish management and optimization of the virtu-
alized network functions operating in NFVI. The organizing
systems can co-ordinate various elements at end-to-end
communication among particular services.
3 OPNFV Components Analysis
Ceph is the chosen data storage technology. Ceph provides
object, block and file storage with access to a unified system.
Ceph also provides distributed object storage. Its libraries are
accessible to clients’applications and to the RADOS (reli-
able automatic distributed object store) storage system.
Ceph’s software libraries give the applications written C, C+
+, Java, Python and PHP access to the object storage system
by using their intrinsic APIs. Moreover, REST interface,
which is compatible with applications written for Amazon
S3 and OpenStack Swift, is accessible through the RADOS
Gateway. Ceph RADOS Block Device (RBD) also gives
access to the images of the block devices which are frag-
mented and are replicated all over the storage cluster [8].
The file system CephFS is operating with the same object
storage system which furnishes object storage and interfaces
to the block devices. The server cluster for Ceph metadata
provides a service which creates a map of the file names and
the file system directories corresponding to objects stored in
RADO Store clusters. The metadata server cluster can
expand or shrink, which makes it possible for it to rebalance
dynamically the file system, so that data can be spread
evenly among the cluster hosts. Ceph provides unlimited
storage of file systems and better data security in the crucial
to businesses applications. Customers can mount or attach a
POSIX-compatible CephFS file system by using a client
software from the LINUX core. The Ceph client was added
to the Linux core in 2010. The servers operate like standard
Linux daemons.
ETSI NFV architecture contains a platform for cloud
orchestration as a component. This platform makes use of
general (widely used) functionality which is being built in
various solutions, for instance, to create infrastructure as a
service (IaaS) clouds. Although the developers of OPNFV
project do not display bias towards a particular platform, it is
a fact that the creation of a reference implementation needs
the use of a particular platform for cloud orchestration, not a
generalized class of such solutions. For the time being,
OPNFV society has chosen OpenStack—another open
source platform for cloud orchestration. This does not dis-
count the possibility that some developers who want to
contribute to the project could rewrite the code using an
alternative platform for the purpose.
OpenStack was chosen because of its basic benefitto
acquire the necessary flexible cloud infrastructure which
gives the users computation power [9]. OpenStack is a cloud
operational system which can control great aggregates of
resources making computations (for example various
hypervisors), data storage and network resources. They are
all controlled by a single operating panel. Thus the operators
can control and monitor the whole infrastructure in a cen-
tralized way and the users can request resources through web
interface [10].
OpenStack is referred to as an Infrastructure as a Service
(IaaS) cloud technology. This means that OpenStack sup-
ports the infrastructure by enabling/and enables the users to
quickly add new units, for instance, virtual machines. Other
components of the cloud can operate on these virtual
machines as well. Various tasks connected to the manage-
ment of the cloud media can be accomplished even during its
operation. Applications can easily be adjusted to the number
of users on the move by simply including more or less
communicating among themselves units for doing a certain
task (horizontal scaling) [10].
It is also important that OpenStack itself is open software.
It is being developed by a whole society, not by a single
producer, which makes it ideal for a heterogeneous infras-
tructure. Since its source code is an open one, it could be
modified for the OPNFV needs. It is obvious that on the one
hand OpenStack is necessary for OPNFV and on the other
hand it is not enough for it [10].
Another current problem is the fact that a lot of middle
box devices which are to be virtualized have almost
unachievable output requirements. It is known that middle
box is a device which checks, filters or manipulates the
traffic not only to transfer packets. Examples of such middle
box devices are Firewall, Network Address Translator,
Intrusion Detection System, Load Balancer, WAN Opti-
mizer. These interstitial/intermediate/medial/median devices
have to manipulate and forward numerous packets without
delay at the speed which the physical network allows
through networks that have capacity of terabits and even
Open Platform for Network Functions Virtualization …283
larger. As a result, OPNFV needs improved technology to
accelerate the operation of virtual machines on data carried
through the network. Techniques optimizing hypervisors,
net drivers, etc. should be embodied in OPNFV [9].
In order to optimize NFV, in addition to the need of high
productive platforms working with virtual machines, virtual
machines should be positioned on particular hosts, based on
expected communication models. OpenStack can take into
account other factors except for the efficient use of com-
puting resources and plan where to start a virtual machine so
that this machine can perform certain tasks [9].
Improved, large-scale, distributed platforms and tech-
nologies for data storage have to be supported because of the
scale of service providers’networks, precise measurement of
the used services by the customer, determining of prices as
well as agreements for servicing, etc. The good thing is that
OpenStack requirements exist for quite a long time, so
OPNFV can use some already ready solutions [9].
Another prerequisite for acquiring maximum benefit from
NFV is that network traffic is handled by virtual functions
(VNFs) in a definite order depending on various conditions.
Virtual machines are in the role of middle boxes. Agile,
programmable networks which use automated software
system to deliver services, flexibility and rescaling according
to the necessities are needed. The realizations of these
requirements will substantially reduce working expenditures.
The network sub-system plays a vital role in the cloud
organization which good solution to the outlined problems is
SDN [9].
There are two key questions when speaking about NFV
network with OpenStack.
•Making network functions in the virtualized media
high-productive.
•Using/deploying flexible and powerful technology for
automated creation of rules for the network devices
needed for the implementation of service function chains
(SFCs) [9].
Some useful explanations are necessary referring to
SFCs: Service Function chaining can define classified list of
network services or service functions (for instance, firewall
load balancer, deep packet inspection) for the passing
packets. SFC is itself an arranged chain of service functions
through which the packets have to pass. It can be difficult to
classify and process packets in a definite order in a network
topology, where a great number of remote devices perform a
certain function. For instance, a packet may have to be
inspected for viruses by DRI before entering the inner net-
work. This packet has to be distributed by a load balancer
beforehand and rerouted towards a certain DPI device. After
the inspection it has to pass through NAT, etc. The existing
models for delivering/deploying network functions have a
lot of problems like dependence on the network topology,
problems with the classification of packets and the need of
certain constant order for packet processing. SFC solves the
problems by creating a frame which looks after the gathering
of definite instances which deploy a certain service in a
common “shell”. This “shell”is a service and it is inde-
pendent from the topology of the network. A controller can
easily manage the network in this way [11].
The SDN controller has to respond to the requirements of
SFCs and use NFV orchestrator’s interface. A program
interface (API) based on intentions (goals, desired results)
has to be used. There has to be determined what virtual
functions to be included, as far as the configuration of the
network itself goes to the second place. This solution
requires furnishing of SDN controller with API. API enables
the NFV orchestrator to create convenient SF chains. In this
case they do not require details like specific protocols and
technologies necessary for the realization of the rules for
traffic rerouting within a specific chain (SFC) [9].
As a final goal, the needs of communication virtual
machines should be transferred to the SDN controller in a
way that certain requirements could be fulfilled. The
requirements satisfy agreements on service level (SLAs) and
cover specified speed of the connection, maximum latency,
variations in packet delays (jitter), price of service, etc. This
is very important particularly for the delivery of cloud ser-
vices. The details concerning this realization have to be
concealed in the SDN controller, as if it is a black box.
A suitable description of communication needs has to be
provided for the purpose. Thus, very intrinsic technologies
become accessible to amateurs who are interested only in the
opportunity to satisfy certain necessities of their businesses
[9]. OPNFV also addresses the development of NFV solu-
tions across other open source environments.
Through system level integration, deployment and test-
ing, OPNFV creates a reference NFV platform, aimed at
accelerating the transformation of enterprise and service
provider networks towards NFV-based architecture.
Already, some of the biggest companies in the IT industry
are collaborating for the development of the OPNFV project.
Members of the project include: the largest telecommuni-
cations and company (AT&T), the largest mobile telecom-
munications company (China Mobile), CISCO, Hewlett
Packard, IBM, Intel, Ericsson, Nokia, Huawei Technologies,
Red Hat, VMWare—a major cloud computing and platform
virtualization software provider, etc. (for the full list of
companies, see [12]). This open industry collaboration
ensures that that the OPNFV standard will bring NFV
infrastructure, suitable for a broader range of practical use
cases for the business. Participation in the OPNFV project is
open to anyone interested.
284 S. Ruseva et al.
4 Conclusion
Open Platform for NFV (OPNFV) is an open source project,
which brings together the work of standards bodies, open
source communities, service providers and commercial
suppliers to deliver a standardized NFV platform for the IT
industry that combines multivendor, interoperable NFV
solutions. OPNFV has a key role in the evolution of NFV
components across different open source ecosystems.
References
1. The SDN, NFV & Network Virtualization Ecosystem. https://
globenewswire.com/news-release/2015/12/10/794548/0/en/The-
SDN-NFV-Network-Virtualization-Ecosystem-2015-2030-SDN-
and-NFV-Investments-will-Grow-at-a-CAGR-of-54-Between-
2015-and-2020-to-Account-for-over-20-Billion-in-Revenue-by-
the-End-.html/. Last accessed 10 Dec 2016
2. Introducing Open Platform for NFV. https://www.opnfv.org/sites/
opnfv/files/pages/files/opnfv_overview_deck_06042015.pdf/. Last
accessed 10 Dec 2016
3. Network Functions Virtualisation—Introductory White Paper.
https://portal.etsi.org/NFV/NFV_White_Paper.pdf,https://portal.
etsi.org/NFV/NFV_White_Paper2.pdf,https://portal.etsi.org/NFV/
NFV_White_Paper3.pdf/. Last accessed 16 Oct 2016
4. NFV and SDN: What’s the Difference? https://www.sdxcentral.
com/articles/contributed/nfv-and-sdn-whats-the-difference/2013/
03/. Last accessed 11 Feb 2016
5. OPNFV Platform Overview. http://artifacts.opnfv.org/opnfvdocs/
colorado/docs/overview/index.html/. Last accessed 31 Dec 2016
6. What is NFV MANO? https://www.sdxcentral.com/resources/nfv/
nfv-mano/. Last accessed 01 Mar 2017
7. Opnfv whitepaper 103014. http://www.slideshare.net/OPNFV/
opnfv-whitepaper-103014/. Last accessed 31 Oct 2016
8. Ceph: The Future of Storage. http://ceph.com/docs/,http://ceph.
com/ceph-storage/object-storage/,http://ceph.com/ceph-storage/
file-system/. Last accessed 12 Dec 2016
9. OpenStack’s Role in an OPNFV Reference Implementation.
https://www.sdxcentral.com/articles/contributed/openstacks-role-
opnfv-reference-implementation/2014/11/. Last accessed 19 Nov 2015
10. OpenStack. http://www.openstack.org/. Last accessed 04 Apr 2017
11. Service Function Chaining—Helium, Lithium and the Way
Forward. http://events.linuxfoundation.org/sites/events/files/slides/
SFC-Helium-Lithium-and-beyond.pdf/. Last accessed 28 Sept
2016
12. Members—OPNFV. https://www.opnfv.org/about/members/. Last
accessed 16 Oct 2016
Open Platform for Network Functions Virtualization …285
Optimizing Turbo Codes for Secret Key
Generation in Vehicular Ad Hoc Networks
Dhouha Kbaier Ben Ismail, Petros Karadimas, Gregory Epiphaniou,
and Haider Al-Khateeb
Abstract
We present an algorithm that allows two users to establish a
symmetric cryptographic key by incorporating the most
important features of the wireless channel in vehicle-to-
vehicle (V2V) communication. Non-reciprocity compen-
sation is combined with turbo codes (TCs) for error
reconciliation purposes. For fair comparisons, the indexing
technique is applied in conjunction with the non-recipro city
compensation technique. A series of simulations are run to
calculate key performance indicators (KPIs). High entropy
values are obtained throughout all rounds of simulation
during the key extraction process. Furthermore, simulation
results indicate a significant improvement in bit mismatch
rate (BMR) and key generation rate (KGR) when TCs are
used. Increasing the number of iterations in the TC can
significantly improve the Bit Error Rate (BER), thus
generating more symmetric keys. The key generation rate
was reported high ranging from 17 to 19 for the 256-bit
symmetric keys per minute with TCs, while it is ranging
from 2 to 5 when compared with a sample indexing
technique published in the public domain. Finally, simu-
lations proved also improvements for different key lengths
as part of the error reconciliation process when TCs are
used with an almost regular permutation (ARP) instead of a
random permutation.
Keywords
Almost regular permutation Bit mismatch rate
Entropy Error reconciliation Key generation
Quantization Scatterers’mobility Thresholding
Turbo codes VANET
1 Introduction
Traditional wireless communications are vulnerable to
man-in-the-middle attacks where certain aspects of confi-
dentiality, integrity, and availability are violated. Conven-
tional cryptographic solutions based predominantly
on-stream ciphers generate shared secrets using
pre-computational techniques or public key cryptography
[1]. Public key cryptography, in particular, has proved to
increase computational complexity during secret key gen-
eration, especially for low-end energy efficient devices [2].
Channel-based key extraction approaches try to exploit the
physical properties of wireless channels such as reciprocity
and temporal/spatial variability in an attempt to provide the
necessary randomness for the symmetric key creation [3,4].
Vehicular ad hoc network (VANET) based applications
are expected to address challenges that current transportation
systems are facing, since they can provide solutions for a
safer, more efficient and sustainable future intelligent trans-
portation systems (ITS). In a typical VANET environment
where access to infrastructure is given (see Fig. 1), the
wireless links between nodes and co-existent adversaries
experience uncorrelated channel attributes. Nodes are also
distributed and self-organized with the majority of wireless
communication carried out by on-board units (OBU) inte-
grated with additional services and processes running [5].
Therefore, these channels in vehicular networks can offer
some level of confidentiality during the key generation
process between parties, which reduce the computational
complexity and relax certain barriers related to key man-
agement requirements.
In this paper, all the essential vehicle-to-vehicle (V2V)
communication characteristics are incorporated in the key
generation process such as three-dimensional (3D) multipath
propagation and surrounding scatterers’mobility (i.e. other
vehicles). We employ the comprehensive parametric
stochastic V2V channel model presented in [6] to syntheti-
cally generate the receiver’s channel response (Bob’s
D. K. B. Ismail (&)G. Epiphaniou H. Al-Khateeb
Faculty of Science and Engineering, University of
Wolverhampton, Wolverhampton, UK
e-mail: d.kbaier@wlv.ac.uk
P. Karadimas
School of Engineering, University of Glasgow,
Glasgow, Scotland, UK
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_33
287
channel), from which the transmitter’s response (Alice’s
channel) arises after applying the non-reciprocity compen-
sation technique presented in [7]. After the necessary
thresholding used to allocate bits according to designated
signal levels, we utilize turbo coding (TC) techniques for
information reconciliation. We focus on several parameters
that affect the performance of TCs such as number of
decoding iterations, generator polynomials, constraint
lengths of the component encoders and the interleaver type.
For fair comparisons, the indexing technique [8] was applied
in conjunction with the non-reciprocity compensation tech-
nique in [7]. Simulations are run, and performance analysis
is carried out. The key generation rate (KGR) and bit mis-
match rate (BMR) are computed in both scenarios.
This paper is organized as follows. Section 2presents an
overview of the most important error correction codes that
can be potentially used in the information reconciliation
stage. Then, the authors present their algorithm and the
adopted V2V channel model in Sect. 3. Furthermore, Sect. 4
deals with information reconciliation using TCs in VANET,
while Sect. 5focuses on the importance of privacy ampli-
fication. A Graphical User Interface (GUI) was designed to
run the developed algorithm. Thus, simulations are run, and
performance analysis is carried out in Sect. 6. Several key
performance indicators (KPIs) are employed. Finally, Sect. 7
draws some conclusions.
2 Error Reconciliation
Error reconciliation is the next step in the secret key gen-
eration process to correct miss-matched information due to
imperfect reciprocity and random noise in the channel. The
bit mismatch rate is defined as the number of bits that do not
match between two devices divided by the total number of
bits extracted prior to error reconciliation and privacy
amplification. Several error reconciliation algorithms have
been introduced with different tradeoffs between communi-
cation and computational complexity, throughput error cor-
rection capabilities (e.g. Cascade [9] and Winnow [10]).
Gallager’s Low Density Parity Check (LDPC) codes have
recently been shown to increase the rate of error reconcili-
ation with computational overhead added as part of their
operation. LDPC can be more efficient than Cascade as they
can become rate adaptive leading to more efficient interac-
tive reconciliation protocols [11,12].
The invention of turbo codes (TCs) [13] was a revival for
the channel coding research community. Historical turbo
Fig. 1 Vehicular networking
architecture
288 D. K. B. Ismail et al.
codes, also sometimes called Parallel Concatenated Convo-
lutional Codes (PCCCs), are based on a parallel concatena-
tion of two Recursive Systematic Convolutional
(RSC) codes separated by an interleaver. They are called
“turbo”in reference to the analogy of their decoding prin-
ciple with the turbo principle of a turbo compressed engine,
which reuses the exhaust gas in order to improve efficiency.
The turbo decoding principle calls for an iterative algorithm
involving two component decoders exchanging information
in order to improve the error correction performance with the
decoding iterations. This iterative decoding principle was
soon applied to other concatenations of codes separated by
interleavers, such as Serial Concatenated Convolutional
Codes (SCCCs) [14,15], sometimes called serial turbo
codes, or concatenation of block codes, also named block
turbo codes [16,17]. The near-capacity performance of turbo
codes and their suitability for practical implementation
explain their adoption in various communication standards.
In [18] the authors proposed utilizing Turbo codes for rec-
onciliation purposes. Further investigation in [19] show that
TCs are good candidates for reconciliation. The efficacy of
TCs with regards to their error correction capabilities in
various wireless communication standards is also recorded
in [20]. Further work in [21] demonstrates the improved
performance of TCs over Reed Solomon and CCs which are
the de facto error correction codes used in 802.11p vehicular
networks. However, this work does not comprehensively
incorporate physical propagation characteristics such as 3D
scattering and scatterers’mobility which is addressed in this
work.
3 Detailed Architectural Design
Figure 2presents the algorithm’s strawman. Starting from
the first step, synthetic data are generated for the purpose of
demonstration by employing the Monte Carlo simulation
method [22,23]. The input parameters of the algorithm are
provided by the inherent physical attributes of the dynamic
V2V propagation channel. Indeed, the comprehensive
parametric stochastic V2V channel model presented in [6]is
adopted. The vehicles are in motion and all are generally
equipped with both Tx and Rx.
Based on that channel model, the receiver’s samp les (Bob’s
channel estimates) are generated. From the received data, the
transmitted data (Alice’s channel estimates) are modeled by
considering the non-reciprocity compensation technique pre-
sented in [7]. At this phase, a lossy quantization process is
preferred due to its computational simplicity. The target is to
end up with a maximum secret bit extraction rate and entropy.
The number of bits that do not match between Alice and Bob to
the number of bits extracted by the quantization process
determines the bit mismatch rate. Turbo decoding is then
performed in order to generate a symmetric output, i.e. sym-
metric keys for Alice and Bob. Performance of the reconcili-
ation method can be evaluated by measuring the BMR and the
Bit Error Rate (BER). For fair comparisons, the indexing
technique was applied in conjunction with the non-reciprocity
compensation technique.
4 Information Reconciliation Using Turbo
Codes in VANET
The invention of turbo codes (TCs) [13] was a revival for the
channel coding research community. The near-capacity
performance of turbo codes and their suitability for practi-
cal implementation explain their adoption in various com-
munication standards as early as the late nineties: firstly, they
were chosen in the telemetry coding standard by the CCSDS
(Consultative Committee for Space Data Systems) [24], and
for the medium to high data rate transmissions in the third
generation mobile communication 3GPP (Third Generation
Partnership Project)/UMTS (Universal Mobile Telecommu-
nications System) standard [25]. They have further been
adopted as part of the Digital Video Broadcast—Return
Channel via Satellite and Terrestrial (DVB-RCS and
DVB-RCT) links [26,27], thus enabling broadband inter-
active satellite and terrestrial services. More recently, they
were also selected for the next generation of
Fig. 2 Detailed architectural design
Optimizing Turbo Codes for Secret Key Generation in Vehicular …289
3GPP2/cdma2000 wireless communication systems [28]as
well as for the IEEE 802.16 standard (WiMAX) [29]
intended for broadband connections over long distances. In
our approach, we use TCs for reconciliation purposes in
VANET environment. In Sect. 6, simulations are run, and
performance analysis is carried out.
5 Privacy Amplification
Masquerading or eliminating information exchanged during
this process is usually defined as privacy amplification [30,
31]. Privacy amplification is used to transform a string which
is only partially secret to a highly secret string usually
shorter. This process is also used to account for any infor-
mation exposed during error reconciliation phase and ensure
that eavesdroppers do not gain significant advantage to the
point where they are able to reconstruct a significant part of
the key. The Winnow protocol discards certain bits during
error reconciliation (privacy maintenance) whereas Cascade,
LDPC, and TCs do not. In Cascade, the binary search must
rerun on previous blocks, whereas for LDPC and TCs only
one pass is necessary so there is no need to discard bits
before the error reconciliation is complete. The number of
bits is tracked and then subtracted from the final key rec-
onciled. The last step in the key generation process assumes
that the information extraction about the shared key used
should be computationally expensive to adversaries. Most of
the existing approaches focus on different threat models and
assumptions around the level of access to the channel.
‘Trapdoor’functions are used as means to assure a certain
level of authentication and integrity in this process. These
functions are also used as a mean to reduce the size of the
final key and amplify any errors if hashing a reasonable copy
of the key is attempted, to a degree that even exhaustive
search of the key space would be infeasible.
6 Simulations Results
The authors have designed a Graphical User Interface
(GUI) to run the developed algorithm. Figure 3illustrates
the main KeyGen simulation with a visualization of the
whole process towards the establishment of symmetric keys.
It also illustrates samples for both Bob and Alice based on
the parametric stochastic model introduced in this work
generating the synthetic data for different scenarios in V2V
communications. The algorithm currently avoids using sta-
tistical measures and it is solely based on the channel fading
process. The parameters are fully customizable from the
tools menu of the software demo. The GUI is not funda-
mental for the core algorithmic operation and can be omitted
in real-life implementations or fabricated products. The
thresholding scheme employed influences the number of
samples discarded from both Alice and Bob. The GUI output
also demonstrates the number of keys established during the
simulation and the total time required generating those keys.
6.1 Key Performance Indicators
First, the probing rate for both Alice and Bob fP¼fPA ¼fPB
are considered the same for the purpose of channel estimates
collection. The core Key Performance Indicators (KPIs) of
interest in our protocol up to this stage are the key generation
rate, the randomness of the generated bits for symmetric
keys and bit mismatch rate (BMR). The entropy is the de
facto metric which quantifies the uncertainty of the gener-
ated bit string. The higher the entropy, the limited the ability
to deduce a secret key established by Eve is. Usually, BMR
is measured as a ratio of the number of bits that do not match
between Alice and Bob to the number of bits extracted at the
thresholding stage.
6.2 Our Methodology
Bob’s generated sequence after quantization is fed to the
input of a TC. During this process, a single threshold is
adopted as a lossless quantization scheme with the potential
to substantial increase the key generation rate [32]. Turbo
decoding is then performed in order to generate a symmetric
output, i.e. symmetric keys for Alice and Bob. Performance
of the reconciliation method can be evaluated by measuring
the BMR and the Bit Error Rate (BER). The comparison is
made against the sample indexing technique already applied
in our algorithm as discussed in Sect. 1. We calculated BMR
by considering the discarded indexes after Alice’s and Bob’s
channel probing. Thus, the BMR is measured as a ratio of
the number of bits that do not match between Alice and Bob
to the number of bits extracted by the adopted quantization
process after appropriate thresholding.
6.3 Simulation Results
In Table 1, we compute also the key generation rate for
different key lengths. TCs are first run with a random per-
mutation and one decoding iteration. Compared to the
samples’indexing method in [8], there was a significant
improvement on both BMR and key generation rate.
The BMR with single thresholding is only 0.02 whereas the
estimated BMR with the indexing technique is around 0.22.
Note that the BMR with the indexing technique is nearly the
same for different key lengths which is coherent with the
uniform method used by authors and algorithm presented in
290 D. K. B. Ismail et al.
[8]. The key generation rate was also reported high consid-
ering different key lengths requested. For instance, the secret
key rate to generate the 256-bit symmetric key is 17 good
keys per minute with TCs while it varies from 2 to 5 sym-
metric keys per minute with the indexing technique.
Then, in Table 2we compute the key generation rate
where TCs are run with an almost regular permutation
(ARP) permutation and several decoding iterations. Indeed,
increasing the number of iterations in the TC can signifi-
cantly improve the BER, thus generating more symmetric
keys. However, a compromise should be found since this
operation is computationally expensive and adds a delay in
the process. We report the BER performance of the TC for
the block size 5000 bits, at coding rate in Fig. 4. Thus, the
total number of samples is 10,000 bits for both Alice and
Bob. For a signal to noise ratio SNR = 0.8 dB, the simulated
BER to generate a symmetric shared key between Alice and
Bob after error reconciliation is estimated to 4:9102for
the 1st iteration using TCs while the BER is 2:5103for
the 4th iteration and only 1:8103for the 8th iteration.
Note that the KGR reaches a limit and remains the same
beyond 4 decoding iterations. In the simulations of Table 2,
the maximum number of turbo decoding iterations is set to 4
iterations. As shown in Table 2, simulations proved also
improvements for different key lengths as part of the error
reconciliation process when TCs are used with an ARP
permutation instead of a random permutation. Finally, high
entropy values were obtained throughout all rounds of
simulation during the key extraction process. Note that the
higher the entropy, the limited the ability to deduce a secret
key established by an adversary such as Eve.
In future studies, we would like to further investigate TCs
for error conciliation purposes. We will focus on other
parameters that affect the performance of TCs such as
component decoding algorithms, generator polynomials and
constraint lengths of the component encoders.
Fig. 3 An implementation of alice’s and bob’s samples
Table 1 Simulation results in
secret key generation Indexing technique Turbo codes
Key length (bits) 128 256 512 128 256 512
BMR 0.22 0.02
Entropy (bits/sample) 0.85–0.97 0.94–0.99
KGR (keys/min) 3–72–51–235 17 8
Table 2 Key generation rate
with ARP permutation and
different decoding iterations
Turbo codes
Key length (bits) 128 256 512
Iteration 1 36 18 9
Iteration 439199
Optimizing Turbo Codes for Secret Key Generation in Vehicular …291
7 Conclusion
We proposed an algorithm considering the most important
features in V2V communication such as 3D multipath
propagation and surrounding scatterers’mobility. Synthetic
data were generated for the purpose of a demonstration by
employing the Monte Carlo simulation method. Simulations
were run successfully by combining non-reciprocity com-
pensation with turbo codes. Increasing the number of itera-
tions in the TC can significantly improve the BER, thus
generating more symmetric keys. Moreover, simulations
proved improvements for different key lengths as part of the
error reconciliation process when TCs are used with an ARP
permutation instead of a random permutation. Compared
with a sample indexing technique in the public domain,
results have shown significant improvements for key gen-
eration rate and bit mismatch rate with high entropy values
obtained throughout all rounds of simulation.
References
1. Robshaw, M.J.B., Billet, O.: New Stream Cipher Designs—The
eSTREAM Finalists, vol. 4986. Series Lecture Notes in Computer
Science. Springer (2008)
2. Jha, N.K., Raghunathan, A., Potlapally, N.R., Ravi, S.: A study of
the energy consumption characteristics of cryptographic algo-
rithms and security protocols. IEEE Trans. Mobile Comput. 5
(undefined), 128–143 (2006)
3. Mukherjee, S.A., Fakoorian, A., Huang, J., Swindlehurst, A.L.:
Principles of physical layer security in multiuser wireless
networks: a survey. CoRR, vol. abs/1011.3754 (2010) [Online].
Available: http://arxiv.org/abs/1011.3754
4. Shehadeh, Y.E.H., Hogrefe, D.: A survey on secret key generation
mechanisms on the physical layer in wireless networks. Sec. Com-
mun. Netw. 8(2), 332–341 (2015, Jan) [Online]. Available: http://
dx.doi.org/10.1002/sec.973
5. Qu, Z., Wu, F., Wang, Y., Cho, W.: A security and privacy review
of vanets. IEEE Trans. Intell. Transp. Syst. 16(6), 2985–2996
(2015)
6. Karadimas, P., Matolak, D.W.: Generic stochastic modeling of
vehicle-to-vehicle wireless channels. Veh. Comm. 1(4), 153–167
(2014) [Online]. Available: http://dx.doi.org/10.1016/j.vehcom.
2014.08.001
7. Liu, H., Wang, Y., Yang, J., Chen, Y.: Fast and practical secret key
extraction by exploiting channel response. INFOCOM. IEEE,
3048–3056 (2013)
8. Mathur, S., Trappe, W., Mandayam, N., Ye, C., Reznik, A.: Secret
Key Extraction from Level Crossings over Unauthenticated
Wireless Channels, pp. 201–230. Springer, US (2010) [Online].
Available: http://dx.doi.org/10.1007/978-1-4419-1385-2_9
9. Brassard, G., Salvail, L.: Secret-Key Reconciliation by Public
Discussion, pp. 410–423. Eurocrypt ‘93. Springer (1993) [Online].
Available: http://citeseer.ist.psu.edu/viewdoc/summary?doi=10.1.
1.42.9686
10. Buttler, W.T., Lamoreaux, S.K., Torgerson, J.R., Nickel, G.H.,
Donahue, C.H., Peterson, C.G.: Fast, efficient error reconciliation
for quantum cryptography. Phys. Rev. A 67, 052303 (2003, May)
[Online]. Available: http://link.aps.org/doi/10.1103/PhysRevA.67.
052303
11. Martınez-Mateo, J., Elkouss, D., Martin, V.: Blind reconciliation.
Q. Inf. Comput. 12(9–10), 791–812, (2012) [Online]. Available:
http://www.rintonpress.com/xxqic12/qic-12-910/0791-0812.pdf
12. Martınez-Mateo, J., Elkouss, D., Martn, V.: Interactive reconcil-
iation with low-density parity-check codes. In: 6th International
Symposium on Turbo Codes Iterative Information Processing,
pp. 270–274 (2010, Sep)
13. Berrou, C., Glavieux, A., Thitimajshima, P.: Near Shannon limit
error-correcting coding and decoding: turbo-codes. In Proceeding
of ICC ‘93, Geneva, Switzerland, vol. 2, pp. 1064–1070 (1993,
May)
14. Benedetto, S., Divsalar, D., Montorsi, G., Pollara, F.: Serial
concatenation of interleaved codes: performance analysis, design,
Fig. 4 BER performance of TC
for a block length of 5000 bits.
All simulations use the BCJR
algorithm with 8 decoding
iterations
292 D. K. B. Ismail et al.
and iterative decoding. IEEE Trans. Inf. Theory 44(3), 909–926
(1998)
15. Benedetto, S., Montorsi, D.: Iterative decoding of serially
concatenated convolutional codes. Electron. Lett. 32(13), 1186–
1188 (1996)
16. Benedetto, S., Montorsi, D.: Serial concatenation of block and
convolutional codes. Electron. Lett. 32(10), 887–888 (1996)
17. Pyndiah, R.M.: Near-optimum decoding of product codes: block
turbo codes. IEEE Trans. Comm. 46(8), 1003–1010 (1998)
18. Nguyen, K., Assche, G.V., Cerf, N.J.: Side-information coding
with turbo codes and its application to quantum key distribution.
CoRR, vol. cs.IT/0406001 (2004) [Online]. Available: http://arxiv.
org/abs/cs.IT/0406001
19. Benletaief, N., Rezig, H., Bouallegue, A.: Toward efficient
quantum key distribution reconciliation. J. Q. Inf. Sci. (2014)
20. Yeo, E., Anantharam, V.: Iterative decoder architectures. IEEE
Commun. Mag. 41(8), 132–140 (2003)
21. Kiokes, G., Economakos, G., Amditis, A., Uzunoglu, N.K.: A
comparative study of IEEE 802.11 p physical layer coding
schemes and FPGA implementation for inter vehicle communica-
tions. Mod. Traffic Transp. Eng. Res. 2(2), 95–102 (2013)
22. Hirschausen, P., Davis, L., Haley D., Lever, K.: Identify key
design parameters for Monte Carlo simulation of Doppler Spread
channels. In: Communications Theory Workshop (AusCTW),
Sydney (2014)
23. Hoecher, P.: A statistical discrete-time model for the WSSUS
multipath channel. IEEE Trans. Veh. Tech. 41(4) (1992)
24. T. Synchronization and C. Coding. Recommendation for Space Data
System Standards. Technical report, CCSDS 131.0-B-1. Blue Book
25. Third Generation Partnership Project (3GPP) Technical Speciation
Group, Multiplexing and channel coding (FDD), TS 25.212,
v2.0.0. (June 1999)
26. DVB, Interaction channel for satellite distribution systems,
ETSI EN 301 790, v. 1.2.2. (2000)
27. DVB, Interaction channel for digital terrestrial television, ETSI EN
301 958, v. 1.1.1. (2001)
28. Third Generation Partnership Project 2 (3GPP2), Physical layer
standard for CDMA 2000 spread spectrum systems, Release D,
3GPP2 C.S0002-D, Version 1.0. (2004, Feb)
29. IEEE standard for local and metropolitan area networks. Part 16:
air interface for xed broadband wireless access systems, IEEE
802.16-2004 (2004, Nov)
30. Shehadeh, Y.E.H., Hogrefe, D.: A survey on secret key generation
mechanisms on the physical layer in wireless networks. Secur.
Comm. Netw. 8(2), 332–341 (2015)
31. Wang, T., Liu, Y., Vasilakos, A.V.: Survey on channel reciprocity
based key establishment techniques for wireless systems. Wireless
Netw. 21(6), 1835–1846 (2015)
32. Azimi-Sadjadi, B., Kiayias, A., Mercado, A., Yener, B.: Robust
key generation from signal envelopes in wireless networks. In:
Proceedings of the 14th ACM Conference on Computer and
Communications Security, pp. 401–410, Series CCS ‘07, New
York, NY, USA. ACM (2007) [Online]. Available: http://doi.acm.
org/10.1145/1315245.1315295
Optimizing Turbo Codes for Secret Key Generation in Vehicular …293
PROBSOL: A Web-Based Application
to Develop Problem-Solving Skills
in Introductory Programming
Sohail I. Malik , Roy Mathew , and Maytham M. Hammood
Abstract
Problem-solving skills are considered as an important part
of learning to program for novice programmers. Different
techniques such as pseudocode and flowchart are used to
develop these skills. In this study, a web-based applica-
tion ‘PROBSOL’was developed and offered to the
novices in an introductory programming course to acquire
problem-solving skills. The PROBSOL application is
based on pseudo-code technique. One of the advantages
of this application for novices is to focus on problem
domain without worrying about the syntax of the
programming language. Practice questions related to all
the topics included in the introductory programming
course were prepared and offered in the application. The
results show a positive impact on the students’learning
outcomes and attrition rate. Students (treatment group)
who used the PROBSOL application show better results
compared to the control group.
Keywords
Problem-solving skills Pseudo code Introductory
programming
1 Introduction
Programming is an important and fundamental skill that
needs to be developed to meet the requirements of an
information society. Programmers are considered to be
builders of the information society. They develop software
applications consumers’use every day, multimedia appli-
cations which provide constant streaming and entertainment
information, and complex systems which perform essential
tasks.
The Bureau of Labor Statistics [1] predicts high demand
for programmers in the employment market in coming years.
To meet the requirements of the market, computer science
(and related disciplines) degree programs emphasise the
programming field by including programming studies in
the first semester of the degree programs. To become a
programmer requires the development of multiple skills
including critical thinking, problem-solving, being detailed-
oriented, as well as learning the syntax and semantics of the
programming language. For novices, to acquire all these
skills is considered a challenging and difficult task. They
have to focus on learning both problem-solving strategies
and the syntax and semantics of the programming language
to acquire these skills.
High failure and drop-out rates from introductory pro-
gramming (IP) courses continue to be of significant concern
to computer science disciplines despite extensive research
attempting to address the issue [2–7]. Researchers have
identified that novice programmers spend more time trying
to understand programming language syntax and semantics
(programming knowledge) [8] rather than paying attention to
planning the problem (problem-solving strategies) [8–12].
Koulouriet [13] argued that ‘teaching problem solving
before programming yielded significant improvements in
student performance’(p. 1).
In this study, a web-based application ‘PROBSOL’was
developed and offered to the novices in an introductory
programming course to acquire problem-solving skills.
The PROBSOL application is based on pseudo-code tech-
nique. One of the advantages of this application for novices
is to focus on problem domain without worrying about the
syntax of the programming language.
This paper is divided into a number of sections. It starts
with a review of the literature, followed by a brief intro-
duction to the PROBSOL application. The methodology
S. I. Malik (&)R. Mathew M. M. Hammood
Buraimi University College, Al-Buraimi, Oman
e-mail: Sohail@buc.edu.om
R. Mathew
e-mail: Roy@buc.edu.om
M. M. Hammood
Computer Science Department, Tikrit University, Tikrit, Iraq
e-mail: Maytham@buc.edu.om
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_34
295
used for this study is then described, and research results are
reported and discussed. The paper concludes with a sum-
mary of the outcomes.
2 Literature Review
De Raadt [8]defines problem-solving as ‘A mechanism for
achieving a solution to a programming problem’(p. ix). This
definition is also applicable in our context. It is commonly
accepted that teaching problem-solving techniques is not an
easy task [14]. Additionally, different researchers have
shown that students in IP courses do not concentrate on
developing problem-solving skills and instead spend more
time on coding the programming problems [15].
The ACM-IEEE Joint Task Force on Computing Cur-
ricula [16] provides guidelines for computing undergraduate
programs. The latest revision, Computer Science Curricula
2013 (CS2013), provides comprehensive guidance on cur-
ricular structure and development in a variety of educational
contexts [16]. The CS2013 body of knowledge is organised
into 18 knowledge areas (KA). The most important pro-
gramming related KAs include Programming Languages
(PL), Software Development Fundamentals (SDF), Algo-
rithms and Complexity (AL) and Software Engineering
(SE). Computer programming concepts and skills topics are
introduced in these KAs for introductory and advanced
computer science programming courses. Software Devel-
opment Fundamentals (SDF) is a newly introduced KA in
CS2013. It focuses on the entire software development
process in introductory programming. Due to its broad
spectrum, it includes KAs which could be included in other
software-oriented KAs [e.g. programming constructs and
problem-solving (PL), development methodologies (SE),
and algorithm analysis (AL)]. SDF provides basic concepts,
and those KAs cover advanced topics in the above-
mentioned areas. Computer programming knowledge (syn-
tax and semantics) and problem-solving strategies are given
equal attention in these KAs. Problem-solving skills are also
included as one of the characteristics of computer science
graduates which means that graduates should know how to
identify and design solutions to real world problems instead
of just writing code [16]. The Australian Computer Society
[17] also suggested emphasising both problem-solving
strategies and programming knowledge in the teaching and
learning of programming languages.
De Raadt [18] reviewed forty textbooks prescribed to
students in introductory programming. Problem-solving
topics were covered in varying degrees in the analysed
books. De Raadt [18] mention that only six books out of
forty investigated integrated problem-solving aspects
throughout, implying that most of the analysed books
focused only on language syntax. Some authors provide a
large number of examples and put less emphasis on
problem-solving instructions. Some books cover
problem-solving topics in early chapters, but they are not
integrated into the remainder of the book. There are a small
number of books where problem-solving is integrated
throughout the books using case studies and examples [18].
Winslow [19] discussed problem-solving learning pro-
cesses for students. He emphasised that, for novices,
understanding programming language syntax, semantics and
problem-solving skills are equally important. He divided
program problem solving into four steps:
(1) ‘Understand the problem
(2) Determine how to solve the problem:
(a) in some form, and
(b) in computer compatible form
Note that novices have trouble going from ‘a’to
‘b’
(3) Translate the solution into computer language program,
and
(4) Test and debug the program’(p. 19).
Soloway [20] suggested Goals and Plans as a
problem-solving strategy for analysing problems and con-
structing programs. ‘With a given problem, the process
begins with the instructor determining the goals that need to
be achieved to solve the problem. These goals are then
mapped to plan’(p. 26) [8].
Hyde [21] developed the Problem Solving Process
(PSP) for an introductory programming course which pro-
moted problem-solving skills in students. PSP consists of the
steps shown in Fig. 1. It is clear that PSP requires students to
finish four steps before typing the program on the computer.
The PSP promotes problem-solving skills in students.
Koulouriet [13] conducted a study in an introductory
programming course to determine the benefits of problem-
solving training before programming. They compared the
performance of two groups of students with and without
problem-solving training. They revealed that students pro-
vided with problem-solving training performed better than
those without problem-solving training. They discussed a
possible explanation was that novice programmers start
working with syntax and semantics of the language without
considering or analysing the problem statement. The
problem-solving training helps students to understand and
interpret the problem in terms of devising a programming
solution, which they can then translate into lines of code.
This argument is also supported by [22].
Different tools have been developed to teach the
problem-solving skills to the novices in an introductory
programming course. Malik [23] developed the ADRI editor
296 S. I. Malik et al.
based on the four stages of the ADRI approach and offered
in an introductory programming course. The editor offers
pseudo-code and flowchart techniques to develop the
problem-solving skills. Novices have to write the
pseudo-code for a given problem statement. The editor does
not support any feature to identify errors or provide the
correct solution for the given problem statement. Oda [24]
proposed a method to automatically generate a pseudo-code
from a source code by using the statistical machine trans-
lation (SMT) framework. Taheri [25] discussed that pro-
granimate is a web-based environment which uses
flowcharts to find solutions for basic programming problems
for novices.
3 Research Question
The study focuses on determining the impact of the
PROBSOL application on students learning process in the
introductory programming course.
The research question being addressed in this study is:
What is the impact of the PROBSOL application on the students
learning outcomes in the introductory programming course?
The research question is explored in Sect. 6.
4 Introduction to the PROBSOL Application
The PROBSOL is a web-based application based on the
pseudo-code technique. The application can be used to
develop problem-solving skills to the novice programmers in
introductory programming. Figure 2shows the main page of
the PROBSOL application.
Practice questions related to all the topics included in the
introductory programming course were prepared and offered
in the application. Figure 3depicts when a user selects a
question related to topic 1 in the IP course. A problem
statement is shown for each question.
The application uses three list boxes (Random steps,
Right Steps and Solution). The Random steps list box shows
all the pseudo-code steps solution for a given problem
statement in a random manner. The user selects the steps in
the Random steps list box one by one and moves it to the
Right Steps list box by clicking Right arrow button as shown
in Fig. 4. The solution list box (depicted in Fig. 5) shows the
correct pseudo-code solution for a given problem statement.
When the user clicks the ‘Check Solution Button’, and
the answer is incorrect, the lines or steps containing errors
are displayed in Right Steps list box with red colour, indi-
cating that those lines are there with mistakes (depicted in
Fig. 5). Those lines of codes with red colour are not placed
in its correct position, and the order is wrong in Right Steps
list box. The Solution list box shows the correct solution of
the question with its proper intended order. It also evaluates
your solution, and the number of lines with mistakes are
shown with its calculated number of Errors (e.g., Error
No. 3) under the Wrong Answer part which is displayed
between Right Steps and Solution list boxes.
Different warning and error messages are displayed in the
application for example when the user clicks Right Arrow
Button without selecting any option from the Random Step
list box, or the user clicks Right Arrow Button when the
Random Step list box is empty.
5 Methodology
The research question was explored by comparing the final
grades of students over two semesters to determine the impact
of the PROBSOL application on the students’achievements.
The application was offered to the students of the IP course in
the semester 2, 2016–17. Students’grades were compared with
the previous semester (semester 1, 2016–17) to determine the
impact of the application if any of the students’achievements.
The grades were compared based on the criteria described in
Table 1. Students were divided into three categories, high,
medium and low achievers based on their marks. More infor-
mation about the three categories is provided in Sect. 6.
Gather Data for Program
Final Document
Problem Analysis
Algorithm Development
Translate to Computer Program
Type in Program on computer
Verify Program
Solve the program
Problem Formulation
Fig. 1 Problem solving process (PSP) Hyde [21]
PROBSOL: A Web-Based Application to Develop Problem-Solving …297
Fig. 2 Main page of the PROBSOL application
Fig. 3 The PROBSOL application with selected question
298 S. I. Malik et al.
Data collection was performed after obtaining ethical
approval from Buraimi University College. Students’grades
were collected after the de-identification process performed by
the Registration department at Buraimi University College.
6 Results and Discussion
The grades of students who finished the IP course after
introducing the PROBSOL application were compared with
the previous semester grades. The purpose is to determine
the impact of the application on the students’achievements.
Students’grades were analysed following the three cat-
egories proposed by [26]. Table 1depicts the three
categories.
Malik et al. [26] allocated students into three categories
(high, medium and low achievers) based on their marks.
Students who obtain marks in between 50 and 64 are con-
sidered a slow achievers; those in between 65 and 84 are
medium achievers, where students in between 85 to 100 are
considered as high achievers.
Figure 6shows the comparison of students’grades in the
IP course.
The PROBSOL application provides a small, but positive
improvement in the high achiever category, with 12% of the
students who passed the course with the PROBSOL appli-
cation in this category compared with 11% for the traditional
approach. The medium achiever category shows an increase
of 3%; 49% of the students reached the medium achiever
category compared with 52% for the PROBSOL application.
There is a small positive improvement in the low achiever
category of 1%; 23% of students with the PROBSOL
application compared with 22% for the traditional approach.
The failure rate with the PROBSOL application semester is
6% compared with the 8% for the traditional approach
semester, a reduction of 2%. Likewise, the dropout rate (those
students who do not complete the course) with the PROB-
SOL application semester is 7% compared with the 10% for
the traditional approach semester, and it is reduced by 3%.
This result is consistent with previous findings of [27].
Overall, the PROBSOL application provides a positive
impact on the teaching and learning process of the IP course.
It emphasises students to avoid programming shortcut
(Problem Statement !Codes) and follows proper pro-
gramming process (Problem Statement !Solution plans
Codes). It also provides an opportunity to the students to
focus only on the solution for the given problem statement
without much worry about the syntax of the programming
language. Moreover, it emphasizes students to pay equal
attention to the problem solving strategies besides the syntax
and semantics of the programming language. This argument
is supported by [28–31].
The design of the PROBSOL application is simple and
user-friendly which also facilitates the learning process.
Fig. 4 The PROBSOL application with intermediated solution
PROBSOL: A Web-Based Application to Develop Problem-Solving …299
Students only need to select appropriate steps in the given
solution and click the appropriate button to move the step
from one list box to another. This simple process helps the
students to focus more on the solution of the given problem
statement instead of commands. Moreover, the PROBSOL
application is web-based which also facilitates student atti-
tudes towards learning. Paramasivam [32] concluded that
computers in instruction process improve student attitude
towards learning. Moreover, female students in computer
science department perceived web as the easiest area of
study [33]. Eldow [34] also suggested to use E-learning
methods in the teaching process.
Practice questions related to all the topics in the IP course
are embedded in the application which facilitates the learn-
ing process. The questions are categorised based on the
teaching topics of the course. Students can choose questions
by topic.
The result demonstrates that the PROBSOL application
engages students in understanding the programming con-
cepts. Students performed better in all the high, medium and
low achievers categories. The application also promotes
deep-learning among students while solving the given
problem statement. Moreover, the application provides the
more detail-oriented experience of the programming domain.
The failure rate was reduced for the semester offered with
the PROBSOL application compared to the semester offered
with the traditional approach. The application develops
students’interest in the course by providing them a clear
picture of the programming domain. Ultimately, this trend
will help students’enrolment and retention in the computer
Fig. 5 The PROBSOL application with three list boxes
Table 1 Three categories of
students Category Mark range
High achiever 85–100
Medium achiever 65–84
Low achiever 50–64
Adapted from Malik and Coldwell-Neilson [26]
300 S. I. Malik et al.
science field. This result is consistent with previous findings
of [31].
The dropout rate was reduced also for the semester
offered with the PROBSOL application compared with the
previous semester offered without the PROBSOL applica-
tion. The PROBSOL application helps students to develop
their programming logic from the beginning of the semester
which ultimately develop their confidence and interest in the
learning process.
7 Conclusion
The PROBSOL application was introduced in the introduc-
tory programming course for students to acquire
problem-solving skills. The application is based on
pseudo-code technique. The application is web-based, easy
to access and use. The application includes a number of
questions related to all the topics in the course.
The PROBSOL application provides a positive impact on
the teaching and learning process of the IP course. The
students performed better in the high, medium and low
achievers categories. Moreover, the attrition rates (failure
and dropout) were improved in the semester which was
offered with the PROBSOL application compared with the
previous semester which was offered with the traditional
approach.
The PROBSOL application engages students in under-
standing the programming concepts. It promotes deep-
learning and discourages programming shortcut (Problem
Statement !Codes). It also encourages students to follow
proper programming process (Problem Statement !Solu-
tion plans !Codes).
References
1. Bureau of Labor Statistics, U.S. Department of Labor. Occupa-
tional Outlook Handbook, 2014–15 Edition, Computer
Programmers. http://www.bls.gov/ooh/computer-and-information-
technology/computer-programmers.htm. Last accessed 28 Aug
2015
2. Guzdial, M., Soloway, E.: Log on education: teaching the
Nintendo generation to program. Commun. ACM 45(4), 17–21
(2002)
3. Lahtinen, E., Ala-Mutka, K., Järvinen, H.M.: A study of the
difficulties of novice programmers. ACM SIGCSE Bull. 37(3), 14–
18 (2005)
4. Sykes, E.R.: Determining the effectiveness of the 3D Alice
programming environment at the computer science I level. J. Edu.
Comput. Res. 36(2), 223–244 (2007)
5. Yadin, A.: Reducing the dropout rates in an introductory
programming course. ACM Inroads 2(4), 71–76 (2011)
6. Watson, C., Li, F.W.B.: Failure rates in introductory programming
revisited. In: Proceedings of ITiCSE, ACM, Uppsala, Sweden
(2014)
7. Zingaro, D.: Examing interest and grades in computer science 1: a
study of pedagogy and achievement goals. Trans. Comput. Edu. 15
(3). ACM (2015)
8. De Raadt, M.: Teaching programming strategies explicitly to
novice programmers’. Ph.D. thesis, University of Southern
Queensland, Australia. Retrieved June 2013, USQ ePrints (2008)
9. Webster, M.: Overview of Programming and Problem Solving,
Merriam-Webster’s Collegiate Dictionary, 10th edn. Retrieved on
15 July 2013, http://computerscience.jbpub.com/vbnet/pdfs/
mcmillan01.pdf (1994)
10. Kölling, M., Rosenberg, J.: BlueJ—a language for teaching
object-oriented programming. In: Proceedings of the 27th SIGCSE
11%
49%
22%
8% 10%
12%
52%
23%
6%
7%
0%
10%
20%
30%
40%
50%
60%
High Achiever Medium
Achiever
Low Achiever Fail Dropout
Percentage
Students
Sem 1, 2016-17 (TradiƟonal Approach)
Sem 2, 2016-17 (PROBSOL applicaƟon)
Fig. 6 Impact of the PROBSOL
application on students’
achievements
PROBSOL: A Web-Based Application to Develop Problem-Solving …301
Technical Symposium on Computer Science Education, pp. 190–
194. St. Louis, MO, USA (1996)
11. Ala-Mutka, K.: Problems in learning and teaching programming—
a literature study for developing visualizations in the
codewitz-minerva project. Codewitz Needs Anal. Retrieved 20
Dec 2013, http://www.cs.tut.fi/*edge/literature_study.pdf (2004)
12. Iqbal, S., Harsh, O.K.: A self review and external review model for
teaching and assessing novice programmers. Int. J. Inf. Edu.
Technol. 3(2), 120–123 (2013)
13. Koulouri, T., Lauria, S., Macredie, R.D.: Teaching introductory
programming: a quantitative evaluation of different approaches.
Trans. Comput. Edu. 14(4). ACM (2015)
14. Allan, V.H., Kolesar, M.V.: Teaching computer science: a problem
solving approach that works. SIGCUE outlook, ACM 25(1–2), 2–
10 (1997)
15. Yoo, J., Yoo, S., Seo, S., Dong, Z., Pettey, C.: Can we teach
algorithm development skills?. In: Proceedings of the 50th Annual
Southeast Regional Conference, pp. 101–105, ACM, New York
(2012)
16. ACM-IEEE Joint Task Force on Computing Curricula: Computer
Science Curricula 2013, ACM Press and IEEE Computer Society
press. http://dx.doi.org/10.1145/2534860 (2013)
17. Australian Computer Society: The ICT Profession Body of
Knowledge. Retrieved 25 Sep 2015, https://acs.org.au/__data/
assets/pdf_file/0013/24502/The-ICT-Profession-Body-of-
Knowledge-23-Sept-2013.pdf (2013)
18. De Raadt, M., Toleman, M., Watson, R.: Textbooks Under
Inspection, University of Southern Queensland, Australia.
Retrieved May 2013, http://eprints.usq.edu.au/167/1/TechReport_
Draft_10.pdf (2005)
19. Winslow, L.E.: Programming pedagogy—a psychological over-
view. ACM SIGCSE Bull. 28(3), 17–22 (1996)
20. Soloway, E.: Learning to program = learning to construct mech-
anisms and explanations. Commun. ACM 29(9), 850–858 (1986)
21. Hyde, D.C., Gay, B.D., Utter, D.: The integration of a problem
solving process in the first course. In: Proceedings of the
Tenth SIGCSE Technical Symposium on Computer Science
Education, pp. 54–59, ACM, (1979)
22. Malik, I.S., Coldwell-Neilson, Jo.: A model for teaching an
introductory programming course using ADRI. Edu. Inf. Technol.
Springer, https://doi.org/10.1007/s10639-016-9474-0 (2017)
23. Malik, I.S.: Enhancing practice and achievement in introductory
programming using an ADRI editor. In: Proceedings of the IEEE
International Conference on Teaching, Assessment and Learning
for Engineering, pp. 32–39, IEEE, Thailand, 7–9 December,
https://doi.org/10.1109/tale.2016.7851766 (2016)
24. Oda, Y., Fudaba, H., Neubig, G., Hata, H., Sakti, S., Toda, T.,
Nakamura, S.: Learning to generate pseudo-code from source code
using statistical machine translation. In: Proceedings of 30th
IEEE/ACM International Conference on Automated Software
Engineering (ASE), USA, https://doi.org/10.1109/ase.2015.36
(2015)
25. Taheri, S.M., Sasaki, M., Ngetha, H.N.: Evaluating the effective-
ness of problem solving techniques and tools in programming. In:
Proceedings of Science and Information Conference (SAI) IEEE,
https://doi.org/10.1109/sai.2015.7237253.uk (2015)
26. Malik, I.S., Coldwell-Neilson, J.: Impact of a new teaching and
learning approach in an introductory programming course. J. Edu.
Comput. Res. 55(6), 789–819. Sage https://doi.org/10.1177/
0735633116685852 (2017)
27. Malik, I.S., Coldwell-Neilson, J.: Comparison of traditional and
ADRI based teaching approaches in an introductory programming
course. J. Inf. Technol. Edu. Res. 16, 267–283. http://www.
informingscience.org/Publications/3793 (2017)
28. Malik, I.S.: Improvements in Introductory Programming Course:
Action Research Insights and Outcomes. Syst. Pract. Action Res.
Springer, https://doi.org/10.1007/s11213-018-9446-y (2018)
29. Malik, I.S., Mathew, R., Chowdhury, M.U., Coldwell-Neilson, J.:
Impact of assurance of learning (AOL) in programming course for
novices. In: Proceedings of 2nd BCS the Chartered Institute for IT
International Conference, BCS Learning and Development, United
Arab Emirates (2014)
30. Malik, I.S., Coldwell-Neilson, J.: Gender differences in an
introductory programming course: new teaching approach, stu-
dents’learning outcomes, and perceptions. Edu. Inf. Technol.
Springer, https://doi.org/10.1007/s10639-018-9725-3 (2018)
31. Malik, I.S.: Role of ADRI model in teaching and assessing novice
programmers. Ph.D. thesis, Deakin University, http://hdl.handle.
net/10536/DRO/DU:30088862 (2016)
32. Paramasivam, G., Manohar, J., Malik, I.S.: Bringing technology
into the classroom: receptivity and satisfaction level of faculty
members using smart board—an experimental study. In: Proceed-
ings of International Conference on Applied Information and
Communication Technology, Oman (2014)
33. Malik, I.S., Al-Emran, M.: Social factors influence on career
choices for female computer science students. Int. J. Emerg.
Technol. Learn. 13(5), 56–70 (2018)
34. Eldow, A., Shakir, M., Abdullah, M.Y., Iqbal, S.: Using Informa-
tion communication technology as a teaching tool in Sudanese
Governmental Universities of Khartoum State. Int. J. Inf. Visual. 1
(4), 150–156
302 S. I. Malik et al.
Process Mining of Event Logs from Horde
Helpdesk
Radim Dolak and Josef Botlik
Abstract
One of the most important goals of process mining is the
ability to extract information from event logs. The main
purpose of this paper is to describe the possibility of using
process mining in helpdesk systems. We can use process
mining for example for performance managing and
optimize of the most important helpdesk processes from
existing event logs that are stored in helpdesk systems.
The case study deals with using Disco software tool for
process mining of helpdesk event logs in Horde. There
will be described processes such as acquisition, preparing,
importing and process mining of data from the event log
in Horde helpdesk system. Disco software tool will be
used for automatic discovery of process model map with
detailed information about events, activities, cases, and
resources in helpdesk system.
Keywords
Process mining Event logs Helpdesk
Horde Disco
1 Introduction
There are many helpdesk systems that store the information
about events in the log files. Basic process mining tech-
niques are used for extracting event logs from data sources
such as information systems databases, transaction logs, web
pages, excel files, results of information process audits etc.
We will discuss the issue of analyzing event logs from
Horde helpdesk system. Horde helpdesk system is imple-
mented at our Institute of Information Technology at School
of Business Administration in Karvina.
The structure of this paper is divided into the following
chapters: Process mining, Process mining software, Help-
desk systems, Case study: Process mining of event logs from
Horde helpdesk system and finally Conclusion.
2 Process Mining
We can read much information about process mining in
books and scientific articles written by professor van der
Aalst and his research team. Process mining should be
defined as a relatively young research discipline that sits
between computational intelligence and data mining on the
one hand, and process modeling and analysis on the other
hand [1]. The process mining spectrum is quite broad and
extends far beyond process discovery and conformance
checking. Process mining objectives are overlapping with
those of other approaches, methodologies, principles,
methods, tools, and paradigms [2]. The main idea of process
mining is to discover, monitor and improve real processes
by extracting knowledge from event logs [3].
The starting point for process mining is an event log and
all process mining techniques assume that it is possible to
sequentially record events such that each event refers to an
activity and is related to a particular case [4]. Process Mining
Manifesto [5] deals with very important aspects such as
process discovery, conformance checking, social network or
organizational mining, construction of simulation models
with the possibility of model extension and repair. Process
mining is very useful for its ability to find out how proce-
dures in real situations work and for comparing the actual
process with some predefined process [6].
R. Dolak (&)J. Botlik
Department of Informatics and Mathematics, School of Business
Administration in Karvina, Silesian University in Opava, Karvina,
Czech Republic
e-mail: dolak@opf.slu.cz
J. Botlik
e-mail: botlik@opf.slu.cz
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_35
303
3 Process Mining Software
We can find some process mining software tools in both
categories: open source or commercial. There is best known
and famous open source framework called ProM. ProM has
been developed at the Eindhoven University of Technology
by a team of professor van der Aalst. The biggest benefitof
ProM is its extensible framework that supports a wide
variety of process mining techniques in the form of plugins.
We can use plugins for mining, export plugins, import,
analysis or conversion. It is possible to download ProM
software together with many different plugins both free of
charge. ProM platform is independent of the operating sys-
tem and it is implemented in Java [7]. The most downloaded
and interesting plugins are mining and analysis plugins [8].
The functionality of ProM is according to Aalst [1]
unprecedented and there is no product offering a comparable
set of process mining algorithms. It is possible to use in
ProM 6, for example, these process mining algorithms such
as alpha miner, heuristic miner, genetic miner, fuzzy miner,
social network miner etc.
There are also commercial process mining tools such as
Disco by Fluxicon, ARIS Process Performance Manager,
Interstage Automated Process Discovery by Fujitsu etc. The
best known commercial process mining tools are Disco
mining software developed by Fluxicon. Disco by Fluxicon
is a very user-friendly tool which is characterized by very
fast process mining algorithms, tools for efficient log man-
agement and also a filtering framework. Disco process
mining tool simply works and it is able to works with large
event logs and complex models. Disco provides according to
official website [9] useful functionality for optimizing per-
formance, control deviations, or explore variations such as
automated process discovery, process map animation,
detailed statistics, cases, filters, import, and export. The core
functionality of process mining tools is the automated dis-
covery of process maps from the imported event logs. It is a
big advantage for beginners that Disco provides an intu-
itively understandable way of process map visualization in
the discovering the main paths of the process flows in the
form of coloring and thickness of paths [10].
4 Helpdesk Systems
We can consider helpdesk systems as a comprehensive system
for users that offers the opportunity to create a technical task to
IT department specialist, to ask questions or to communicate
ICT problems and achieve timely, relevant and accurate
advice and guidelines from IT department. Tasks are also
called tickets and are usually divided into ques/modules. Each
module has usually its own controller, which is responsible for
forwarding the query to the person who will solve it. Simply
stated, the goal of most help desk operations is to provide
clients with a single point of contact for the information
request, IT services, and a problem resolution [11]. Helpdesk
is a single point of contact within a company for
technology-related questions and incidents [12]. Proactivity is
very important in helpdesk processes for many years. Proac-
tivity in a user support department takes many forms. One of
the most common of these is a regular study of user problems
encountered with a view to preventing them in future. Another
is the creation of an inventory of user equipment to help with
diagnosing and solving problems the user may have [13].
Horde Helpdesk System
Institute of Information Technology at School of Business
Administration in Karvina has implemented Horde helpdesk
system a few years ago. Horde Groupware is a free, enter-
prise ready, browser based collaboration suite. Users can
manage and share calendars, contacts, tasks, notes, files, and
bookmarks with the standards compliant components from
the Horde Project [14]. There is implemented inside Horde
system ticket-tracking application called Whups. It is very
flexible in design and can be used for help-desk requests,
tracking software development, and anything else that needs
to track a set of requests and their status [15]. Currently,
Whups supports the following features [16]:
•Support for multiple “Queues”(aka Projects)
•Custom ticket types, states, priorities, attributes per
Queue
•Create, update, assign, close tickets
•Search for tickets matching specific criteria
•A complex query building for building and
saving/storing custom searches
•Guest access (in addition to login access)
•E-mail notification of changes to tickets
•Ticket creation and updating through e-mail messages
•Permissions support.
Help Desk service for users at School of Business
Administration in Karvina is a part of university email sys-
tem [17]. The tasks are created in the section called “tickets”
in the main menu. Tasks are divided into modules provides
routing query and faster processing. Users are informed by
e-mail about the state of a solution of their tasks. There are
the following task ques:
•opf_HW
•opf_blocking classrooms
•opf_administration staff
•opf_others
304 R. Dolak and J. Botlik
•opf_IS stag
•opf_eLearning
•opf_WWW and thesis topics
•opf_IS iskam.
5 Case Study: Process Mining of Event Logs
from Horde Helpdesk System
We will discuss the issue of process mining of event logs
from Horde helpdesk system using Disco software tool in
this case study. The basic information about Horde helpdesk
system at Institute of Information Technology at School of
Business Administration in Karvina was mentioned in the
previous chapter.
5.1 Preparing Data from Events Log
We have obtained events log from Horde helpdesk system.
This ticketing system is implemented at our faculty IT
department. There is the final statistics about events log from
Horde helpdesk ticketing system during all year 2015: 1734
events, 523 cases, 12 different activities, 8 different ques for
tickets, 110 different users of helpdesk system and 6 IT
specialist solving users tickets.
We can see an example of events log from Horde help-
desk which is available in a module called “Tickets”and the
option “Search”as standard displayed the web page. We can
select multiple items of displayed tickets such as no
assigned, assigned, solved, canceled. It is possible to save
results as HTML or CSV file (Table 1).
It is possible to click on “id”and we will see more details
about the ticket in the form of a web page with timestamps,
comments, actual states etc. It was necessary to match
according to ID both data sources. There is following
structure of columns for transformed events log:
•ID
•State
•Type
•Priority
•Queue
•User
•Owners
•Activity
•Timestamp
•Summary.
We can see an example of events log after data trans-
formation for one helpdesk user solving eLearning problem
with error copying, non-existent courses in the following
Table 2called Transformed events log.
There are the following basic activities (processes) in help
desk system:
•created
•add the requirement
•change queue
•assigned
•reassigning
•removed assignment
•question
•answer
•comment
•solved
•unresolved
•cancelled.
We can see the minimum requirements for importing
events log to Disco tool for example in Disco User’s Guide
[18]. There are necessary at least three elements in events log
for providing process mining analysis in Disco: Timestamp,
Case ID, and Activity. We can also use other elements such
as for example resources, costs, state, priority etc. We can
see columns of transformed events log for importing process
into Disco process mining tool on the left side of bullet item
list and the right side is representing columns in Disco.
•ID = Case ID in Disco
•Owners = Resource in Disco
Table 1 Default events log
Id Summary State Type Priority Queue Requester Owners Created Updated Assigned Due Resolved
51 Error copying,
non-existent courses
Solved Standard Basic opf_eLearning user xy Robert 13.2.2015
10:27
13.2.2015
11:05
13.2.2015
10:46
N/A 13.2.2015
11:05
…… … … … … … … … … … … …
64 Blocking Solved Standard Basic opf_blocking
classrooms
user xy John 19.2.2015
8:25
19.2.2015
10:59:51
19.2.2015
10:59:51
N/A 19.2.2015
10:59:51
…… … … … … … … … … … … …
85 PC repair Solved Standard Basic opf_HW user xy John 24.2.2015
17:27
25.2.2015
7:46
25.2.2015
7:46
25.2.2015
7:46
Process Mining of Event Logs from Horde Helpdesk 305
•Activity = Activity in Disco
•Timestamp = Timestamp in Disco.
There are also other columns in transformed events log
that can be analyzed in Disco as other elements. All other
elements can be filtered and used for detailed analysis. There
are the following other columns in transformed events log:
•state
•type
•priority
•queue
•user
•summary.
5.2 Process Mining Analysis in Disco
Process mining analysis in Disco consists of tools for rep-
resenting process model map, activity event classes, events
over time, an overview of using resource and tasks queues.
There will be providing analysis of events log from Horde
helpdesk ticketing system with the total amount of 523 cases
with 1734 events which were generated by during the year
2015 in our case study.
Process model map. Process model map is in Disco
process mining tool is interactive so it is possible to make
basic or deeper process model map. We can see only the
most frequent paths in the flow but it is also possible to
change the level of detail by using the interactive setting in
the software (setting detail of paths in percent). We can see
also a different number of activities (setting detail of activ-
ities in percent). Disco supports also the easy creation of
animations for visualizing analyzed processes. We can use
animations for finding out some spot bottlenecks, errors etc.
The following Fig. 1shows the discovered process model
map for the absolute frequency of cases.
We can check according to the process model map that it
was created 523 tickets and 497 were solved, were 25 can-
celed and only 1 was unresolved. All 523 created tickets
were assigned to their owners (IT department specialist).
There are additional processes such as questions, answers,
comments, changing queues, reassigning, adding the
requirements or removing assignment. We can now imagine
how processes in helpdesk system work but for better
analysis about efficiency and performance is necessary to
changed filters and used mean, median, maximum and
minimum duration for analysis of the most important
activities related to Horde helpdesk system.
We can see in the following Fig. 2that median duration
between “creating ticket”and “assigning the ticket to owner”
is 39.9 min. This is not so bad result and we can compare
this median duration with a mean duration which is 8.8 h
and we can investigate the longest inactivity from duration
between “creating ticket”and “assigning the ticket to owner”
which was 12 days (Fig. 3). We can get detailed statistics
about paths between two processes by clicking on appro-
priate path. It is possible to discover, for example, that
between processes “assigned”and “solved”is mean duration
66.8 h and maximum duration 15 weeks (Fig. 3).
We can see the maximum duration of all observed
helpdesk activities in the following Fig. 3. All too long times
between processes are highlighted in red thick line (“as-
signed”!“solved”15 weeks, “assigned”!“cancelled”
57.1 days, “assigned”!“unresolved”16.5 weeks, “as-
signed”!“comment”81.9 days and “com-
ment”!“solved”57 days. If we compared this maximum
times (Fig. 3) with median duration (Fig. 2) so we will see
that there is no systemic problem but there is the only
problem with individual examples that were complicated to
solve.
Activity event classes. Activities are divided into 12
groups. We can see that activity called “created”has fre-
quency 523 and activity “assigned”has also 523 so every
created task was assigned to the owner for IT department to
Table 2 Transformed events log
ID State Type Priority Queue User Owners Activity Timestamp Summary
51 Solved Standard Basic opf_eLearning user
xy
Robert Created 13.2.2015
10:27
Error copying, non-existent
courses
51 Solved Standard Basic opf_eLearning user
xy
Robert Assigned 13.2.2015
10:46
Error copying, non-existent
courses
51 Solved Standard Basic opf_eLearning user
xy
Robert Comment 13.2.2015
10:53
Error copying, non-existent
courses
51 Solved Standard Basic opf_eLearning user
xy
Robert Comment 13.2.2015
10:57
Error copying, non-existent
courses
51 Solved Standard Basic opf_eLearning user
xy
Robert Solved 13.2.2015
11:05
Error copying, non-existent
courses
306 R. Dolak and J. Botlik
Fig. 1 Process model map with absolute frequency of cases. Source Own analysis in Disco
Fig. 2 Median duration of helpdesk activities. Source Own analysis in Disco
Process Mining of Event Logs from Horde Helpdesk 307
solve it. It was solved a total amount of 497 tasks, canceled
was 25 tasks and only 1 was unresolved.
During the solving task was written 140 comments by IT
department to users that have created their tasks to be solved.
Some tasks were more complicated and it was necessary to
ask questions from IT department to users. There were 10
cases with questions but only in 7 cases, the users answered
them. If IT department did not receive the necessary infor-
mation it was impossible to solve to tasks and these tasks
were canceled.
Relative frequency of tasks was the following: solved
(94.41%), canceled (5.42%) and unsolved (0.17%).
Overview of using resource and tasks queues. There
was provided a detailed analysis of using resource and tasks
queues using data from 1.1.2015 to 1.12.2015. We can see
that use of resources from IT department (IT specialists) is
uneven because there are totally 6 IT specialists but the most
exposed of them solved globally 54.84%.
Relative frequency according to the division into queues
was the following: opf_blocking classrooms (42.56%),
opf_others (15.57%), opf_HW (15.34%), opf_IS stag
(8.54%), opf_eLearning (8.02%), opf_administration staff
(6.06%), opf_WWW and thesis topics (3.23%) and opf_IS
iskam (0.69%).
There were tasks from 110 different users (academics,
secretaries, technical department, students). Most tasks were
created by secretaries of different departments at the faculty
such as Department of Economics and Public Administra-
tion, Department of Business Economics and Management,
Department of Finance and Accounting, Department of
Informatics and Mathematics and Department of Tourism
and Leisure Activities. There were also tasks created by 33
students.
6 Conclusion
The main goal of this paper was to use process mining
techniques to analyzed processes in Horde helpdesk system
at our university. The main outputs based on Disco process
mining tools include the following results: process model
map, information about activity events, events over time, an
overview of using resources and of course statistics about the
efficiency of helpdesk processes such as absolute frequency
of cases, median and maximum duration of some important
helpdesk activities.
We can assume a greater use helpdesk system at our
university so we are planning to compare as a future work if
there are some differences in efficiency of helpdesk pro-
cesses and user behavior in different years.
Acknowledgements The work was supported by the SGS/19/2016
project called “Advanced mining methods and simulation techniques in
business process domain”.
Fig. 3 Maximum duration of helpdesk activities. Source Own analysis in Disco
308 R. Dolak and J. Botlik
References
1. van der Aalst, W.M.P.: Process Mining: Discovery, Conformance
and Enhancement of Business Processes. Springer, Berlin (2016)
2. van der Aalst, W.M.P.: Process Mining: Data Science in Action.
Springer, Berlin (2011)
3. van der Aalst, W.M.P.: Process mining in CSCW systems. In:
Proceedings of the Ninth International Conference on Computer
Supported Cooperative Work in Design, pp. 1–8. IEEE Press, New
York (2005)
4. van der der Aalst, W.M.P., et al.: Process mining manifesto. In:
Daniel, F., Barkaoui, K., Dustdar, S. (eds.) Business Process
Management Workshops 2011. LNBIP, vol. 99, pp. 169–194.
Springer, Heidelberg (2011)
5. Process Mining Manifesto, http://www.win.tue.nl/ieeetfpm/lib/exe/
fetch.php?media = shared:process_mining_manifesto-small.pdf
6. van der Aalst, W.M.P., Weijters, A.J.M.M., Maruster, L.: Work-
flow mining: discover-ing process models from event logs. IEEE
Trans. Knowl. Data Eng. 16(9), 1128–1142 (2004)
7. ProM, http://www.promtools.org/doku.php
8. van der Aalst, W.M.P., Reijers, H.A., Weijters, A.J.M.M., van
Dongen, B.F., Aalves de Mediros, A.K., Song, M.S., Verbeek, H.
M.W.: Business process mining: an industrial application. Inf.
Syst. 32, 713–732 (2007)
9. Fluxicon, http://www.fluxicon.com/disco/
10. Günther, C.H.W., Rozinat, A.: Disco: discover your processes. In:
Proceedings of the Demonstration Track of the 10th International
Conference on Business Process Management, pp. 40–44.
Springer, Berlin, Heidelberg (2012)
11. Beisse, F.: A Guide to Computer User Support for Help Desk and
Support Specialists. Course Technology, Boston (2014)
12. Knapp, D.: A Guide to Customer Service Skills for the Service
Desk Professional. Course Technology, Boston (2011)
13. Bruton, N.: How to Manage the IT Help Desk. The Bruton
Consultancy, Oxford (2002)
14. Horde LLC, Groupware—The Horde Project, https://www.horde.
org/apps/groupware
15. Horde LLC, Whups—The Horde Project, https://www.horde.org/
apps/whups
16. Horde LLC, Documentation—Whups—The Horde Project, https://
www.horde.org/apps/whups/docs/README
17. HelpDesk (Lístky) [Ústav informačních technologií], https://uit.
opf.slu.cz/horde/helpdesk
18. Fluxicon Disco User’s Guide, https://fluxicon.com/disco/files/
Disco-User-Guide.pdf
Process Mining of Event Logs from Horde Helpdesk 309
Public Library Services to Children
in the United Arab Emirates—A Study
Natarajan Sundar , N. Radhakrishnan ,
and Mohammad Khaled Issa Al-Shboul
Abstract
It is important to establish children libraries for children
in any country and encourage them to promote reading
habits and help them to develop their talents. Keeping that
in mind, all the public libraries including Dubai Public
Libraries, Sharjah Public libraries, MCYCD (Ministry of
Culture, Youth and Community Development), and
National Library have been developed children’s library
and dedicated to children ages between 3 and 16 in
United Arab Emirates (UAE.). Other than the common
services of borrowing and reference services, children
libraries provide a range of activities which include
storytelling, audio video materials, drawing competitions,
cultural competitions, seminars, lectures and offering
special services for disabled children. This paper aims to
identify the development and services offered towards
children in public libraries in UAE.
Keywords
Children’s library Library services Public library
United Arab Emirates
1 Introduction
United Arab Emirates cabinet has declared “2016”as the
“UAE Reading year”[1]. It has been understood that the
country supports and encourages the reading habits among
the people and particularly young children. H.H. Sheikh
Mohammad Bin Rashid Al Maktoum, Vice President and
Prime Minister of the UAE and Ruler of Dubai launched the
“Arab Reading Challenge”to motivate millions of students
in the Arab world to read 50 million books by Sep 2015 [2].
The challenge 2015–16 edition was attracted 3.59 million
students from 54 nationalities, which represented 30,000
schools in 21 countries. The total prize value for all the
different categories was Dh.11 million ($2,994,827).
“Reading opens minds, magnifies hunger for knowledge and
instils the values of openness and moderation that define
great civilizations”[3].
The study discusses the children’s library services offered
in the United Arab Emirates at national, public and private
levels. The Central and state government bodies support and
facilitate the services to the public libraries. Children’s
library serves to certain age categories between 3 and 13 and
increase opportunities to explore educational, cultural and
recreational nature. IFLA recommends that the children
should be encouraged using libraries from an early age. The
main objectives of the children’s libraries are;
•To improve and implant children about reading habits.
•To facilitate the access to the global information
including open sources and media.
•To recognize the potential and capabilities of young
minds.
•To develop the social awareness and help children to use
the right information from different sources.
•To promote lifelong learning and involve them in various
activities.
2 Library Services to Children
Library leads a range of activities which include storytelling,
educational movies, drawing competitions, cultural compe-
titions, seminars, lectures, organizing trips, special training
courses and providing special services for disabled children.
Further it organizes summer program, book fairs to attract
N. Sundar (&)M. K. I. Al-Shboul
American University in the Emirates, Dubai, UAE
e-mail: gn.sundar5@gmail.com
M. K. I. Al-Shboul
e-mail: alhareth8@gmail.com
N. Radhakrishnan
Department of LIS, Periyar University, Salem, India
e-mail: mkuradha@gmail.com
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_36
311
more readers so as to promote reading habits. Libraries offer
ICT programs to children for computer usage and safe search
on internet.
2.1 Children’s Collection
The materials include a rich collection of books and variety
of cognitive materials suitable for children with different age
group to attract and develop the skills of imagination. Books
deal with fun stories, education, religious, basic science
historical collections and encyclopedias of diversified
knowledge. Other than books, the collections include jour-
nals, magazines, audio-visuals, map, and microfilms, etc.
2.2 Library Membership
In general, public libraries provide services to the public
without any charges for utilization. To become an active
member of the library or community, membership fee is
being collected from the public. Public libraries membership
is available for nationals and residents of UAE to benefit the
services being offered. Public libraries of MCYCD (Ministry
of Culture, Youth and Community Development) are
available. The membership for “children category (below
12 years old) requires parent’s consent and charged AED 50
(USD 14) for annual membership with refundable deposit of
AED 50 (USD 14) [4].
2.3 Activities
Most of the Libraries i.e. public or private organize events,
workshops, and seminars in regular interval to attract chil-
dren at a large. Dubai public library organized summer
program in 2017 entitled “Our Summer is Arts and Culture”
to help the children enjoy the holidays to some extent. The
educational and entertaining activities were designed for the
whole family. The program was hosted by Dubai public
library branches at Al Twar, Al Rashidiya, Al Mankhool,
Umm Suqeim and Hatta during July 16–Aug 10, 2017.
Participation fee was free for the library members and AED
500 for non-members. Programs had categorized for the age
group between 5–8 years, both boys and girls; 9–13 years;
6–9 years. Some programs were scheduled separately for
boys and girls for the age group between 10 and 13.
According to the National (2014, Aug 10) news daily that
Abu Dhabi Tourism and Culture Authority (TCA, Abu
Dhabi) had launched month-long series of Public Libraries
Summer 2014 event at Khalifa Park Library and Bahia Park,
in partnership with Abu Dhabi City Municipality. The event
offered a diverse educational and entertainment programs for
children aged between 6 and 12, activities related to the
importance of healthy food, basic scientific activities and
group discussions. Children learned about the importance of
recycling waste for other purposes during the workshop [5].
3 Children Libraries in UAE
The National library, Abu Dhabi was established in 1981
and started providing services to public in 1984. The chil-
dren’s library was set-up in 1986 at national library in order
to promote better habits in children. Most of the library
collections are available in Arabic, English and French
languages [4]. In April 2010, Umm Al Quwain public library
was renovated with separate and specially designed for
children with the collection of 33,209. Branch library
remain opens for public throughout the week; except Friday
and public holidays from 9 am to 2 pm and 4 pm to 9 pm
[6].
Al Bateen children’s collections were distributed amongst
all other libraries to form the basis among the neighborhood
libraries for the purpose. To avoid keeping the collection in
one place where children should travel, better move the
collections in public libraries where children could visit
along with their teachers. It is identified that from Al
Mazyad Mall children’s library receive 100 of children
during busy times [7].
4 Guidelines and Standards
International Federation of Library Associations recom-
mends the following guidelines to the children’s libraries
that every child has right to develop his/her potential with
fee and open access to information, materials and programs
for all, irrespective of age, race, gender, religious, language
or social status [8]. It has been emphasized that Children’s
libraries should promote the rights through different activi-
ties for children and adult including exhibitions, promotion
of books, workshop, reading and literacy sessions [9].
•Children’s library should have space enough to accom-
modate school groups.
•Furnishing must be flexible and shelves should be lower,
accessible (Max. height 1.5 m) throughout the section.
•Library must be a safe place; must be avoided any risk,
e.g. staircases, sharp edges of shelves.
312 N. Sundar et al.
5 Abu Dhabi Tourism and Culture Authority
(TCA)
Abu Dhabi Tourism and Culture Authority (TCA, Abu
Dhabi) manage National library and few more public
libraries. The branches have spread over the emirate and
each of the libraries has a phone number to call for any
information about the location and hours of operation [10].
5.1 Khalifa Park Library
Khalifa park library was established in July 2013 and this
branch has its children’s section. Children’s library contains
20,000 books including fiction and non-fictions. More than
400 French books are available including stories, dictionaries,
scientific books, and etc. This branch library has separate
activity room where children can listen stories, watch puppets
show and movies. Branch offers activities like storytelling and
Back-to-school event as well. Branch can be contacted
through the provided email id: national-library@tcaabudhabi.
ae. Library opens Sunday to Thursday, 8 am to 8 pm and
Saturday 4 pm to 8 pm.
5.2 Mazyad Mall Library
This library was established in March 2012 and exclusive
children section launched due to the presence of several
primary schools in the surrounding areas. Children’s library
contains more than 3000 latest titles in all subjects. This
branch has an activity area where children can listen stories,
and watch puppets show. Branch opens from Sunday to
Thursday between 9 am to 9 pm and Saturday 4 pm to 9 pm
(Fig. 1). Library can be communicated to the email id:
MBinZayed-Library@tcaabudhabi.ae.
5.3 Al-Bahia Library
The Al-Bahia library was constituted in 2012 and has more
than 30,000 titles including children’s collection with an
emphasis on novels. Stories are available for children from 5
to 10 years old. Different types of activities are offered like
storytelling, book signing, art displays, national day, and
back-to-school event. The center has an email
national-library@tcaabudhabi.ae. The library opens Sunday
to Thursday 8 am to 8 pm and Saturday 4 pm to 8 pm.
Fig. 1 Mazyad Mall Library
Public Library Services to Children in the United Arab Emirates …313
Virtual tour can be accessed http://360emirates.com/
abudhabi/360-virtual-tour/al-bahia-park-library/.
5.4 Al Marfa Library
The Al Marfa library was opened in October 2013. It
rewards the regular children visitors by allowing them to
choose their gifts from the gifts shelves which attract more
children. Children’s story collections are classified for the
age group of 5–10 years and 11–18 years old. Separate
activity hall is available for children to listen to stories,
watch puppets show and movies. This branch motivates the
general readers to take free books. (http://360emirates.com/
abudhabi/360-virtual-tour/al-marfaa-library/). Center opens
Sunday to Thursday 8 am to 8 pm and closed on Friday
(Fig. 2).
5.5 Zayed Central Library
Zayed Central library was located in Al Ain, Abu Dhabi and
opened in 2016 with the collection of 136,000, children’s
section and separate activity room. This branch opens Sunday
to Thursday 8 am to 8 pm and closed on Fridays. Email id is
alain-library@tcaabudhabi.ae for the communication.
6 Children’s Library at MCYCD Public
Libraries
The public libraries of the Ministry of Culture, Youth and
Community Development (MCYCD) have opened at the
federal level in the Northern and Western regions of the
UAE (Abu Dhabi, Ras Al Khaimah, Um Al Quwain, Ajman
and Fujairah). The MCYCD has 10 libraries UAE-wide
available for UAE nationals and residents as well. They are:
Abu Dhabi public library (established in September 2009);
Umm al-Quwain public library (inaugurated in July 2005
and built new center in April 2010); Dibba Al-Fujaira public
library (re inaugurated in March 2006 after renovation);
Delma public library (Renovated and inaugurated in May
2008); Ras Al-Khaima public library (inaugurated in January
2004); Ajman public library (established in 2011); Al Fujaira
public library (inaugurated in July 2005); Madinat Zayed
public library (renovated and inaugurated in March 2006);
Masafipublic library (inaugurated in April 2008); Beach
Library (inaugurated in 2014).
Libraries at the MCYCD give special attention to children
to promote reading habits for younger generation. In this
context, public libraries have allocated special area for
children sections that provide diverse collections of pro-
grams and increase intellectual skills among the users.
Children’s library is divided into age categories of 3–6,
Fig. 2 Al Marfa Library
314 N. Sundar et al.
7–10, and 11–13. To achieve its aim and objectives, chil-
dren’s area of the library has created an attractive environ-
ment with the best design, fixtures, and furniture. Children’s
library programs include quiz, events to encourage father to
read for his child, materials to reach reading, coloring,
drawing, ICT programs for safe search in internet (Ministry
of Culture and Knowledge Development, UAE).
7 Children’s Library at Dubai Public Library
Dubai Public Library is managed and run by Dubai Culture.
It includes eight branches across the emirates. Out of these
eight branches, seven public libraries have their own chil-
dren’s library other than the “Al Ras, Branch. According to
Dubai Culture (Government of Dubai), in 1989 new libraries
were opened in major locations around the emirates in busy
and bustling communities of Hor Al Anz, Rashidiya, Safa
and Umm Suqeim. Library was opened in 1998 to serve
Hatta residents. In 2007 Al-Twar library was opened and
more recently, in 2012 Al-Mankhool library joined with
Dubai Public Library Network. Dubai public library believes
to work so as to create the personality of the children,
improve their talents, ability and guide them in best direc-
tion. Children’s library plays a vital role in enhancement and
refinement of the children’s intellect and tendencies. These
libraries are inter-connected with computer systems and
provide wide range of information facilities and knowledge
in both Arabic and English languages. Children’s library
offers a variety of activities including featured stories, edu-
cational films, drawing, cultural competition, seminars, and
special services for disabled children [11].
8 Sharjah Public Library
Sharjah library was established in 1925, which was then
renamed as “Qasimi Library”. The public library in Sharjah
was set-up in five different branches across the city before it
was found permanent residence in 2011 at Cultural Square.
There is a hall for children age group between 3 and 12,
which has educational toys, games and books. Children
under 8 years should be accompanied by their parents.
Library charges AED 10 (USD 3) for the insurance of a
borrower’s card and refundable deposit of AED 150 (USD
41). Membership for children under 19 years old requires
the consent of the guardian. The library operates from 8 am
to 10 pm from Saturday to Thursday and visitors can log on
to shjlib@shjlib.gov.ae for more information [12].
9 Recommendations
In order to establish the quality of children’s library, the
following recommendations are vital to achieve the reading
habits of young minds and develop their talents:
1. Increase the number of children’s libraries in remote
areas.
2. Encourage parents to read for their children.
3. Promote school activities like in children’s libraries.
4. Develop the children’s librarian’s professional skills by
proving training.
5. Extend the library timings and open even on the
week-ends and public holidays.
10 Conclusion
Information Literacy gains much importance in this elec-
tronic age. Libraries have started to stimulate the user
community to keep them updated on various issues. Huge
amount of funds is invested to modernize the existing system
to attract more number of visitors by and large. Most of the
public libraries has children’s section in the United Arab
Emirates. A periodical survey on the use of Public Libraries
will bring out the impact and the growth users in toto. There
are very limited studies carried out on Public Libraries in
UAE in general and Children Libraries in particular. Hence
an attempt has been made to study the existing library ser-
vices available in Public Libraries across the United Arab
Emirates. This paper will be fruitful to those who take up
research in Library and Information Science in UAE and
GCC.
References
1. UAE Year of Reading 2016. https://uaecabinet.ae/. Last accessed
25 June 2017
2. Hanif, N.: Sheikh Mohammed Bin Rashid Launches Child Reading
Challenge with Dh11 m in Rewards. The National. https://www.
thenational.ae/. Last accessed 16 July 2017 (2015, Sep 16)
3. Arab reading challenge. http://arabreadingchallenge.com/
newsdetails/2017/04/14/vip-news-2. Last accessed 19 July 2017
4. Ministry of Culture and Knowledge Development (MCKD).
https://mckd.gov.ae/sites/MCYCDVar/en-us/pages/
AboutOurLibrary.aspx. Last accessed 22 July 2017
5. TCA Abu Dhabi Launches Public Libraries Summer 2014 events.
The National. https://www.thenational.ae/. Last accessed 16 July
2017
Public Library Services to Children in the United Arab Emirates …315
6. Abu Dhabi eGovernment Gateway. https://www.abudhabi.ae/.
Last accessed 18 July 2017
7. Sengati-Zimba, M., Mavodza, J., Abu Eid, E.: Innovative Public
Libraries in United Arab Emirates: Taking library services in
public spaces. Paper presented at: IFLA WLIC 2015—Cape Town,
South Africa in Session 147—Asia and Oceania (2015)
8. The Background text to the Guidelines for Children’slibraries
services. Retrieved from https://www.ifla.org/files/assets/libraries-
for-children-and-ya/publications/guidelines-for-childrens-libraries-
services_background-en.pdf. Last accessed09 June 2017 (2003, Dec)
9. Libraries for Children and Young Adults Section: Guidelines for
Childrens Libraries Services. IFLA. https://www.ifla.org/files/
assets/libraries-for-children-and-ya/publications/guidelines-for-
childrens-libraries-services-en.pdf. Last accessed 15 July 2017
10. Abu Dhabi Tourism and Culture Authority (TCA, Abu Dhabi).
http://tcaabudhabi.ae/. Last accessed 18 July 2017
11. Dubai Public Library. http://www.dubaiculture.gov.ae/. Last
accessed 13 June 2017
12. Al Serkal, M.M.: Sharjah Library has Permanent Home: building
Opens at New Location After Being Moved Five Times Since
Inception. Gulfnews. http://gulfnews.com. Last accessed 20 July
2017 (2011, May 28)
316 N. Sundar et al.
Security and Privacy in Smart Cities:
Issues and Current Solutions
Talal Ashraf Butt and Muhammad Afzaal
Abstract
Internet of Things (IoT) paradigm is making it possible
for everyday objects to integrate with the Internet. This
has laid the foundations for the inception of future Smart
cities based on systems that consist of a plethora of IoT
devices to enable novel applications. The smart cities
paradigm deals with the public data that is prone to
different security and privacy risks at different level of
smart cities architecture. Therefore, the importance of
ensuring security and privacy is paramount in this
paradigm. This paper focuses on the security and privacy
issues involved in the smart cities. The paper highlights
the key applications of smart cities and then investigates
its architecture from security point of view. The paper
also reviews the current security and privacy solutions for
smart cities and emphasizes the open issues and research
challenges that still need to be addressed in this new
paradigm.
Keywords
Security Privacy Smart city Internet of things
1 Introduction
The progress of Information Technology (IT) is impacting
human life in multifaceted ways. Information and Commu-
nication Technology (ICT) resources are heavily deployed
and enhancing the provision of services in our daily lives.
The excessive use of ICT resources can be measured from
the fact that door locks, window curtains, curtains, TVs,
cars, toasters, air conditioners, coffee machines etc. can be
controlled through smart phones. In the current era, the
concepts like smart commerce, smart environment, smart
communication, and smart mobility have emerged to take
the impact of ICT to the next level in the form of smart
cities [1].
Smart cities involve a large number of sensors collecting
and sending data to base station, and other Internet enabled
devices which communicate with each other in order to
process data. Each of these millions of devices continuously
generates important data which are transmitted through
heterogeneous networks to appropriate data centers for
processing. After processing, certain decisions are taken
based upon the analytics [2].
Data is the most important asset for any individual in the
smart world. This data may include location coordinates,
travelling history, credit card numbers, and medical records
to name a few. These data are handled by pieces of hardware
and software which might have some vulnerabilities, which
can be exploited to get unauthorized access to the data [3].
False data can be injected in good one in order to mislead the
decisions taken by concerned parties. Forged healthcare data
may lead to the wrong prescription of medicine, which
eventually may result in severe health consequences for the
patient. GPS enabled smart phones may pose a severe threat
to owners’privacy. Usually we set the GPS coordinates of
our home and office as the originating point. Also, latest
smart phones store the route taken by the smart phone carrier
which can be used to track their whereabouts. Access to
these GPS data can disclose the absence from a certain point
which may eventually attract the burglars and intruders [4].
This paper takes an Architectural point of view to
determine the Security and privacy issues in the smart cities.
Furthermore, this paper identifies the current security solu-
tions and research challenges in enabling security and pri-
vacy in a smart city. Sections 2and 3cover the details of
smart city’s architecture and applications, and the security
and privacy vulnerabilities are highlighted in Sect. 4.
Finally, Sect. 5covers the current security solutions and
research challenges and then paper is concluded.
T. A. Butt (&)M. Afzaal
American University in the Emirates, Dubai, UAE
e-mail: talal.ashraf@aue.ae
M. Afzaal
e-mail: muhammad.afzaal@aue.ae
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_37
317
2 Smart City Architecture
Smart city intelligent applications rely on data harvested by
ubiquitous sensors. These data is transmitted to the cloud by
the integration layer that manages the heterogeneity of sen-
sor devices and networks. The architecture of a smart city is
thus composed of Perception, Integration, Cloud, Applica-
tion and business layers as shown in Fig. 1. Furthermore, the
security and management is required at all layers.
2.1 Perception Layer
This layer perceives the environment and in response gen-
erates the data. The devices involve at this layer ranges from
the RFID tag to smart phones [5]. The main goal of this layer
is to sense the environment and identify objects/things to
collect data.
2.2 Integration Layer
Integration layer is fed with the data collected by the per-
ception layer. The purpose of this layer is to integrate the
heterogeneous networks to the cloud layer. Therefore, its
role is akin to the network layer in TCP/IP protocol suite.
There is a vast diversity of the communication protocols
employed by the sensor devices depending on the capabili-
ties of the devices. The communication protocols include
RFID, Zigbee, 6LowPAN, Bluetooth, WiFi, 4G etc. [6].
Therefore, there are a range of systems that required to be
integrated into the overall smart city architecture. This layer
fulfills these integration requirements by passing the
received data to Cloud layer.
2.3 Cloud Layer
Cloud layer is the major layer that includes many compo-
nents such as storage, computation and analytics [7]. This
layer receives data from the Integration layer to process and
store it for the consumption of Smart cities applications. At
this layer, all the things in a smart city are represented by
virtual things. These virtual things will make the availability
possible for those real physical things that need to sleep most
of the time to save their energy consumption. The huge sets
of data received at this layer is stored and managed by Big
Data technologies [8].
2.4 Application Layer
As name suggests, different smart city’s applications operate
at this layer. Some applications also perform analytics to the
collected data to aid different smart cities applications.
Furthermore, the smart autonomous applications based on
Artificial Intelligence execute at this layer [9].
2.5 Business Layer
Business layer helps to create different business model based
on services provided by the smart city system. Different
services are created using the processed data and those ser-
vices are further composed into new services to offer new
value-added services to the users of a smart city.
3 Smart City Applications
Smart city paradigm opens new avenue for novel applica-
tions by connecting the physical world with the ICT sys-
tems. The data harvested from these physical spaces are
processed and made available in the form of different ser-
vices that allow applications to use the sensed data or control
the physical world, as shown in Fig. 2. This section covers
the detail of few key categories of applications in a smart
city.
3.1 Smart Transportation
The smart transportation concept is the materialization of
Intelligent Transport System (ITS). This application uses the
smart city’s processed data to manage the mobility demands
of a city such as congestion management, real-time predic-
tions of local transport arrivals, parking space management,
and real-time freeway management etc. [10].
Fig. 1 Smart city’s architecture
318 T. A. Butt and M. Afzaal
3.2 Smart Energy
Reducing the energy consumption and to prevent the failure of a
power grid for a city or an individual consumer are a few of the
many challenges for a city management authority [11]. Smart
energy applications utilize the widely deployed sensor data to
monitor and manage energy from its generation to its con-
sumption. The applications allow authorities to make all indi-
viduals accountable to their energy usage and carbon footprint.
3.3 Smart Healthcare
Smart healthcare applications aim to improve quality of
current healthcare systems by continuously monitoring
patients’real-time data to diagnose infectious diseases at
early stages [12]. Furthermore, it provides the functionality
of medical surveillance for people suffering with chronic
diseases and remote consultation. The applications consume
the cloud services that provides the processed health data,
such as ECG and EIT signals that gathered from wearable
and other sensor devices. The big data element enables smart
healthcare applications to track down the trends to avoid
spread of infections and plagues.
3.4 Smart Education
Smart Education applications exploit the data gathered from
different sources in the field to enable active learning in a
smart city [13]. The data are collected from infrastructure,
people and information that is processed by big data tech-
nologies. The process of education is improved by the pro-
vision of smart services. Furthermore, this knowledge based
society is being further extended to remote areas to improve
the life of the people.
3.5 Smart Environment
This category of applications deals in making different
environments, smart by controlling vastly deployed sensor
devices [14]. These applications intelligently manage cli-
mate with the aid of ubiquitous sensing and actuation. Few
examples of these applications include building manage-
ment, city noise management, CO
2
heavy area detection and
management, green reserve management, and resource waste
control systems.
3.6 Smart Security
These applications rely on the sensors based context-aware
security systems to provide risk prevention applications [15].
These applications provide the ever needed a security solu-
tion to ensure public safety against extreme natural disasters
and terrorists.
3.7 Smart Industry
Smart Industry based applications are committed to support
Industry 4.0 era [16]. These applications provide a basis for
autonomous intelligent machines that will use the data
generated by heterogeneous sensor devices. This reduces the
downtime of machines and real-time data flow to assist
supply chain management. Overall, these applications will
benefit the industry by improving the working conditions
while saving on the cost involved in labor and energy.
4 Security and Privacy Issues
Smart cities can’t be considered smart unless these can
provide the required level of security. The general security
and privacy requirements include ensuring availability,
integrity, privacy, access control, confidentiality, and non-
repudiation. The smart city harnesses sensed data from
physical spaces that contains granular details about the
people living in those environments. The journey of this data
starts at a sensor node and ends at the user application.
Therefore, the smart city poses unique security requirements
because it’s a system of interlinked systems that share data
with each other. This the key argument that discourages the
wide-spread usage of smart city services.
The architecture of a smart city can be described as a
complex integration of different systems to provide various
city-wide services, as shown in Fig. 1. However, any device
running a software is posed to different vulnerabilities. This
list of vulnerabilities increased rapidly when the device joins
a network, because now it can be remotely hacked as well.
Fig. 2 Smart city application categories
Security and Privacy in Smart Cities: Issues and Current …319
The smart city consists of millions of devices, therefore,
even one single compromised device will make the whole
collection vulnerable. The hackers can perform range of
cyber-attacks by exploiting the vulnerabilities.
4.1 Types of Security and Privacy
The security requirements of a smart city can be divided into
two categories. The operational security requirement is to
ensure that the employed technology and infrastructure is
secure and is immune to any cyber-attack. The second is
related to the data that is generated and communicated
within the infrastructure using different technologies. How-
ever, the data security and protection is dependent on the
operational security, as anyone who will break into a system
will be capable to violate the data access policy.
Privacy. Privacy, the state of being isolated from undesired
attention and heed, is a basic human right as described in many
declarations and jurisdictions [17]. However, the concept of
privacy differs according to different cultures, contexts and the
type of information. Privacy has various dimensions:
•Identity privacy deals with the protection of personal data
related to an individual
•Bodily privacy focus on the protection of physical
aspects
•Territorial privacy protects the personal property and
space of an individual
•Mobility privacy aims to secure the location coordinates
and protection against tracking
•Communications privacy deals with the protection of the
communication channels against eavesdropping. These
channels include, but not limited to hardware devices
which facilitate the data transfer, communication medi-
ums either wired or wireless
•Transactions privacy focuses to protect the queries and
responses against monitoring.
Categories of Attacks. The cyber-attacks are generally
categorised into one of these three attacks:
1. Availability attacks: This classification is for attacks that
either deny some services or completely bring the system
down.
2. Confidentiality attacks: These attacks are related to the
unauthorised monitoring and information access.
3. Integrity attacks: These attacks seek to break into system
to amalgamate or alter the stored information. Further-
more, these attacks alter the configurations such as
stopping critical services, infecting system with viruses
or making the system inefficient.
4.2 Security Vulnerabilities and Issues
in Smart Cities
A system’s security vulnerability explains the security hole
that can be caused by number of issues such as weak
encryption, human error etc. In a smart city this issue is
further aggravated by physically dispersed sensors in public
spaces and the system’s multifold complexity and interde-
pendencies between its components that makes it vulnerable
to various cyber-attacks.
Constrained Devices at Perception Layer. Internet of
Things connects all RFID and sensor devices to the Internet.
RFID based objects are passive as they require a reader and a
gateway to connect to the Internet e.g. smart cards used for
transport systems. On the other hand, sensor devices include
sensors, actuators and microcontrollers. Nowadays, there are
variety of sensors available to sense diverse phenomenon
such as temperature humidity, location, velocity, proximity,
etc. Moreover, the traditionally dumb devices e.g. electronic
devices, doors and even lights are notifying and being
remotely controlled by users. Most of these sensor devices
are constrained in resources and have no effective security or
privacy mechanism [18]. This makes these devices prone to
be hacked and opens portal for all sort of security risks.
Weak Encryption. One of the traditional way to secure a
networked software device is to utilize encryption. It is
believed that the encrypted channel ensures the system
protection against attackers. The current smart city initiatives
are deploying systems without testing them for
cyber-security threats. However, it is an important aspect in
a smart cities where majority of the IoT devices have con-
straints and can’t support viable encrypted links. Even the
encrypted links are prone to other security issues because
attackers can still break into encrypted systems using
side-channel and cold boot attacks. These issues are the main
hurdle in the way of wide acceptance of smart city systems.
Communication Technologies at Integration Layer.
There are various communication technologies that are used
by different IoT devices depending on their capabilities.
These technologies include RFID, NFC, Bluetooth, BLE,
ZigBee, 6LoWPAN based on IEEE 802.15.4, WiFi,
LPWAN (Low Power Wide-area-network), 3G and 4G
mobile technologies. All these technologies have security
vulnerabilities that make these susceptible to be hijacked
[19]. Even the most sophisticated technologies such as 4G
mobile technologies have vulnerabilities in its infrastructure.
Cloud Layer. The cloud layer provides the required
flexibility to support scalability in smart cities. However,
cloud systems also have security issues such as Outsourcing,
Multi-tenancy and massive data that requires intense com-
putation. Outsourcing requires to provide remote access that
results in less control on data and eventually causes
320 T. A. Butt and M. Afzaal
insecurity and privacy violations. This can be dealt with by
making sure that cloud provider is trustworthy and the out-
sourced data is verifiable from security and privacy per-
spectives. Multi-tenancy enables multiple users to utilize the
cloud platform. The cloud can use different resource allo-
cation policies to store data of different users on a single
physical machine. Therefore, multi-tenancy poses several
security vulnerabilities [20]. Another aspect related to cloud
computing is that traditional security techniques requires
heavy communication or computation overhead to deal with
cloud’s massive amount of data. This overhead becomes
infeasible e.g. in case of hashing the entire data set that is
remotely stored.
System’s Complexity and Cascade Effect. Smart city
systems are large-scale and complex systems containing
heterogeneous devices and networks. The smart city’s
architecture (Fig. 1) has multiple layers where each layer is
composed of plethora of devices and technologies. The web
of interdependencies between its components and with other
systems pose a big challenge to measure and mitigate risk in
presence of many stakeholders. The multiple links between
system components expose them to security risks even each
system is independently secured. Moreover, these interde-
pendencies become an issue while maintaining or upgrading
an interface of a system component. The highly intercon-
nected components are also prone to create cascade effects,
where an attack on one system e.g. Smart Transport can
severely affects other systems as well. This security risk
greatly challenges the realization of a smart city where one
successful attack can bring down all systems of a city
management.
Software Bugs. A software based device can become
vulnerable to cyber-attacks because of software bugs, which
leave holes for attackers to sneak into a system. This factor is
further intensifies in complex systems that contain millions of
lines of codes where these bugs can open a backdoor for
attackers. Once an attacker enters a smart city system then he
can get the control of the system and exploit the available data.
User Equipment. Different users of a Smart city are able
to consume value-added services and participate in crowd-
sensing [4] by using their mobile devices that are prone to
many vulnerabilities. Firstly, each mobile phone can be
uniquely identified by its IMEI (International Mobile Station
Equipment Identity). This IMEI can be related to an owner
to get his personal information and can be used to track a
mobile device. Furthermore, many users have reckless
behaviour towards giving access permissions to malicious
applications. Once such application will get a permission it
can access user’s information and control the device.
Human Factor. The smart city systems are hardly
allowed to operate fully autonomously, because these sys-
tems can cause Kafkaesque situations. Therefore, the human
are almost always are in the loop of decision making with
some of interaction with the smart city systems [21]. The
human error either by mistake or deliberate can result in data
leakage or system malfunction. There are many ways in
which a smart city user with authority e.g. the municipality’s
employee can sabotage the system.
Legacy Systems. Legacy systems are everywhere and
most of the authorities require to integrate the existing
infrastructure to a smart city. Most of the legacy systems are
insecure and mostly created decades ago without taking into
account the today’s security challenges. These systems are
not regularly upgraded and have inherent vulnerabilities,
thus provide a freeway to attackers. Even new systems in a
smart city require to be regularly patched ideally without any
downtime.
5 Security and Privacy Solutions
RFID tags are extensively used in smart city applications.
This RFID proliferation has given rise to many security
concerns like eavesdropping and threats to privacy of tag
owner. Many solutions have been proposed to deal with
these issues. An RFID tag identification algorithm [22]
ensures secure identification of multiple RFID tags simul-
taneously and RFID reader authentication with low com-
putational power. SASI [23], another RFID authentication
protocol, is a more robust and ultra-lightweight scheme
which provides strong authentication and integrity for the
communication between RFID tags and its reader. Both
these schemes need less computational power for encryption
purposes which is why they are preferred.
In order to keep smart city sensor devices secure from
intruders, they should be placed in a location where access is
restricted and they are out of reach of unauthorized per-
sonnel. Whenever a smart city sensor is deployed in the
network, it should be authenticated to check if it is autho-
rized to collect and send data in that network. An authenti-
cation scheme [24] facilitates key establishment and ensures
that only authorized devices with proper credentials can
participate in communication with an access point. A com-
pressed version of IPSec [25] can be used for end-to-end
encrypted communication between a smart city sensor
device and an IPv6 enable device to ensure privacy.
Integration layer gets data from sensors and delivers to
the cloud layer. For this purpose, it uses different commu-
nication protocols like Zigbee, 6LoWPAN, Bluetooth, WiFi
etc. Anyone in the coverage area of these communication
technologies can grab the packets resulting in compromise of
data privacy. This issue can be overcome by encrypting the
packets using strong encryption techniques. The constraints
of lower computation power and limited memory inside
smart city sensors lead us to use lightweight cryptographic
algorithms [25].
Security and Privacy in Smart Cities: Issues and Current …321
The exposure of data processed and stored on cloud
servers is another issue. Homomorphic encryption algo-
rithms provide the ease of processing encrypted data coming
from different sources [26,27]. This way the privacy of data
is ensured without halting the processing pipeline while
getting the same results.
The smart city devices use different software to perform
their actions. The bugs in the software provide the backdoor
to potential adversaries to exploit the functionality and
integrity of smart city applications. These weaknesses in
software can be avoided by training the developers about
writing secure code and embedding security concepts in the
software at each stage in Software Development Life Cycle
[28–30]. Moreover, the software should be passed through
different testing phases to discover any security holes and
potential vulnerabilities.
6 Future Research Challenges
Limited computational power in smart city sensor devices
makes them unsuitable for high level computations done
with cryptography. Moreover, constrained memory in them
also make them inappropriate for large key sizes for
encryption/decryption.
Due to its requirement for high computational power,
Public Key Infrastructure (PKI) cannot be used on devices
like smart city sensors. An edge-router based authentication
scheme uses PKI over IPv6 [31], but it increases the over-
head and limits the scalability. Therefore, more research is
required to find some alternative of PKI, which requires low
computational power and hence consumed less energy.
Smart city sensors are integrated with the system to work
uniformly. This integration is made possible in terms of the
interdependencies among them. If one component is com-
promised, it may open doors for hackers to the other devices as
well. This may have a cascading effect upon the smart city
components and result in the failure of the whole system. This
opens new research directions to mitigate the interdependen-
cies and to bind the adversarial effects only to the compro-
mised system.
Users participating in crowdsensing may give access to
malicious parties to their personal data. This grant of access
might be unintentional because of lack of awareness and use
of apps which may affect the system’s security. There is a
need to spread awareness about the secure use of mobile
devices and a strict control over the release of apps.
Legacy systems have been in use for a long time and it is
not easy to replace them at once. These systems were
designed without considering the security challenges we are
facing today. Many vulnerabilities have been already dis-
covered and their patches are also available. The problem is
that the system owners do not apply the patches regularly.
Also the patches are usually designed by inexperienced
programmer and they may introduce new vulnerabilities.
7 Conclusion
Smart cities are complex systems that are composed of
heterogeneous devices that communicate using a plethora of
protocols. These devices and protocols are vulnerable to
many security and privacy issues. This paper describes the
smart city’s architecture and applications. Furthermore, it
reviews the security and privacy issues in a smart city from
the perspective of its architecture. It also discusses the
available solutions pertinent to these issues and highlights
the open research challenges in the realization of a secure
smart city.
References
1. Hernández-Muñoz, J.M., Vercher, J. B., Muñoz, L., Galache, J.A.,
Presser, M., Gómez, L.A.H., Pettersson, J.: Smart Cities at the
Forefront of the Future Internet, pp. 447–462 (2011)
2. Albino, V., Berardi, U., Dangelico, R.M.: Smart Cities: definitions,
Dimensions, Performance, and Initiatives, vol. 22, pp. 3–21.
Taylor & Francis (2015)
3. Popescul, D., Radu, L.D.: Data Security in Smart Cities:
challenges and Solutions, vol. 20, p. 29. Inforce Association
(2016)
4. Yang, K., Zhang, K., Ren, J., Shen, X.: Security and Privacy in
Mobile Crowdsourcing Networks: challenges and Opportunities,
vol. 53, pp. 75–81. IEEE (2015)
5. Zanella, A., Bui, N., Castellani, A., Vangelista, L., Zorzi, M.:
Internet of Things for Smart Cities, vol. 1, pp. 22–32. IEEE (2014)
6. Yaqoob, I., Hashem, I.A.T., Mehmood, Y., Gani, A., Mokhtar, S.,
Guizani, S.: Enabling Communication Technologies for Smart
Cities, vol. 55, pp. 112–120. IEEE (2017)
7. Petrolo, R., Loscri, V., Mitton, N.: Towards a Smart City Based on
Cloud of Things, a Survey on the Smart City Vision and
Paradigms, vol. 28. Wiley Online Library (2017)
8. Hashem, I.A.T., Chang, V., Anuar, N.B., Adewole, K., Yaqoob, I.,
Gani, A., Ahmed, E., Chiroma, H.: The Role of Big Data in Smart
City, vol. 36, pp. 748–758. Elsevier (2016)
9. Al Nuaimi, E., Al Neyadi, H., Mohamed, N., Al-Jaroodi, J.:
Applications of Big Data to Smart Cities, vol. 6, p. 25. Springer
(2015)
10. Xiong, Z., Sheng, H., Rong, W., Cooper, D.E.: Intelligent
transportation systems for smart cities: a progress review. Sci.
China Inf. Sci., 1–7 (2012)
11. Karnouskos, S., Da Silva, P.G., Ilic, D.: Energy Services for the
Smart Grid City, pp. 1–6 (2012)
12. Solanas, A., Patsakis, C., Conti, M., Vlachos, I.S., Ramos, V.,
Falcone, F., Postolache, O., Pérez-Martínez, P.A., Di Pietro, R.,
Perrea, D.N., et al. Smart Health: a Context-Aware Health
Paradigm Within Smart Cities, vol. 52, pp. 74–81. IEEE (2014)
13. Jeong, J.-S., Kim, M., Yoo, K.-H.: A Content Oriented Smart
Education System Based on Cloud Computing. Citeseer (2013)
14. Filipponi, L., Vitaletti, A., Landi, G., Memeo, V., Laura, G., Pucci,
P.: Smart City: an Event Driven Architecture for Monitoring
Public Spaces with Heterogeneous Sensors, pp. 281–286 (2010)
322 T. A. Butt and M. Afzaal
15. Al-Muhtadi, J., Ranganathan, A., Campbell, R., Mickunas, M.D.:
Cerberus: a Context-Aware Security Scheme for Smart Spaces,
pp. 489–496 (2003)
16. Lee, J., Kao, H.-A., Yang, S.: Service Innovation and Smart
Analytics for Industry 4.0 and Big Data Environment, vol. 16,
pp. 3–8. Elsevier (2014)
17. Martínez-Ballesté, A., Pérez-Martínez, P.A., Solanas, A.: The
Pursuit of Citizens’Privacy: a Privacy-Aware Smart City is
Possible, vol. 51, pp. 136–141. IEEE (2013)
18. Granjal, J., Monteiro, E., Silva, J.S.: Security for the internet of
things: a survey of existing protocols and open research issues, vol.
17, pp. 1294–1312. IEEE (2015)
19. Jing, Q., Vasilakos, A.V., Wan, J., Lu, J., Qiu, D.: Security of the
Internet of Things: perspectives and Challenges, vol. 20, pp. 2481–
2501. Springer (2014)
20. Xiao, Z., Xiao, Y.: Security and Privacy in Cloud Computing, vol.
15, pp. 843–859. IEEE (2013)
21. Nam, T., Pardo, T.A.: Conceptualizing Smart City with Dimen-
sions of Technology, People, and Institutions, pp. 282–291 (2011)
22. Karthikeyan, S., Nesterenko, M.: RFID Security Without Exten-
sive Cryptography, pp. 63–67 (2005)
23. Chien, H.-Y.: SASI: a New Ultralightweight RFID Authentication
Protocol Providing Strong Authentication and Strong Integrity,
vol. 4, pp. 337–340. IEEE (2007)
24. Qiu, Y., Ma, M.: An authentication and key establishment scheme
to enhance security for M2M in 6LoWPANs. In: 2015 IEEE
International Conference on Communication Workshop (ICCW)
(2015)
25. Engels, D.W., Saarinen, M.-J.O., Schweitzer, P., Smith, E.M.: The
Hummingbird-2 Lightweight Authenticated Encryption Algorithm,
vol. 11, pp. 19–31. Springer (2011)
26. Tebaa, M., El Hajji, S., El Ghazi, A.: Homomorphic Encryption
Appl. Cloud Comput. Secur. 1,4–6 (2012)
27. López-Alt, A., Tromer, E., Vaikuntanathan, V.: On-the-fly Mul-
tiparty Computation on the Cloud via Multikey Fully Homomor-
phic Encryption, pp. 1219–1234 (2012)
28. Brown, M., Paller, A.: Secure software development: why the
development world awoke to the challenge. Inf. Secur. Techn.
Rep. 13(1), 40–43 (2008)
29. Kang, J., Park, J.H.: A secure-coding and vulnerability check
system based on smart-fuzzing and exploit. Neurocomputing
(2017)
30. Khan, R.: Secure software development: a prescriptive framework.
Comput. Fraud Secur. 2011(8), 12–20 (2011)
31. Goswami, S., Misra, S., Taneja, C., Mukherjee, A.: Securing
intra-communication in 6LoWPAN: a PKI integrated scheme. In:
2014 IEEE International Conference on Advanced Networks and
Telecommuncations Systems (ANTS) (2014)
Security and Privacy in Smart Cities: Issues and Current …323
Smart City Framework Development:
Challenges and Solutions
Ahmed N. AL-Masri, Anthony Ijeh, and Manal Nasir
Abstract
This paper addresses the concept of the smart city and its
significance to citizens. In this regard, recent literature
about smart cities and in response to the increasing use of
the concept is discussed. The study aims to introduce a
developed framework to be used in modern smart cities
with citizen engagement. Eight factors contribute to the
smart city to be “smarter”: management and organization,
technology, governance, policy context, citizen and
communities, economy, built infrastructure, and natural
environment. These factors are the base of an integrative
framework that can be used to inspect how local
governments are picturing smart city plans. The main
framework suggests proposed agendas for smart city
which lead to practical implications for government
expertise. In this research, a smart city is defined in
different areas of the world based on several literatures’.
Finally, the study is focused on Dubai vision for smart
city, which is based on the high business and innovation
center.
Keywords
Smart city Smart city framework Citizen engagement
1 Introduction
Building new cities is facing many challenges and difficul-
ties especially regarding, Energy resources, Environment,
Water, Society, Transportation, Infrastructure, Healthcare,
Education, Governance, and Economy. The 21st century has
been strangled by international terrorism, economic world
crisis, regional wars, and civil unrests. On the other hand, the
development of technological environments and utilities
push the social to be more in sustainable world.
The smart cities are defined as a uniting Eco World,
Digital World and Social World into the Trinity World,
unifying the ecological principles of the eco world devel-
opment, the technological principles of the information
world development, and the social principles of the human
world development. Hence, it time to change into Smart Eco
Planet of eco-intelligent social communities of various
geographical sizes and scales: countries, regions, cities,
towns, villages, districts, and neighborhoods. Combining
spontaneous order principles and smart communities plan-
ning, the Smart city is self-organizing as global knowledge
ecosystems, involving natural ecosystems, social cohesion,
smart economy, intelligent people, efficient global gover-
nance, complete mobility, sustainable living and creative
working.
Accordingly, the new world of new cities calls for con-
verging models, initiatives, principles, strategies, standards,
solutions, and technologies. Moreover, it requires merging
all its key domains, physical, natural, digital and knowledge
worlds, assets, and resources to develop a smarter world with
intelligent eco-communities and integrated infrastructures,
such as the future internet/web of things or distributed RES
Networks, the replacement of the unsustainable fossil fuel
infrastructures.
This study reviews the best cases studies in the world up
to this date. Most of the experiences that gained in building
new smart cities are proving that a true sustainable com-
munity is a physically efficient, digitally smart, socially
intelligent, and ecologically sustainable community, driven
by physical capital and natural capital, social capital and
digital capital. The smart cities concept includes all the
principal utilities for human being in intelligent and
self-automation for present and future such as universities,
social service, e-government system, intelligent universities
A. N. AL-Masri (&)A. Ijeh M. Nasir
American University in the Emirates, Dubai, UAE
e-mail: Ahmed.almasri@aue.ae
A. Ijeh
e-mail: Anthony.ijeh@gmail.com
M. Nasir
e-mail: manalnasir11@gmail.com
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_38
325
with online system, hospitals, natural resources and knowl-
edge assets, human resources and intellectual capital [1].
2 Significance of the Study
The significant part of the world’s capital is summaries by
new cities and intelligent buildings, commercial property
and residential property and infrastructure investment. The
real concern of building smart cities has raise after the
increscent of world population and global worming (Green
house) which shown side effects to the human and opposite
positional of building new intelligent world with all the
available technologies.
Besides that, the limitation of the energy resources is
pushing all the researchers and engineers to find new natural
recourses and reduce the CO
2
increment. On the other side,
cities are the base of economic growth and technological
progress which the way for the legacy cities to expose the
new world in becoming greener, more intelligent, more
efficient, more attractive, more social and more digital which
can even enhance the country economics.
3 Smart City Concept
Although there is an increase in frequency of use of the
phrase “smart city”, there is still not a clear and consistent
understanding of the concept among practitioners and aca-
demia. Only a limited number of studies investigated and
began to systematically consider questions related to this
new urban phenomenon of smart cities [2]. However, they
have reviewed the definitions of the smart cities in many
journals based on how large is the city.
Reference [3], they denoted a smart city as a complete
intelligent city connected together in term of new technology
and utilities. In 2012, Chourabi et al. [4]defined the smart
city is promising a plan to alleviate that has been raised by
the urban population growth and rapid urbanization. The
study of last authors was based on their investigation of
many and extensive literature from various penalizing areas.
In addition, they have founded eight critical factors which to
be considered for smart city:
1. Management and organization.
2. Technology and innovation.
3. Governance.
4. Policy context.
5. People and communities.
6. Economy.
7. Built infrastructure.
8. Natural environment.
These factors are the basic framework that should be
considered by any local or international investment company
or local government to build smart city initiatives. The
framework follows the promoted agendas base on the
development in few next years include research and outlines
of practical implications for all factors. In the following
section, a literature review of some important factors will be
discussed in detail.
Management rule for smart city
Smart city management system means building and carrying
out ways for a city to realize its full potential for while
maintaining efficient day-to-day operations. The smart cities
are expected to be large and complicated at the same time
due to high integration system between each part of the city.
A control system and monitoring is required to dynamically
take advantage of its tools and facilities. However, only little
research talked about the innovation in management and
policy while the literature of technology innovation is rich
[5]. All the problems are handled by the human resources of
that city and in several cases, it is suggested to build
sub-management centers to solve the small issues that could
rise in some part of the city.
The uses of the sub centers have two important advan-
tages: First, it will reduce the load on the top management
center, thus enhance the efficiency by handling more tasks.
Second, it would secure the city when the system under
contingency, for example: a problem in transportation
occurred due cars conjunction can be solved in one
sub-management center without affecting another center.
City leaders must think holistically about operations
insight, law enforcement and emergency management,
government and agency administration, and urban planning
including smarter buildings [6].
Technology and innovation
This part includes many areas such as building and
contraction, education, energy resources, water and west
water treatment and environmental. The focus in this
research is on the energy section and renewable energy
production. The energy usage is conscientious of about 75%
of global warming gases emissions and utilities [7]. There-
fore, the smart city is built to reduce the pollution and
greenhouse effect by decrease total energy consumption, use
renewable resources and maintaining share the energy
between production and consumption. In this matter, the
smart city must implement the smart grid concept and
technologies into its energy infrastructure [8–11]. The
renewable energy is considering all natural resource such as
solar and wind [12].
326 A. N. AL-Masri et al.
Governance
The most important advantage of developing new cities is
government services and easy access such as the
e-government development and fast response in providing
all service to the citizen. The governance factor is one of the
most important factors that could increase the number of
urban population [13]. The government is controlling all the
rules and regulations of any future plan for every city under
its control.
Built infrastructure
The comfortable built infrastructure increases the building
facility availability which can improve the productivity for
all parties. The smart cities organize a better skilled people
and it will increase the experience of the city citizens. In
terms of data exchange, the data communication will be
transferred faster due to the systems integration and common
communication protocols used along the city/community
and premises programmable controllers. The proper con-
trolling and monitoring environment would provide an
automation level which would require less tenant’s interac-
tion with maintenance and operation call center which means
less complaints [14].
4 Case Studies of the Advanced Smart Cities
4.1 Singapore Experience
The Singaporean started developing the country to be a
smart city and the point that become as a smart city is on
1999. The challenge of converting the ignorant or skeptical
onlookers to the new technologies is already a major chal-
lenge. But an even greater challenge is to put IT in the
service of humankind instead of using it for the subversion
or the destruction of the values and ways of life people hold
dear. As with the nuclear energy, IT can be a force for good
or evil. The smart community should be smart enough to
make the right choice [15]. Form the Singaporean experi-
ence the IT and new technology is the most wonderful path
that can change the entire country into smart city.
4.2 Amsterdam Smart City
Amsterdam Smart City is a sole corporation between the
people of Amsterdam, businesses; knowledge institutions
and a local authority that was implemented with aspire of
achieving saving more energy now and in the future. Ams-
terdam Smart City could be viewed as an ‘accelerator’of
climate/energy programmers. By bringing parties together
and by initiating projects in which smart technologies and
different approaches are tested, it is possible to develop best
practices for future large-scale implementation of similar
initiatives [16]. From the point of the people of Amsterdam
in building a smart city is the energy and reducing the pol-
lution and global warming affects [17]. The following are the
pillars on which Amsterdam Smart City operates:
1. Cooperation at every possible level is essential to achieve
viable results. It could be a public private partnership, but
it must incorporate the close involvement of the
(end) user.
2. Driven by smart technology and the need to bring about
behavioral change.
3. Knowledge exchange: All the acquired knowledge and
experience will be shared via ASC
4. Only economically viable initiatives will ultimately be
rolled out on a large scale.
4.3 Berlin Smart City/Germany
The challenge of combining competitiveness and sustain-
ability cities are urban, developed, social, environment and
fashion strategies. Communication and Information tech-
nology is one of the key factors in this building the smart
city. Like such utilities can be implemented by individuals
(People), businesses (International or local commerce) or
public institutions (E-government) [5].
Berlin is the capital city of Germany (since 1871 and was
1701–1945 the capital city of Prussia. During 1948–1990
East Berlin was capital of GDR while Bonn was capital in
West Germany) and one of the 16 states of Germany,
location shown in Fig. 1. With a population of 3.5 million
people, Berlin is Germany’s largest city and is the second
most populous city proper and the eighth most populous
urban area in the European Union [18].
Berlin is selected as one of the top 10 smart cities on the
planet [19] and also considered as a developing city all
across the union, green-ness (8th in Europe) and high quality
of life. In collaboration with Vattenfall, BMW, and others,
Berlin is testing out vehicle-to-grid (V2G) technologies in
the hopes of creating a virtual power plant from electric
vehicles.
Many research and studies have been demonstrated in
Berlin as part of the smart city development and real-time
application. The internet interconnection performance
should be stabilize and performed very well for example the
radio stations and increase the channels [20]. In additions,
they include many fashion residential areas, community
services, more than three universities, hospitals, malls and
tourism places.
Smart City Framework Development: Challenges and Solutions 327
The aim of building the smart city in Berlin is to reduce
Green House Gasses (GHG) emission intensity related to
energy use by 60%, also to reduce peak temperature by 2 °C
and to reduce the final disposal of solid waste and GHG
emission per waste generation by 50%. To implement the
high performance in new technology application especially
the energy and the implementation of the smart grid
including the solar and wind power production.
The features of the Berlin master plan are following the
European slandered for the smart city [21], which summa-
rized as follows:
•The utilization of city infrastructure is enhanced in order
to improve the economic and also the political efficiency.
•An underlying prominence on business and investment
development.
•A strong recommendation for building the social inclu-
sion of various city residents in smart city for social
benefits.
•Cooperate on developing the most advance of high tech
and innovated industries in long term for city expansion.
•Give an attention to the social responsibility and rela-
tional capital in the smart city growth.
•Environmental and sustainability is one of the major
intentional components of smart cities.
The vision on developing the city is on the innovation
and technology development by 1999 [22]. The government
has focus on how to build global city that concern strategic
economic as one of the major impact in developing Berlin
and make it internationally extending control such as Paris
and London. Berlin smart City is targeting four matters
which are summarized as follows:
1. The concept of a green city
Green means living in a low pollution environment, which
consumes less energy and low CO
2
emissions. The customer
can easily monitor their energy consumption in a smart city
by using the smart grid utilities. Smart cities include inno-
vative technologies for communication which may guide the
citizen living that area to reduce the energy bills and save
more money. For example: the people can save additional
energy by using the solar and wind power production and
hybrid vehicles or by using smart electricity household
devices.
2. A city for the next generations
Building a digital city contribute on the future. Berlin city
would become a smart city by taking a smart approach in
order use it in the communication services, mobility and
ecology and governance.
3. A city full of potential
The city grows in different ways. One of the important
strategies is expanding demographically. All people would
stay or live in the area involve in the development and be
compatible to work with each other, therefore, everyone will
contribute in keep all facilities up to date and not stop in one
point.
4. High tech city
The basic of building any smart city should toward a
high-tech innovation including the high technology, advance
industry or factory, high education level and high perfor-
mance computerize system.
The promotion of low-carbon policies has to be a main
theme especially in related sectors; Residential, Transporta-
tion, Commercial, Public Amenities and Utilize, Govern-
ment Institutions and Power Generation land use. The
implementation of Integrated City Planning and Manage-
ment through development plans and the implementation of
Low-carbon Society scenario, it is expected to reduce CO
2
emission. To identify necessary actions, integrated modeling
based on the European Union standard is applied as shown
in Fig. 2. The models estimate balanced and quantitative
future activity levels. A Smart City of Berlin is well per-
forming in 6 models, built on arrangement of donations of
self-decisive, independent and aware people living in that
area.
4.4 Dubai Towered Smart City
Dubai moving towered transferring itself to become a smart
city by 2021 led by Smart Dubai with the vision “to be the
happiest city on earth”[23]. The project of smart Dubai
started with government services and moved to the private
partners with measuring the happiness across the city by
using customer feedback on the provided services.
The second focus of smart Dubai is technology and
innovation which will serve all the residents and visitors.
The main objectives to enrich Dubai city with technology
and innovation are focusing on four factors: Seamless,
Efficient, Safe and Personalized. The office of smart Dubai
city collecting all data by the impact management office to
oversee and monitor the operational strategy in this large
scale. Smart Dubai office aligned its mission to achieve these
objectives by the following:
328 A. N. AL-Masri et al.
•Smart Living
•Smart Economy
•Smart people
•Smart mobility
•Smart Environment
•Smart Governance
The final project will be fully estimated by 2021 which
will come after year of EXPO 2020 to achieve its mission to
be the happiest city on earth.
4.5 Other Experiences of the New Lunched
Smart Cities
Worldwide, existing cities are ether build or re-build their
major infrastructure and utilities which is in a staggered
fashion. On the other hands, there are other cities that have
the luxury of incorporating the Smart City vision in its
Fig. 1 Berlin smart city location
Fig. 2 Methodology for Berlin smart city
Smart City Framework Development: Challenges and Solutions 329
entirety from scratch. These cities share many things, like
free economic zone, renewable energy, smart buildings,
smart transportation, broadband connectivity, balance
between green and covered spaces, and strategic geographic
placement. There are some notable examples around the
globe, as shown in Fig. 3. These cities deploy various
information and communication technology components like
radio-frequency identification (RFID), embedded systems,
Wi-Fi, WiMax, LTE, ZigBee, machine-to-machine com-
munication, asset management, energy management, unified
communications, and collaboration [13].
5 Conclusion and Recommendations
The objective of this review is to cover the most recent
research and development on the smart city in term of defi-
nition, component and rules. Critical factors have been dis-
cussed to make sure main conditions of smart city are
available. Furthermore, several experiences have been viewed
and most of the smart cities development are focus on these
based rules or conditions. Finally, Dubai vision on moving to
become a smart city discussed with its strategy. The last
Fig. 3 Some new lunched smart cities
330 A. N. AL-Masri et al.
significant factors that should be considered to build a smart
city in any country recommended as shown in Fig. 4.
References
1. Abdoullaev, A.A.: Smart world: a development model for
intelligent cities. In: The 11th IEEE International Conference on
Computer and Information Technology (CIT-2011), pp. 1–28
(2011)
2. Schuurman, D., Baccarne, B., De Marez, L., Mechant, P.: Smart
ideas for smart cities: investigating crowdsourcing for generating
and selecting ideas for ICT innovation in a city context. J. Theor.
Appl. Electron. Commer. Res. 7,49–62. https://doi.org/10.4067/
s0718-18762012000300006 (2012)
3. Hamilton, R., Paraszczak, J., Harrison, C., Williams, P.,
Kalagnanam, J., Hartswick, P., Eckman, B.: Foundations for
smarter cities. IBM J. Res. Dev. 54,1–16 (2010). https://doi.org/
10.1147/JRD.2010.2048257
4. Chourabi, H., Nam, T., Walker, S., Gil-Garcia, J.R., Mellouli, S.,
Nahon, K., Pardo, T.A., Scholl, H.J.: Understanding smart cities:
an integrative framework. In: 2012 45th Hawaii International
Conference on System Science IEEE, pp. 2289–2297 (2012)
5. Nam, T., Pardo, T.A.: Smart city as urban innovation. In:
Proceedings of the 5th International Conference on Theory and
Practice of Electronic Governance—ICEGOV ‘11, p. 185 (2011)
6. IBM Smarter Cities. http://www.ibm.com/smarterplanet/us/en/
smarter_cities/management/index.html. Accessed 1 Jan 2013
(2013)
7. Morvaj, B., Lugaric, L., Krajcar, S.: Demonstrating smart build-
ings and smart grid features in a smart energy city. In: Proceedings
of the 2011 3rd International Youth Conference on Energetics
(IYCE), pp. 1–8 (2011)
8. Xia, Y., Xu, Z., Zhang, P., Sun, H., Wang, J., Qiao, W., Li, F.,
Wan, H.: Smart transmission grid: vision and framework. IEEE
Trans. Smart Grid 1, 168–177 (2010). https://doi.org/10.1109/
TSG.2010.2053726
9. Wei, C.W.C.: A conceptual framework for smart grid. Power
Energy Eng. Conf. (APPEEC), 2010 Asia-Pacific. https://doi.org/
10.1109/appeec.2010.5448786 (2010)
10. Khanna, A.: Smart grid, smart controllers and home energy
automation—creating the infrastructure for future. Smart Grid
Renew. Energy 3, 165–174 (2012). https://doi.org/10.4236/sgre.
2012.33024
11. Novosel, D.: Experiences with deployment of smart grid projects.
In: Innovative Smart Grid Technologies (ISGT), 2012 IEEE PES,
pp. 1–3 (2012)
12. Wang, R., Jin, L., Xiao, R., Guo, S., Li, S.: 3D reconstruction and
interaction for smart city based on World Wind. In: 2012
International Conference on Audio, Language and Image Process-
ing (ICALIP), pp. 953–956 (2012)
13. Washburn, D., Sindhu, U., Balaouras, S., Dines, R.A., Hayes, N.,
Nelson, L.E.: Helping CIOs Understand “Smart City”Initiatives
(2009)
14. Al-hader, M., Rodzi, A.: The smart city infrastructure development
& monitoring. Theor. Empir. Res. Urban Manag. 2(11), 87–94
(2009)
15. The Singapore case, Mahizhnan, A.: Smart cities. Cities 16,13–18
(1999). https://doi.org/10.1016/S0264-2751(98)00050-X
16. Panagiotis Tsarchopoulos, Amsterdam Smart City –Smart Stories
2011 (2011) URENIO Research Unit, http://www.urenio.org/
2011/04/20/amsterdam-smart-city-smart-stories-2011/
17. Baron, G., Brinkman, J., Wenzler, I.: Supporting sustainability
through smart infrastructures: the case for the city of Amsterdam.
Int. J. Crit. Infrastruct. 8, 169 (2012). https://doi.org/10.1504/
IJCIS.2012.049036
18. An initiative of the European Commission (2018) http://eu-
smartcities.eu/place/berlin
19. Cohen, B.: The Top 10 Smart Cities on the Planet (2012) https://
www.fastcompany.com/90186037/the-top-10-smart-cities-on-the-
planet
20. Juraschek, F., Zubow, A., Hahm, O., Scheidgen, M., Blywis, B.,
Sombrutzki, R., Gunes, M., Fischer, J.: Towards smart Berlin—an
experimental facility for heterogeneous smart city infrastructures.
In: 2012 IEEE 37th Conference on Local Computer Networks
Workshops (LCN Workshops), pp. 886–892 (2012)
21. Caragliu, A., Del Bo, C., Nijkamp, P.: Smart cities in Europe.
J. Urban Technol. 18,65–82 (2011). https://doi.org/10.1080/
10630732.2011.601117
22. Krätke, S.: Berlin: towards a global city? Urban Stud. 38, 1777–
1799 (2001). https://doi.org/10.1080/00420980120084859
23. Smart Dubai Office. https://2021.smartdubai.ae/
Planning and management
Public safety
Smarter buildings and urban plan-
ning Government and agency ad-
ministration
Infrastructure
Energy and water
Environmental
Transportation
Human
Social programs
Healthcare
Education
Fig. 4 Factors to be considered
in smart city
Smart City Framework Development: Challenges and Solutions 331
Smart City Transportation Services,
Customer Satisfaction and Impact
on the Quality of Life
Aleksandar Aleksic, Nikolina Ljepava, and Marija Ristic
Abstract
Growing demand for enhanced features of urban living
conditions influenced an outburst of Smart Cities all over
the world. A Smart City adopts application of wide range
of information and communication technologies and
citizen-centric solutions with the goal of providing
sustainable economic development and an increased
quality of life. The increased quality of life is also found
to be closely related with an increased customer satisfac-
tion and overall well-being of the citizens residing in the
Smart City. Although Smart City features and services
may be analyzed from the perspectives of human,
technology, and institutional factors, an issue of improv-
ing the quality of life may be designated as one of the
most important topic in the area. The current study
provides a comparative analysis of the impact of various
Smart City services on the quality of life. The base for
proposed Smart City services has been derived from the
wide range of references ([8]; standard ISO 37120:2014;
[7]). The study findings indicate that Smart Cities should
continuously assess the performance of services in order
to identify the ones that have the major impact on quality
of life. The future research could explore in more details
the relationships between Smart City services, quality of
life and overall citizen satisfaction.
Keywords
Smart city Customer satisfaction Key performance
indicators
1 Introduction
Customer satisfaction [1] and Quality of life (QOL) have
been significant topic of interest during recent decades.
Different stakeholders, such as business consultants, schol-
ars, corporations and many others have been analyzing
organizations in order to please their customers, to perform
assessment, tracking and analysis of customer satisfaction so
they could stay competitive and provide better QOL.
As this topic has been found to be more significant from
the perspective that satisfaction has impact on customers to
repeat purchase decisions, it became obvious that satisfac-
tion is making impact on company profits [2]. It may be
noticed that significant part of research has been conducted
form the corporate side and for the corporate purpose, but in
the same time, it cannot be assumed that customer service
and satisfaction are limited to the private sector. Public
organizations also put their effort in order to provide certain
level of quality of their services so they can achieve satis-
faction with products and services they deliver.
Quality of life may be considered as a multidimensional
construct [3]. As that kind, it may include different aspects of
human experience, e.g. physical, economic, social, emo-
tional, etc. QOL may be considered to be subjective in one
part of its nature since it is relied on values and preferences
of analyzed population so there is no unique definition of it
[4]. The stated facts are the main reason why QOL is difficult
to measure. Its relationship with customer satisfaction is
always present since the change of one may impact other
construct. It is worth to mention that each one of them is
impacted by different subjective evaluations and opinions
related to the quality of goods and existing services. Cus-
tomer satisfaction is closely connected with transactions, and
over time, it form life experience. At some point it may be
concluded that it may be considered as component of QOL if
it is associated with any important transaction [5]. The
motivation of enterprises to manage customer satisfaction is
based on goals how to increase the number of customers,
A. Aleksic (&)M. Ristic
University of Kragujevac, Kragujevac, Serbia
e-mail: aaleksic@kg.ac.rs
N. Ljepava
American University in the Emirates, Dubai,
United Arab Emirates
e-mail: nikolina.ljepava@aue.ae
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_39
333
how to achieve customer loyalty, revenue, etc. Although
increasing profit is one of main goal for every organization,
excellent organizations put a lot of attention on customer
care and his/her experience with the product or service
which is provided by company. Customer satisfaction lar-
gely depends on the quality and customer experience that is
provided with product or service [6].
As research in this field has been trying to cover different
aspects, the unique definition of customer satisfaction has
been widely analyzed and debated. It is common belief that
customer satisfaction can be experienced in different way
and it is related to products and services. In the same time, it
may be assumed that is highly personal assessment that
include expectations and previous experience. Some schol-
ars support the fact that customer satisfaction is affecting
customers’repeat purchase decisions and subsequent com-
pany profits [2]. In simple language, customer satisfaction
may be understood as a customer’s evaluation of their pur-
chase and consumption experience with a product, service,
brand, or company [1]. As there is a significant number of
fast growing cities around the globe which is supported with
tremendous expansion of technology with a purpose to
enhance conditions of citizens’living, there is one big open
issue to be analyzed: how to manage customer satisfaction in
smart cities?
Explanation of the label smart city can make under-
standing of the research more clear and concise. In marketing
perspective, smartness is centered on a user perspective and
due to broad base of community members; smart is utilized
compared to the more elitist term—intelligent. It this way, it
is assumed that smart is more user-friendly than intelligent
[7]. As there is no common definition of smart city, this
research is focused to one of the smart city domains—
transport, mobility, and logistics [8]. It may be assumed that
smart city monitors and integrates conditions of all of its
critical infrastructures [7]. This include roads, tunnels, sub-
ways, rails, airports, bridges, seaports, communications,
water, power, event major buildings. From one side, smart
city is optimizing its resources, but in the same time, it should
plan its preventive maintenance activities and monitor secu-
rity aspects while maximizing services to its citizens and
increasing their satisfaction.
The main objective of this paper is to propose the base for
questions that are going to be utilized to the survey for
assessment of the level of customer (citizens) satisfaction in
developing economy such as the UAE. In this case, cus-
tomers would be citizens of Dubai. Managing appropriate
indicators of customer satisfaction should have improvement
of QOL as a final consequence.
This paper is organized in the following manner. The
second section of the paper represents literature review. The
third section is clarifying the framework for customer
satisfaction assessment and the third section is proposing
ASCI model as a solution for measuring customer satisfac-
tion with the services of smart city. In the same time, this
section proposes the base for selecting questions for the
process of customer satisfaction measurement. The section
five sets the conclusion and future perspectives of research.
2 Literature Review
One of the recognized approaches claims that QOL, on the
conceptual level, has two dimensions: macro and micro [9].
Both dimensions are interconnected since at macro level,
QOL is related to physical and artificial environment, and at
the micro level, QOL is based on the perceptions of indi-
vidual. As it is mentioned in introduction section, exactly
micro level is impacted by transactions and customer satis-
faction. As smart city is seen as a multidimensional concept
with complex social, political and cultural settings, it may
happen that different persons that live in same conditions
which may perceive quality of life in different manner.
Having in mind the mentioned issue, it is very important to
determine appropriate customer satisfaction model with
appropriate performances to be measured, analyzed and
managed if smart city is oriented to continual improvement
of QOL of its citizens.
Customer satisfaction refers to the customer’s overall
evaluation of the product or service after he/she purchases it
[10]. One of the most usual mistakes is that organization is
more oriented to itself than customers. During the last few
decades as customer satisfaction research has been expand-
ing, it has diverted in two directions as two different types of
evaluations: transaction-specific satisfaction and cumulative
satisfaction [1]. The first one relates to customer’s evaluation
of his/her experience including reactions to a product or
service faced transactions. In this manner, the research was
focused on the effects of positive and negative emotions on
satisfaction [11]. During 1990s research in this field started
to include cumulative satisfaction which may be seen as
customer’s overall experience with a product or service
provider. This approach is nowadays wider accepted since
recognized models support it, such as American Customer
Satisfaction Index (ACSI). In ACSI model, one of the main
entities is perceived value and perceived quality of product
or service. As customers’perceived quality of the service is
the focus of this paper, an analysis of main perspectives of
smart city, which is service provider in this context, should
be analyzed.
Different issues have been raised within the smart cities
and literature may be generalized into “hard”and soft
domains of a smart city [8]. These domains may be further
analyzed through the socio-economic impact on the quality
334 A. Aleksic et al.
of life in smart cities. It may be assumed that smart city can
be analyzed from three perspective which generate perceived
value of services provided by smart city [7].
The first perspective represents smart infrastructure as good
functioning infrastructure is necessary for smart city func-
tioning. The infrastructure should be strongly enhanced with
the use of technology, mainly information and communication
technology (ICT) [12]. Integration of smart computing tech-
nologies with critical components and infrastructure may
designated as one of important features of smart city [17].
Smart computing may be treated as a core of perceived value
for customers since it encompasses integration of hardware,
software, and network technologies that provide IT systems
with a goal to enable decisions are made in more easier and
smooth way [13]. As a final consequence, a quality of life in
smart cities should be enhanced. As a perceived value for
customers, mobile, virtual, and ubiquitous technologies may
offer benefits to citizens. Besides mentioned factors, pleasant
bird view during the transportation in Dubai metro may be
considered as perceived value to tourists and citizens on some
routes. Dubai may offer internet-based government services
that enable ubiquitous connectivity supported with a wide
range of public access points.
The second main perspective of smart city may be
articulated through the human factors which reflect human
infrastructure, human capital and education [7]. In this way,
it may be considered that people that live in smart cities and
using its services are supposed to be identified as smart
people with personal affinities to lifelong learning, flexibil-
ity, creativity, cosmopolitanism or open-mindedness [14]. It
is noticeable that human factors in Dubai, like in other smart
cities, include includes social inclusion of various urban
residents in public services such as knowledge networks and
enable diversity and cultural mix, social/human/relational
capital [12]. Determination of perceived quality of smart city
services is more complex since human infrastructure is
constituent of smart city and residents are very aware of
services that are offered by smart city.
The third import perspective of smart city essential for
understanding perceived quality represents institutional [14].
This factor is significant since smart city initiatives should be
strongly supported by government. This perspective
encompasses different institutional factors and includes
supportive policies and the relationship between government
agencies and non-government parties [15]. Smart govern-
ment should do more than basic regulation of the outputs of
economic and societal systems. Smart government should is
supposed make interactive connections with citizens, com-
munities, and businesses in real time integrating service
delivery, and placing the most needed transactions on the
web providing citizen-centric environment. It may be con-
sidered that Dubai transitional components are made up of
visions, leadership, and organizational transition in structure.
Having in mind mentioned perspectives of smart city,
which is applicable to Dubai, it may be concluded that
perceived quality in the model of customer satisfaction
measurement should be aligned with those perspectives.
Besides the perceived quality, reputation may have even
stronger impact on overall customer satisfaction [16,17].
3 The Framework for Customer Satisfaction
Assessment
This paper assumes that the model for satisfaction, mea-
surement tracking and analysis of customer satisfaction
should be in compliance with existing framework proposed
by ISO 10001:2012 (Fig. 1). There are four main activities
within this framework: (1) Identifying customer expecta-
tions, (2) Gathering customer satisfaction data, (3) Analyz-
ing customer satisfaction data, and (4) Providing feedback
for improvement.
Fig. 1 Monitoring and
measuring customer satisfaction
(ISO 10001:2012)
Smart City Transportation Services, Customer Satisfaction …335
3.1 Identifying Customer Expectations
It is common thing to assume that organization, in this case
smart city, should identify its customers. This is applicable
to current and potential customers, and smart city to deter-
mine the expectations of its citizens and customers. After the
determination of the customer group, the organization
should identify individual customers whose expectations
should be analyzed. During the determination of the cus-
tomer expectations, the organization should take in account
the stated requirements, implied requirements, regulatory
requirements and other requirements. It is worth to mention
that customers will not always explicitly define all aspect of
the service since some features can be presupposed or simply
they may not be known to customer. Firstly, the organization
should understand customer requirements in comprehensive
way. Very important influence on the customer satisfaction
is articulated on how the mentioned expectations are met
from the side of service provider. In order to understand
requirements, the organization should gather information
related to service characteristics. Those characteristics
should be ranked according to their relative importance.
3.2 Gathering Customer Satisfaction Data
In the same time, organization should examine existing
sources of data that reflects characteristics of service that
reflects the customer satisfaction which represent the indirect
measure of customer satisfaction. Those sources of data may
be frequency or trend in customer complaints or reports from
surveys, regulatory agency reports or publications. The
analysis of such data may influence on shaping the appro-
priate indicators of customer satisfaction. The significant
part of data for measuring the customer satisfaction is sup-
posed to be obtained directly from customers. The methods
for gathering customer satisfaction data depends on different
factors such as number, geographical or cultural distribution
of customers. These methods should be collected in sys-
tematic and detailed manner and they should be documented.
The tools for collecting data should be selected having in
mind customer type and accessibility, timeline for data
collection, available resources, privacy and confidentiality
and other issues.
3.3 Analyzing Customer Satisfaction Data
When the data regarding customer satisfaction is collected, it
is supposed to be analyzed to provide a certain insight
encompassing the degree of customer satisfaction, relevant
information of the organizations process(es) that have impact
on customer satisfaction, primary areas for improvement, etc.
3.4 Communicate Customer Satisfaction
Information
One of the most sensitive activities in organization after
obtaining and analyzing data related to customer satisfaction
is addressing areas of improvement and providing feedback
for improvement. The relevant information should be pre-
sented to appropriate organizational units of organization so
that information may be articulated into activities for service
improvement and be input for future strategy. In that man-
ner, organization may establish processes to review customer
satisfaction information and formulate action plans for
improvement. Customer satisfaction information which may
be positive or negative can also help the organization
understand and respond to customer expectations.
3.5 Monitoring Customer Satisfaction
The explained framework should be supported with appro-
priate monitoring activity. Amongst all, this means that
organization should verify that the customer group selected
are appropriate while having in mind the purpose of data
gathering and that the customer satisfaction data, both direct
and indirect are valid. In the end, organization should assess
the effectiveness of taken actions.
4 The Proposed Indicators for Customer
Satisfaction Measurement with Significant
Impact on QOL
One of the frequently used models is ACSI (American
Customer Satisfaction Index). This model supports measur-
ing the market characteristics of organizations, branches and
national economies as a whole but in the same time it may be
used for determination of the customer satisfaction with a
certain company product or service. In that manner, con-
siderations in this paper are limited to the level of company.
It may be considered that this model has two essential fea-
tures. The first one is that customer satisfaction cannot be
measured directly, because it is a hidden variable that
involves a subjective assessment of product quality. The
second is that model includes, in addition to customer
experience (quality obtained), customer expectations
regarding product quality in future (Fig. 2).
The obtained quality reflects customer experience based
on its prior use of the product. In addition, the quality
obtained reflects two components of customer experience:
(1) customization of products to the needs and wishes of
customers and (2) reliability, safety and product safety.
The obtained value is estimated in relation to the price
paid by the buyer for the purchased product/service. The (+)
336 A. Aleksic et al.
sign indicates that there is a positive relation between the
presented entities. Customer expectations depend on the level
of customer information about products and organization.
They are positively corresponding to the perceived quality and
the (added) value. Theoretically, increasing total customer
satisfaction should reduce customer complaints and increase
customer loyalty. The relationship between customer com-
plaints and loyalty cannot be measured directly. It is worth to
mention that in the case of positively resolved complaints,
customers’loyalty increases. Also, theoretically, customer
satisfaction is supposed to be more affected by the cus-
tomization component than the component of the reliability of
the product/service. In that manner, customer expectations are
more important in economic sectors with fewer variations in
production and consumption. Customer satisfaction is sup-
posed to be more conditioned by quality than the value or price
of a product. The proposed base of survey questions for
modeling perceived quality in determination of customer
satisfaction is presented in Table 1. The purpose of the men-
tioned questionnaire is measuring the level of customer (citi-
zens) satisfaction with services of Road and Transportation
Agency (RTA) in Dubai.
If core indicators are analyzed, it may be suggested that
increasing their values, their increasing makes significant
impact on the level of QOL. The proposed base for questions
related to survey that should be used for determine the
perceived value of customers should be very useful since
marketing managers have realized that customer satisfaction
is central concept of market business. The ACSI index is
complementary to conventional measures, such as produc-
tivity indices and prices, which treat the quality of products
and services as residual size. Having in mind the mentioned,
it may be noticed that the ACSI index has an important
advantage because it deals with the essence of quality. It is
formed based on the experience of customers who have been
consuming and using products and services.
Fig. 2 ASCI index model
Table 1 Perceived quality indicators derived from standard ISO 37120:2014
Indicator Core indicator/supporting indicator
18.1 Kilometres of high capacity public transport system per 100,000 population Core indicator
18.2 Kilometres of light passenger public transport system per 100,000 population Core indicator
18.3 Annual number of public transport trips per capita Core indicator
18.4 Number of personal automobiles per capita Core indicator
18.5 Percentage of commuters using a travel mode to work other than a personal vehicle Supporting indicator
18.6 Number of two-wheel motorized vehicles per capita Supporting indicator
18.7 Kilometres of bicycle paths and lanes per 100,000 population Supporting indicator
18.8 Transportation fatalities per 100,000 population (Supporting indicator)
18.9 Commercial air connectivity (number of non-stop commercial air destinations) (Supporting indicator)
Smart City Transportation Services, Customer Satisfaction …337
5 Conclusion
New market conditions impose the need for continuous
process of assessment, tracking and analysis of customer
satisfaction to enterprises if they want to stay relevant and
obtain leading position. This paper explains the framework
for assessment, tracking and analysis of customer satisfac-
tion in the scope of smart city services. The proposed
framework is derived from the standard Quality management
—Customer satisfaction—Guidelines for monitoring and
measuring ISO 1004:2012. The proposed model for deter-
mining customer satisfaction is ACSI which is aligned with
the mentioned standard. Authors believe that this model
could be appropriate for measuring customer satisfaction
with the smart city services in Dubai. Services of the smart
city are analysed from three perspectives: smart infrastruc-
ture, human infrastructure, and institutional factors.
It may be suggested that “represents the widest range of
human experience”[18]. In that manner, there are open
questions how to measure QOL respecting the whole smart
city or individual that live in it. QOL has been widely rec-
ognized as multidimensional so it is impacted by different
constructs and its measurement should include many indi-
cators and components. In the same time, customer satis-
faction may be seen as extremely important in marketing
encompassing the knowledge from research how customer
make decisions closely connected to psychology and market
research.
The main contribution of the paper is proposal of the base
for determining the right questions for the questionnaire
which should be used for measuring the value of the cus-
tomers’perceived quality with services of Road and
Transportation Agency (RTA) in Dubai in the proposed
model. The mentioned base is derived from the indicators
defined by standard ISO 37120:2014 Sustainable develop-
ment of communities—Indicators for city services and
quality of life. This base should be used for defining ques-
tionnaire for assessment. Future research is oriented to
defining of overall model for customer satisfaction with
services of smart city such as Dubai.
References
1. Johnson, M.: International Encyclopedia of the Social & Behav-
ioral Sciences, 2nd edn, pp. 630–632 (2015)
2. Johnson, M.D., Gustafsson, A.: Improving Customer Satisfaction,
Loyalty and Profit: an Integrated Measurement and Management
System. Jossey-Bass, San Francisco (2000)
3. Boschmann, E., Kwan, M.: Toward socially sustainable urban
transportation: progress and potentials. J. Transp. Geogr. 2(3),
138–157 (2008)
4. Fischer, J.M., Amekudzi, A.: Quality of life, sustainable civil
infrastructure and sustainable development: strategically expand-
ing choice. J. Urban Plann. Develop. 137(1), 29–38. American
Society of Civil Engineers (2011)
5. Fischer, J.M., Mshadoni, M., Kennedy, A.A.: Why and how to use
customer opinions: a quality-of-life and customer satisfaction-
oriented foundation for performance-based decision-making.
Transp. Rev. Transnational Transdisciplinary J. 34(1), 86–101 (2014)
6. Pham, T., Ahammad, M.: Antecedents and consequences of online
customer satisfaction: a holistic process perspective. Technol.
Forecast. Soc. Change. http://dx.doi.org/10.1016/j.techfore.2017.
04.003 (2017)
7. Nam, T., Pardo, T.: Conceptualizing smart city with dimensions of
technology, people, and institutions. In: The Proceedings of the
12th Annual International Conference on Digital Government
Research, vol. 11, 12–15 June, College Park, MD, USA (2011)
8. Neirotti, P., De Marco, A., Cagliano, A., Mangano, G., Scorrano,
F.: Current trends in smart city initiatives: some stylised facts.
Cities 38,25–36 (2014)
9. Kirpalani, V.H.: International marketing and the quality-of-life. In:
Samli, A.C. (ed.) Marketing and Quality-of-life Interface, pp. 204–
219. Quorum Books, New York, NY (1987)
10. Choi, W., Rho, M.J., Park, J., Kim, K.-J., Kwon, Y.D., Choi, I.Y.:
Information system success model for customer relationship
management system in health promotion centers. Health Care
Inf. Res. 19(2), 110–120 (2013)
11. Oliver, R.L., Swan, J.E.: Equity and disconfirmation perceptions as
influences on merchant and product satisfaction. J. Consum. Res.
16, 372–383 (1989)
12. Hollands, R.G.: Will the real smart city please stand up? City 12
(3), 303–320 (2008)
13. Vijaykumara, S.G., Saravanakumar, M., Balamurugan, M.: Unique
sense: smart computing prototype. Procedia Comput. Sci. 50, 223–
228 (2015)
14. Giffinger, R., Gudrun, H.: Smart cities ranking: an effective
instrument for the positioning of cities? ACE: Architect. City
Environ. 4(12), 7–25 (2010)
15. Yigitcanlar, T., Velibeyoglu, K.: Knowledge-based urban devel-
opment: the local economic development path of Brisbane,
Australia. Local Econ. 23(3), 195–207 (2008)
16. Parahoo, S., Harvey, H., Radi, G.: Satisfaction of tourists with
public transport: an empirical investigation in Dubai. J. Travel
Tourism Mark. 31, 1004–1017 (2014)
17. Washburn, D., Sindhu, U., Balaouras, S., Dines, R.A., Hayes, N.
M., Nelson, L.E.: Helping CIOs understand “smart city”initia-
tives: defining the smart city, its drivers, and the role of the CIO.
Cambridge, MA: Forrester Research, Inc. Available at http://
public.dhe.ibm.com/partnerworld/pub/smb/smarterplanet/forr_
help_cios_und_smart_city_initiatives.pdf (2010)
18. Woold-Dauphinee, S.: Assessing quality of life in clinical
research: from where have we come and where are we going?
J. Clin. Epidemiol. 52(4), 355–363 (1999)
338 A. Aleksic et al.
Smart Classrooms
Zoltan Horvath and Donludee Jaisut
Abstract
For the ‘Z’generation, life would be inconceivable without
smart devices, furthermore they would like to reach every
useful information instantly. In the digital society it is
getting more and more important to give the most
important information for the users through their smart
devices. During our research we made groups of users with
the help of smart beacons, and beyond indoor positioning
we gave them extra information, like electronic notes,
closed book exam etc. One of the main goals in our
development was to use our smart devices instead of paper
to reduce the expenses of the university. For the indoor
positioning, with the help of a pointcloud, we produced a
3D map beside the vectorgraphical, which is going to be
the basic of further developments, as well as we created a
surface on the physical web, where administrative oper-
ations can be made by the students and teachers.
Keywords
Beacons Indoor positioning Kalman filter
Physical web
1 Introduction
Many experiments have already been made in the field of
indoor navigation and positioning; however, an adequate
solution has not been found yet. This is why we would like
to develop a hybrid system that would solve this problem.
Preliminary works for our research have already been done.
We have collected 2,700,000 pieces of data from the sensors
we are planning to use; this way we already know how they
would behave during the measurements [1]. Furthermore, we
have started the production of an own propeller that is much
more efficient compared to the commercial models. This is
important because we can lift a heavier load with the drone
and the battery life can also be improved [2]. In our previous
research we find out the next four facts:
1. indoor positioning is not possible with either sensor.
2. the reflected signals distort the accuracy of the
measurements.
3. some sensors can’t give real values in intensive electro-
magnetic fields [3].
4. the increased computing power would drain the battery.
These facts are also important because of smart devices
have become an integral part of our lives and users meet
with them day by day. In our days, every student or lecturer
possesses one or more smart device. But they meet only few
information within the walls of the building, even notifica-
tions. In this research we would like to serve one option. The
goal in this research is that we create extra contents on the
physical web which allows to help users in the indoor
navigation, give the actually lessons and material if the
lecturer uploads this. If this material is available then the
student can edit on the lecture. To enable this we created the
content manager platform. It has been uploaded with the
classrooms schedules, slides and other e-curriculums. The
output periphery of this platform will be the smart beacon.
This beacons broadcast the information about the class-
rooms, included the GPS coordinates which are crucial to
indoor navigation [2].
Z. Horvath (&)
University of Pecs, Pecs, Hungary
e-mail: hz@gamma.ttk.pte.hu
D. Jaisut
Kasetsart University, Bangkok, Thailand
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_40
339
2 Materials and Methods
2.1 Beacons
In this research we work with Sensoro Smart Beacon 4AA,
all features of iBeacon and eddystone supported with this
beacon. With these devices, we can give more space for
developers but more importantly to users also. Other useful
properties are including UUID, Major, Minor, Tx Power,
Interval, Upgrade Over-The-Air supported, fine-tuned
antenna, optimized transmitting strength, covering a larger
area. As for the security side, we can manage the hardware
level password, preventing malicious configuration modifi-
cation and broadcast rotated encrypted major/minor, prevent
reading major, minor from squatters. The developer part is
more interesting, because available the pre-configuration
service for batch order, out of the box and deployment tool
provided, batch update configuration on site. The onsite
adaptive capacity is 12° Tx power, more control on signal
covering. Central Monitor Dashboard provided, monitor
mass device status including battery level, temperature,
motion count, light level and other configuration (Tx Power,
Adv Interval). At the management part the next two prop-
erties are important, extended iBeacon protocol (patent),
broadcasting device battery level and sensor data. The
inspection tool provided, collection mass device battery
level and sensor data in a dead simple way without con-
nection to each device.
Our sensors are available via Sensoro cloud (http://cloud.
sensoro.com/) which gives extra help in the programing and
access. The data update is much faster and easier. Over this
cloud there are lots of different app available whereby we
can manage our beacons with smartphones, tablets or PC.
The first step is the registration of the beacons. We can do
this with iBeacon, Eddystone, Beaconinside or SecureBea-
con ID (available on the beacons); after this we can upload
contents, for example GPS coordinates. After this can we
join to the physical web. If we are ready after our beacons
will be visible on the maps.
On the maps we show that two beacons are activated
which are classrooms in this case. To this classroom we have
uploaded the schedule of classroom so the students know
which lecture is inside or which coming (and where) if
connect to the beacon. Around the under beacon is red circle
what is the reach of geofences function. The aim of this
function is that the beacon is moving out from this range (in
this case 26 m)—because somebody has moved the beacon
—it would send notification to the system administrator
about the movement. But we can add any notification to the
beacon for the students. For example this can be which
software is available at the exam, what is the password
today. We can give a sort description about the event
whereof gets notification the user on the smartphone. After
this we can declare the type of notification as well as the
advanced settings. In this section we can filter the operation
system or the timeframe.
2.2 Indoor Positioning
When we are talking about indoor navigation, everybody
knows that the GPS signals are not available indoors. But we
give these coordinates to beacons because if we have maps
about the building then the coordinates are working. These
maps are the VenueMaps. How to do the GPS coordinates
and signals work on the map? The answer is georeferencing.
The VenueMaps be connected with other maps wherewith
connected with their (Google Maps, Bing maps, etc.).
Because this maps are online/offline the devices can take
identification our position inside and calculate our way
between classrooms. At the indoor positioning we can use
the triangulation method with beacon. This method is same
as outdoors. We set up the signal strength of beacons that we
are front of the door of classroom then the strongest the
signal and the other beacon signal is not visible [4]. But if
we moving from this position with 1 m than the other bea-
con will be visible. In this case, the user can detect where
he/she is in the building. Indoors we must calculate with a
disfigure effect producing the reflectance signals. These
signals broken on a different surface, material, object and
would generate a wrong position. In our previous research
we were filtering these signals with Kalman Filter. Fur-
thermore we can work with other sensors (accelerometer,
gyroscope, compass) which can detect and analyze the
moving.
2.3 Venue Maps
We have met this name by the Here application some years
ago. In this research we have used this app because the API
is open source. HERE Venue Maps API returns detailed
up-to-date information on geometry, metadata, Points of
Interest (POI) and indoor routing. Supported return types are
Images (PNG) or JSON. In the Here Android SDK with the
Position manager we can give GPS coordinates to our
map. At the georeferencing, the next three elements are
important:
•GPS—positioning using the real GPS available on the
device.
•GPS_NETWORK—positioning is provided using a
wireless network or the real GPS available on the device
•NETWORK—positioning using a wireless network.
340 Z. Horvath and D. Jaisut
The current status of a particular location method is
represented by the LocationStatus value returned from the
PositioningManager.getLocationStatus(LocationMethod)
method.
Because we talk about the indoor positioning we must
allow the wi-fibased localization [5].
Talking about indoor positioning, we have to enable wi-fi
based localization, we can do this with the next sub-class:
(‘PositioningManager.LocationMethod.GPS_NETWORK’)
The next things is the Position indicator class that is
important to define the correct position. Position Indicator is
a special map marker object that allows the current client
device position to be shown on a map. Every HERE SDK
Map object has an integrated position indicator, set to
invisible, by default. The indicator can be retrieved and set
to visible by calling Map.getPositionIndicator() and Posi-
tionIndicator.setVisible(). By default, the position indicator
is rendered as a marker surrounded by a circle, the diameter
of which illustrates the accuracy of the indicated position.
You can change this marker by calling PositionIndicator.
setMarker(Image).
In the cloud at Sensoro beacon is deployment map, where
we can upload our private vector graphic map and add
positions. However this not at all because over the position
we can add mac address of beacon to map. The X and Y
coordinates are possible the GPS coordinates or our private
coordinate system. With the mac address can identified the
beacon that which beacon is where. Thus, the GPS coordi-
nates will not be asked separately if this has already been
assigned to the particular beacon. After this must refresh the
beacon position on the map (Fig. 2). We have created the
VenueMaps in Android Studio. At the first step must iden-
tified the basic area and declare the objects. This can be
offices, classrooms, toilet, etc. of course that must declare
area to this objects.
We can give this with the next code:
Additionally what was very important for us that upload
with content this objects. In the next code we can show
where is the classroom, what are the GPS coordinates, etc.
"DepartmentNuame":"Department of IT",
"placeId":"",
"names":{"ENG":"F/111 Classroom"},
"addresses":
{"ENG":{"postalCode":"7624",
"countryCode":"HUN",
"houseNumber":"6",
"BuildingID":"F",
"GPS":"46.076689" "18.206118"
"BeaconId":"B-5Tw1bb"}
When we positioned all rooms and offices and write in the
code the additional information then the results will be the
next (Fig. 1). On Fig. 1green color means the classrooms,
yellow the offices. This map is available via the beacons that
connect via beacon on the physical web.
2.4 Kalman Filter
Results provided by sensors are not enough to obtain
evaluable data for indoor positioning. As we have already
proven, it is necessary to use different algorithms to get
evaluable and reliable data. First, we examined how useful
the Kalman filter is, since it is quite effective in processing
data measured by the original signal from the scattered ones
[6]. During our research, we recorded nearly 14,000 records,
so it seemed obvious to examine the raw data with linear
regression [7], since it gives a line; this is called a regression
line. Its general formula is the following (1)[8]:
Y¼b0þb1Xð1Þ
The preprocessing of data which we collected during our
research has been done on a background running server.
"object":
{
"id":"HzTest_21932",
"category":{"id":"17"},
"preview":"ClassRoom",
"type":"space/polygon",
"contentId":"7711421"}},
{"area":[237,257,236,258,235,259,236,260,236,261,237,262,238,262,239,262,240,
262,240,261,241,262,242,261,243,261,244,261,245,259,246,259,247,258,247,257,24
7,256,246,256,246,255,246,254,245,254,244,254,243,255,242,256,241,256,240,256,2
39,257,238,258,238,257]
Smart Classrooms 341
An automatized logarithm selected and deleted the values
from the data set, which were beyond the measurement error
limit. We specified this error limit depending on the signal
strength, in ±5%. With this value we can reach the 1 m
accuracy in case of indoor positioning. After that, the cal-
culation of the position from the data is done through an
account on the physical web. This is necessary because the
increased calculation need by the algorithms use more
power, and with this technique it won’t draw the batteries of
the users devices. During our examinations we have
observed, that mostly the Kalman filter and the extended
Kalman filter requires the most calculation.
The basic idea of the linearized Kalman filter is to start
with a nonlinear system and then find a linear system whose
states represent the deviations from a nominal trajectory of
the nonlinear system. We can then use the Kalman filter to
estimate the deviations from the nominal trajectory. This
calculation indirectly gives us an estimate of the states of the
nonlinear system. We must use here the Extended Kalman
Filter. The idea of the EKF (extended Kalman filter) is to use
our estimate of x as the nominal trajectory in the linearized
Kalman filter. After making these substitutions into the lin-
earized Kalman filter equations and going through some
mathematical manipulations, we get the following EKF
algorithm:
State equation :xkþ1¼fx
k;uk
ðÞþwkð2Þ
Output equation :yk¼hx
k
ðÞþvkð3Þ
At each time step, compute the following derivative
matrices, evaluated at the current state estimate:
Ak¼f0^
xk;uk
ðÞ ð4Þ
Ck¼h0^
xk
ðÞ ð5Þ
We encounter it especially when we measure too much
reflected signals during recording. Of course, these errors
can be filtered further, even with as mentioned above, or
with the Bayesian Histogram (6):
fyðÞ¼X
k
h¼1
1ðnh1\ynhÞph
nnh1
ðÞ
;y2Rð6Þ
Histogram filters have been useful in robotics for local-
ization due to their computational efficiency [9]. However,
they do not offer an easy way to guarantee convergence due
to information loss in the approximation step.
Another possibility for indoor positioning is to be closer
to windows—this way we might catch GPS and GLONASS
signal. But in this case, reflected signal causes quite big
distortion. This happens due to the signal being refracted on
objects and then spreading scattered to the receiver. This
error can be filtered relatively successful with the help of the
Kalman filter, since we can monitor GPS signals [2]. If we
know which signal our smartphone is using, we can deter-
mine the corresponding satellite frequency [10]. After this,
we can use the Kalman filter by giving the original fre-
quency, which then filters out the other results as errors—
Fig. 1 Shortest path tree with beacons and stickers
342 Z. Horvath and D. Jaisut
leaving only the original and right data [6]. It is instructive
first to review the analysis step in the standard Kalman filter,
where the analyzed estimate is determined by a linear
combination of the vector of measurements d and the fore-
casted model state vector w
f
[6]. The linear combination is
chosen to minimize the variance in the analyzed estimate w
a
,
which is then given by the Eq. (7):
wa¼wfþKdHwf
ð7Þ
The Kalman gain matrix K is given by (8)
K¼PfHTðHP fHTþWÞ1ð8Þ
The error covariance of the analyzed model state vector is
reduced with respect to the error covariance of the forecasted
state as (9):
Pa¼wawt
ðÞwawt
ðÞ¼wfwt
þKðddtHwt
½½wfwt
þKddtHwfþHwt
Þ
¼IKHðÞwfwt
wfwt
TIKHðÞTKðddt
ðÞðddtÞ2KtÞ
¼IKHðÞPfIHtKt
ðÞþKWKt
¼PfKPH fPfHtKtþKHP
fHtþW
Kt
¼IKHðÞPf
ð9Þ
The analyzed model state is the best linear unbiased
estimate [8]. This means that wa is the linear combination of
wf and d that minimizes (10):
TrP ¼wwt
ðÞwwt
ðÞ ð10Þ
if model and observation errors are unibased and are not
correlated. However, even with this filtering, we could not
reach the desirable precision: multiple steps of filtering
resulted in only 67% precision in indoor positioning.
Unfortunately, neither the combination of the previously
mentioned two methods work [11]. Though, we work with
drones that are equipped with cameras nowadays, we can use
them to our advantage [7]. Here we must note that such a
camera and image-processing system is needed to be
developed that is able to process any signal fast to avoid
crashing into objects unexpectedly emerging [12].
Between the strength of signal and the distance is strong
correlation. If we walk still from beacon then the signal will
be weaker the original signal and the reflectance signals will
be stronger. If we would like clear the signals we can use
different filters. If we are talking about beacons then the
RSSI (Received Signal Strength Indicator) is very important
[13]. The RSSI value resembles the power of a received
radio signal (measured in dBm). The higher the RSSI value,
the higher the signal strength [14].
In our earlier research we have achieved satisfactory
results with the Kalman filter therefore we have used this
filter in this research again. With the RSSI we can calculated
our position from the transmitter. To this we can use the
Log-Distance path loss model (11):
SSI ¼10nlog10
d
d0
þA0ð11Þ
where
ddescribes the distance between the transceiver and
recipient
nthe signal propagation exponent
A
0
a referenced RSSI value at d
0
Usually d
0
is taken to be 1 such that A
0
becomes the
signal strength measured at a distance of 1 m of the device.
The general form of the Kalman filter is as follows (12):
xk¼Fkxk1þBkUkþWkð12Þ
where
F
k
is the state transition model which is applied to the
previous state x
k−1
;
B
k
is the control-input model which is applied to the
control vector U
k
;
W
k
is the process noise which is assumed to be drawn
from a zero mean multivariate normal distribution with
covariance Q
k
The Kalman filter is a minimum mean-square error esti-
mator. The error in the a posteriori state estimation is
xk^
xkj. We seek to minimize the expected value of the
square of the magnitude of this vector. This is equivalent to
minimizing the trace of the a posteriori estimate covariance
matrix P
k|k
. By expanding out the terms in the equation
above and collecting. The trace is minimized when its matrix
derivative with respect to the gain matrix is zero. Using the
gradient matrix rules and the symmetry of the matrices
involved. Solving this for K
k
yields the Kalman gain (13):
Kk¼Pkjk1HT
kS1
kð13Þ
This gain, which is known as the optimal Kalman gain, is
the one that yields MMSE (Minimum mean-square error)
estimates when used. With this we can separate the reflec-
tance signals from the originals. Furthermore here we used
the Dijkstra’s shorthest path algorithm for the indoor posi-
tioning, which was the medium, where we implemented the
values from the RSSI. During the positioning we used a
weighted graph G=V,E,/, where Vis a nonempty set of
Smart Classrooms 343
nodes; Eis a set of edges, one for each link; and /is a
weight function from Eto nonzero positive real numbers.
The number of nodes is denoted n, and the number of the
directed edges m. A directed edge in Eis denoted by an
ordered pair of nodes from V.
On the next figure (see Fig. 1) we can see, that we located
the geolocalized beacons on the important junctions, while
we located the simple beacons in the classrooms, and we
used the stickers in the offices. The purpose of the latter’s
that we can track the user inside the building with them.
Since we located this stickers (they are beacons, they called
stickers because of their size) on the laptops of the teachers.
The intent with this was that if a student is looking for one of
the teachers, but the teacher he is looking for is not in his
office, then the student can check on our map, where is the
teacher currently (assuming that he took the device with
himself), or if the device was in the office without the tea-
cher, then with the help of the physical web the teacher
could have left a message for the students, that when is he
going to be available again.
Inside the building we could count the path in two dif-
ferent ways with geolocalized beacons. One of the paths was
the path for disabled people (barrier-free), while the other
was the shortest path. We have used the simple beacons,
because—as we mentioned earlier—the students can reach
the electronic curriculum, and a schedule of a given class-
room. (Note: Stickers were available with an Android device
only after if they were activated with a device which uses
iOS system.).
3 Results
In our research we take some new places that are available
from lots of different and popular maps (google maps, Bing
maps and Here maps). We did do that is accessible to as
many platforms our solution for indoor navigation. Via Here
or with LiveSight we can show where are this places. On the
map are the two classrooms, which can cater to our beacons.
This are with F/103 and F/104 ID. The positioning was
conducted at the classroom F/107. After this the gyroscope
and accelerometer detects the movement plus the user can
see via mobile screen his location because the mobile camera
is working in this situation [15]. In the background our
framework working with the basic map and this give the
beacons positions if we are out of the beacons range. Indoor
positioning is achieved with a hybrid solution, as mentioned
earlier [16]. The position of classrooms available via phys-
ical web and with the beacons ID. With this method this
information is readable with two different methods. This
methods are independent from each other, so if the beacons
are not available then we can do the positioning using the
map. At the positioning with beacons used in commonly
known triangulation (see Fig. 2). The beacon signal strength
was set, to enable the operation point without disturbing
each other.
The red circle means the range of each beacon—this set
with signal strength—which is 2.5 m because this is the
critical distance (just in our this research!) where we can
filter the reflectance signals, thus the accuracy of the mea-
surements was 12 cm (without filters). The green ‘cloud’
means the broadcast of signals [17]. This is so important
because these are causing inaccuracies in determining the
position. Another succeeded in reducing the scatter signals
when the beacons compiled towards the inside of the room,
and aluminum foil was placed between the backsheet and the
wall. With this methods we can control the scatter of signals
and this will not cause such a large confusing overlap of
adjacent beacons. In this case the accuracy would decrease
by 7 cm. We can show in the F/103 classroom [18] big
scattering which is the result of a cooled down room and a
reduced humidity. As mentioned earlier, the air character-
istics greatly influences the spread of broadcast by the bea-
con signal, this can be seen in the following Table 1.
With the temperature increase the positioning accuracy is
decreased which is the main cause of humidity. The water
containing big molecules breaks the waves as a distortion of
the results. As demonstrated by the table, 10 (C) inch
increase in temperature will cause almost 12 cm distortion.
Furthermore important fact that the increase in energy con-
sumption, which increased almost by 80%. In this case, if we
can control the humidity, it can be reduce the aforemen-
tioned adverse effects. We can show this in the next Table 2.
In this case the signals need not cross on the bigger
molecules water droplets (which break the signals’way) so
they can spread faster and easier. This means that the battery
lifetime will be longer because there is no need to strengthen
the signal strength to more preciseness results. The precision
of the results can be improved further by using the Kalman
filter, the accelerometer and gyroscope combination. When
the device finished with the positioning at the classroom then
the user confirm that he/she is at the classroom. At this time
the device identified the original signal and ignore the others.
After this two-step when the user start walking then come
the accelerometer and the gyroscope. From this data’sof
sensor and with the basic map calculate our system which
beacon whose will meet the signal of the device [18]. There
is a need of a Kalman filter, with, in this case, we can reduce
errors caused by scattered signals. We cans how this results
in Table 3.
Of course, the system is self-development, so if you
position the device has been carried out to confirm at bea-
cons, then the next time it will automatically detect the initial
signs of that beacon. This results are in the next Table 4.
As shown in table, no significant differences were is
observed between the use of the Kalman filter and ignore. It
344 Z. Horvath and D. Jaisut
Fig. 2 Beacon range with reflectance signals without Kalman filter
Table 1 Factors of air affecting the characteristic of a positioning
Temperature (°C) Density (kg/m
3
) Humidity (g/m
3
) Energy (mAh/day) Accuracy (cm) Range (m)
20 1.2045 17.3 162 5.7 2.5
25 1.1843 23.7 192 9.2 2.5
30 1.1648 30.4 287 17.3 2.5
Table 2 Factors of air affecting the characteristic of a permanent positioning humidity conditions
Temperature (°C) Density (kg/m
3
) Humidity (g/m
3
) Energy (mAh/day) Accuracy (cm) Range (m)
20 1.2045 17.3 162 5.7 2.5
25 1.1843 17.3 178 6.2 2.5
30 1.1648 17.3 192 6.6 2.5
Table 3 Accuracy of positioning with and without Kalman filter
Classroom Signal-strength
(dBm)
Humidity
(g/m
3
)
Accuracy (without Kalman
filter)
Accuracy (with Kalman
filter)
Range
(m)
F/103 45 17.3 5.7 2.8 2.5
F/107 45 17.3 6.2 3.2 2.5
F/104 45 17.3 6.6 3.2 2.5
Table 4 Accuracy of positioning with self-learning system
Classroom Signal strength
(dBm)
Humidity
(g/m
3
)
Accuracy (without Kalman
filter)
Accuracy (with Kalman
filter)
Range
(m)
F/103 45 17.3 2.9 2.8 2.5
F/107 45 17.3 3.4 3.2 2.5
F/104 45 17.3 3.1 2.9 2.5
Smart Classrooms 345
is therefore advisable in the second, but no later than fourth
positioning confirmation disabling the Kalman filter. Of
course, helpful use of the filter, however, the performance
computations is resource-intensive, making the battery life
will be shorter. This will not be evident during at single
indoor navigation, but rather also for use in a half or full day.
The resource requirements use of the Kalman filter is
described in the following Table 5.
The difference between the F/107 and F/103-104 class-
rooms is due to much more diffuse signals in the product,
because there are more densely placed the beacons. So it
takes longer to filter out the first verification of the original
signal positioning. The use of the filter is still an extremely
important factor that the physical web browser content we
can open.
4 Conclusion
The goal of our research was to achieve indoor navigation,
using the tools available to everyone nowadays. We used
smart phones sensors during our investigations, as the
accelerometer, gyroscope and the compass, and the beacons
as output peripheral. It functioned as a physical web output
peripheral, where you not only can see the rooms where the
user’s position, but also endowed with extra information.
The navigation as a kind of background support, have pre-
pared a basic map about the test area. This map is available
on mobile platforms and the user can see in real-time where
to moves actually in the building. To the detection of
moving as mentioned above helped the accelerometer and
gyroscope. The beacon signals used in indoor positioning
with triangulation techniques. Indoor we meet very often
with reflected signals so very important that we must sepa-
rate this from original signals. To this we have used the
Kalman filter in the previous research and successfully fil-
tered the signals, thereby specifying the measurement results
are. We have just completed the solutions listed in the
phones with ‘vision’function. This was done using the
back-panel camera as it can make LiveSight applications.
Here come up as POI the places which made by us and as it
can be achieved the indoor navigation. The next step will be
at our research that we use the geofences function which is
available at beacons. In this case some beacons will not be
fixed, we will also put on this beacons on drones, smart-
phones etc. The fixed beacons sense this ‘mobile’beacons
when arrived in the range and this information will be visible
on the map and in which direction it moves towards the next
beacon. Naturally this information are implementable in our
indoor map as development another map will not be
necessary.
References
1. Horvath, Z., Horvath, H.: More sensors or better algorithm? Int.
J. Comput. Comm. Control (IJCCC) (3). Springer, Heidelberg
(2014)
2. Horvath, Z., Horvath, H.: The measurement preciseness of the
GPS built in smartphones and tablets. Int. J. Electron. Comm.
Technol. 1(5), 17–19 (2014)
3. Horvath, Z., Ildiko, J., Wu, T., Xuan, C.: Sensitivity of Sensors
Built in Smartphones. ISBN:978-3-662-47926-1 (2015)
4. Ding, N., Wagner, D., Chen, X., Pathak, A., Hu, Y.C., Rice, A.:
Characterizing and modeling the impact of wireless signal strength
on smartphone battery drain. In: Proceedings of the ACM
SIGMETRICS/International Conference on Measurement and
Modeling of Computer Systems, pp 29–40 (2013)
5. Galvan-Tejada, C.E., Garcia-Vazquez, J.P., García-Ceja, E.,
CarrascoJiménez, J.C., Brenaa, R.F.: Evaluation of four classifiers
as cost function for indoor location systems. Procedia Comput. Sci.
32, 453–460 (2014)
6. Yang, S.C., Kalnay, E., Hunt, B.: Handling nonlinearity in an
ensemble Kalman Filter: experiments with the three-variable
lorenz model. Mon. Weather Rev. 140(8), 2628–2646 (2012)
7. Valavanis, K.P., Vachtsevanos, G.J.: Handbook of Unmanned
Aerial Vehicles. https://doi.org/10.1007/978-90-481-9707-1_144.
Springer, Heidelberg (2015)
8. Gerrit, B., Van Leeuwen, P.J., Evensen, G.: Analysis scheme in
the ensemble Kalman filter. Mon. Wea. Rev. 126, 1719–1724
(1998)
9. Stella, M., Russo, M., Begušic, D.: Fingerprinting based localiza-
tion in heterogeneous wireless networks. Expert Syst. Appl. (2014)
10. Rébay, V.: Possibility of using smartphones in distributed
computing networks. In: Proceedings of the International Confer-
ence on Advances in Computer & Electronics Technology—
ACET2014, pp. 114–118. (ISBN:978-1-63248-024-8),
Hong-Kong (2014)
11. Sa, I., Hrabar, S., Corke, P.: Outdoor flight testing of a pole
inspection UAV incorporating high-speed vision. In: Field and
Table 5 Change of energy use with and without Kalman filter
Classroom Signal strength (dBm) Humidity (g/m
3
) Energy with filter (mA/min) Energy without filter (mA/min) Range (m)
F/103 45 17.3 4.7 1.2 2.5
F/107 45 17.3 3.8 0.9 2.5
F/104 45 17.3 4.6 1.3 2.5
346 Z. Horvath and D. Jaisut
Service Robotics (105) of the series Springer Tracts in Advanced
Robotics pp. 107–121. https://doi.org/10.1007/978-3-319-07488-
7_8 (2015)
12. Dandois, J.P., Olano, M., Ellis, E.C.: Optimal altitude: overlap,
and weather conditions for computer vision UAV estimates of
forest structure. Remote Sens. 7(10), 13895–13920. https://doi.org/
10.3390/rs71013895 (2015)
13. Liang, Y., Jia, Y.: A nonlinear quaternion-based fault tolerant
SINS/GNSS integrated navigation method for autonomous UAVs.
Aerosp. Sci. Technol. 5(40), 191–199 (2015, Jan)
14. Bulten, W.: Kalman filters explained: removing noise from RSSI
signals. In: IEEE International Conference on the Internet-
of-Things Design and Implementation. https://www.
wouterbulten.nl/blog/tech/kalman-filters-explained-removing-
noise-from-rssi-signals/. Last accessed 21 June 2017
15. Castro, P., Chiu, P., Kremenek, T., Muntz, R.: A probabilistic
room location service for wireless networked environments. In:
Ubicomp, Ubiquitous Computing, pp. 18–34. Springer (2001)
16. Galvan-Tejada, C.E., Garcia-Vazquez, J.P., Brena, R.: Magnetic-
field feature reduction for indoor location estimation
applying multivariate models. In: Artificial Intelligence (MICAI),
12th Mexican International Conference on IT, pp. 128–132, IEEE
(2013)
17. Albawendi, S., Appiah, K., Powell, H., Lotf, A.: Overview of
behavioural understanding system with filtered vision sensor. In:
2015 International Conference on Interactive Technologies and
Games. https://doi.org/10.1109/itag.2015.21 (2015)
18. Rautaray, S.S., Agrawal, A.: Vision based hand gesture recogni-
tion for human computer interaction: a survey. Artif. Intell. Rev.
43(1), 1–54. Springer, Heidelberg (2015)
Smart Classrooms 347
Social Media and Disaster Management
in India: Scope and Limitations
Dhanashree Giri and Aman Vats
Abstract
Social media, as a boon to internet users has emerged as
the first choice of communication among the youth world
over. It is being used phenomenally by the youth these
days for connecting with each other in terms of data
sharing, collaborating, exchanging views, and so on. In
fact, social media has time and again proved its utility
during emergency situation. Be it Nepal earthquake 2015,
Cyclone in Odisha 2013 or Floods in Queensland in 2011,
social media has played a vital role in informing and
bringing the world together on one platform in dealing
with disasters. Though, social media fast is becoming one
of the widely used mode of communication, it is
important enough that the scope and limitations of social
media are explored and understood. Social media pro-
vides platform for dissemination of disaster information
such as observing situations in remote areas, public
tracking from ground zero, for collaborative develop-
ments such as collecting donations, providing a platform
for people with similar ideologies to unite, and so on.
While there are positive sides of social media, there is no
denying from the fact that it has its own drawbacks like
spreading rumours, promoting ill-fated acts such as
terrorism and cyber-crime like “ransomware”. Regardless
of the fact that social media is indirectly a breach of
privacy, it is gaining reputation world over for its
usefulness. In short, this mode of communication is here
to stay and grow with time and with paradigm shift of use
of media from one way communication to two way
message dissemination, it equally becomes important that
disaster managers include social media in their scheme of
things as well. This paper highlights the advantages and
disadvantages of using social media in disaster situations
and figures out the scope of this medium of mass
communication and limitations that can be potential threat
to social media’s extensive use with reference to disaster
management in India. The literature review research is
carried out by the researchers to develop the three case
studies in order to detail possibilities of social media’s use
in disaster preparedness particularly, warning system,
education, awareness generation and data base
management.
Keywords
Social media Disaster relief Information dissemina-
tion Crisis management Disaster preparedness
1 Introduction
Social media has become the most popular channel of
information and communication in today’s world. It is pre-
dominantly dependent on internet. India was exposed to the
internet in 1986, when the Educational Research Network
(ERNET) was initiated in the country. In Indian context
ERNET was the precursor to the internet. The ERNET
mainly provided support for the Research and Educational
purposes in the premier education institutions of the country.
Initially, the usage of the internet was mainly restricted to
emails, which was not a formal mode of communication at
that period in time and even the legal sanctity of the emails
could not be vouched for. However, over three decades of
induction of internet in India, there has been radical change
in the usages of the technology. On August 15, 1995, Videsh
Sanchar Nigam Limited (VSNL) launched public internet
access in India [1]. With this the general population of India
began to get internet access. The desktop computers were
mainly used for accessing the internet initially. Gradually,
with the advancement in the Personal Computers, the usage
of internet became more popular in India. Its use proliferated
D. Giri (&)A. Vats
Amity School of Communication, Amity University, Noida, Uttar
Pradesh, India
e-mail: giridhanashree3@gmail.com
A. Vats
e-mail: avats@amity.edu
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_41
349
with the advent of laptops, tablets, and later the mobile
phones especially low budget smart phones.
The introduction of 2G/3G/4G technology, which
brought high internet speed at comparatively low cost and
provision of large amount of data download facility, added
to the spread of the internet technology. The ease of use
internet technology by people of every walk of life also
offered the foundation for the use of internet technology
driven media in cases of emergencies.
Last decade of the twentieth century and the first decade of
the millennium saw a surge in various social media network-
ing sites, popular sites were Orkut, and Hi5 provided a plat-
form for sharing the information immediately. When people
were just learning to use these types of two way communi-
cation tools, an all-new variant Facebook was introduced in
2004 which became very popular among the youths. It revo-
lutionised the world of social networking. Since then, social
networking platforms have been used for variety of purposes
like sharing photos, video, location sharing, phone, video
calling and advertising. Moreover, Facebook also paved way
for many other social networking podiums such as WhatsApp,
Instagram, Flickr, LinkedIn, Twitter, SnapChat, WeChat and
so on. The developments in the networking field and intro-
duction of broadband network and Wi-fitechnologies, sup-
ported with the introduction of smartphones that gradually
became affordable even to the low income group of popula-
tion, resulted in the rise of social networking sites usage. This
rise also resulted in demand for development of one touch,
easy to use applications which are for short called “Apps”.
These App-based interactions further increased the familiarity
and popularity of the Smart phones, and other mobile devices
such as tablets increasing social media users manifold.
Today, after almost 30 years of introduction of internet in
India, social networking in this country is so high that India
has become the second largest user of internet [2] in the
world with record of 342.65 million subscribers in the year
2016 [3]. Twitter and Facebook, in recent past, have done
tremendous jobs in breaking the news not only in normal
situations, but also in emergencies and during disasters. With
increasing number of users and user friendly applications for
all sorts on devices like desktop, laptop, palmtops and
mobiles, the internet penetration in Indian household seems
to be doing quite well. Even while analysing the main-
streaming media handling of the disaster management, the
vital role played by internet technology cannot go unrec-
ognized and that of social media can never be undermined.
In the past few decades there is an increase in the
occurrence of disasters due to climatic, tectonic and
unplanned human activities. Certainly, the vulnerabilities
have also increased the focus of media onto the issue arising
out of various hazards that surrounds the society at large.
Floods in India, is a very common phenomenon and with its
increased frequency, the concern of media—broadcast,
electronic or print, have increased in reporting as well as
supporting the public in the time of disaster. The induction
of social media is of great hope for the disaster management
experts and also the general masses for dealing with various
phases of disaster management such as early warning, pre-
paredness drill, rescue and evacuation, rehabilitation and
resettlement.
The research questions of this study are to examine:
•Whether the social media has been used for dealing with
the disaster in any country? If so, what are the learning
points?
•Whether, India can also emulate the success stories of
social media in dealing with the disaster?
•What may be the limiting factors for success of social
media in disaster management?
The three case studies viz., Haiti Earthquake case of
2010, Queensland flood 2011, and Chennai flood 2015,
discussed below, depict the success of the social media in
dealing with emergencies caused by disasters in the
respective countries.
1.1 Haiti Earthquake 2010
In January 2010, Haiti was hit by a severe earthquake which
recorded 7.0 magnitude on the Richter scale. The official
report states that more than 200,000 people died and as
many were left homeless and affected, with estimated
damage of 8.1 billion US Dollars, by the massive quake [4].
The CNN reported the earthquake news in Haiti only after
pictures of the massive quake was first posted on Twitter and
Facebook. During Haiti earthquake the unparalleled use of
Information System (IS) increased [4]. “Twitter reporting is
so fast and real that, by the time mainstream media aired
those extreme events, they already became a trend word on
Twitter search”[5]. While Twitter was faster than main-
stream media during Haiti tragedy, Google also introduced
“Google Person Finder”for the first time on the electronic
media platform, which was deployed to work as tool for the
people to find their kin stuck in disaster. This tool is usually
embedded during crisis situations on the Google’s website,
which also features disaster tools like satellite photographs,
shelter locations, road conditions, and power outage infor-
mation generation, that supports in providing faster, better
and real time response during crisis situation [6]. Launched
by few Google volunteers, Google Person finder tracks a
person through targeted advertisements, Analytics tool and
personalized search engine results that is helpful in crisis
times for finding a person [7].
“In emergencies, there is a critical time constraint on
evacuating affected people, locating and delivering available
350 D. Giri and A. Vats
resources, as well as generating relevant information and
distributing it to appropriate parties in a timely manner.
Relevant data are crucial to making informed decisions
about where to focus attention and where to distribute lim-
ited resources; however, how to obtain reliable, accurate,
and timely geospatial data is always a challenge, especially
in situations where disasters develop rapidly”[8]. In such
circumstances, social media’s interventions have certainly
been helpful in minimising the time required to disseminate
information. Twitter and various blog have played major
role in dissemination of timely information in various
international agitations in the past, like in the protest held in
Iran in 2009. In Haiti earthquake, for the first time, Twitter
was also used as a source to raise funds of more than eight
million US Dollars for the earthquake victims [9]. Not only
Twitter, social media enthusiasts have also mainstreamed
Facebook in sending out information related to crisis situa-
tions to the family and friends.
During Haiti crisis, many groups emerged on Facebook
for fundraising and getting disaster related updates.
According to reports of Pew Research Center Journalism &
Media, 2010 [9], a group named “Earthquake Haiti”had
nearly 170,000 members, making it one of the largest groups
on Facebook for Haiti Earthquake relief. During this event,
people were using social media as never before, and were
exploring different ways to call for direct action. Instead of
linking news to other sources of information, Twitter was
significantly used for making call for action purposes,
especially, for raising money for the victims. “In fact, the
majority of the 2.3 million tweets on the subject were not
original posts, but were instead re-tweets of something
another person had already posted. According to Sysomos,
59% of the tweets about Haiti were re-tweets. Many of those
re-tweets involved the campaign to use text messaging to
raise funds for the Red Cross. Anyone with a cell phone
could text the word “Haiti”to 90999 and $10 would be
added to their phone bill as a donation to the effort.”[9]. It is
evident that blogging, micro-blogging sites and mainstream
social media websites like Blogs, Twitter, Facebook and
Instagram respectively are being used as never before in
information generation during disaster times in helping
managing the crisis situation.
Thus scope of social media during Haiti earthquake, has
been clearly seen from quick information dissemination, to
fund raising drive and also Google persons finder thus
paving the way for using tools like Facebook, Twitter,
Flickr, and other blogging sites to send out information to
different parts of the world and different sections of society.
1.2 Queensland Flood 2011
Another success story of Social media can be traced in its
use by Queensland Police Department during Floods in
2011. In the year 2010–2011, Victoria (a state in Australia)
was hit by series of floods (beginning in September 2010
through March 2011). Due to good reach of internet net-
work, even during the floods people were connected with
each other. Social media was flooded with information on
the disaster and people were kept informed by the use of
social media tools like Facebook and other blogging sites.
“The Victoria State Emergency Service (VICSES) provided
information to communities through social media and also
developed a strategic intelligence capability to obtain intel-
ligence from social media sources”[10]. Majority of people
were informed through the Facebook page, which was cre-
ated by Queensland Police Service for providing regular
updates on the floods. A report by [11] specified that 74%
respondents acknowledged using government or media
Facebook groups and websites with an overwhelming
majority visiting the Queensland Police Service Facebook
group. Other sources like the State Emergency Services
(SES), Australian Broadcasting Corporation (ABC) News,
Bureau of Meteorology, VicRoads (Victoria Roads
Authority), Victorian Police, Royal Automobile Club of
Queensland (RACQ) and various other commercial and non-
were also referred to by the respondents during the disaster.
In this event Facebook was more prominent source of
information than Twitter. As Associate Professor Axel Bruns
and Dr. Jean Burgess from the Queensland University of
Technology admitted that the most popular hashtag (#) used
on Twitter was #qldfloods. They argued that average of
fourteen to sixteen thousand tweets per hour was recorded
during the disaster. These hashtags were strategically used
for the appropriate co-ordination and information dissemi-
nation [12]. During the floods Police Media of Queensland
Police Service department was deployed for reaching out to
the public in timely manner. Some of the services provided
by Police Media in the event were—timely dissemination of
information related to disaster through the use of social
media sites (Facebook and Twitter in particular), live
streaming of videos related to floods especially, media
conferences of Queensland Police Service (QPS) via Face-
book and their YouTube channels. Three major hashtags
#qldfloods, #TCYasi or #mythbusters were used for dis-
semination of information on Twitter. Same were used while
uploading daily audios of local coordinators of the state on
Facebook; myth busting information dissemination and 24*7
Social Media and Disaster Management in India …351
moderation of social media accounts of QPS; coordinating
with language interpreter to assist foreign tourist during
crisis [13]. Analysing the variable of timely dissemination of
information, it is clearly argued that QPS was attentive
during the flood peaks, which certainly helped QPS in
posting regular tweets and audio and videos on Facebook
even during the odd hours. Moreover since the content was
being posted by the Police, it was definitely more trust-
worthy and there was less scope of rumours being dissem-
inated. All this made the QPS post reliable source along with
print media (newspapers) and broadcast media (TV and
radio). In the report of Queensland Police Service—Disaster
Management and Social Media—a case study [14], the
graphical representation shows that Facebook “likes”, sud-
denly went up from 20,000 to 160,000 in just one month
between Jan and Feb 2011, when disaster was in its peak.
This definitely represents that improvement of technology
has led to a shift in the patterns of media usage. Many people
are now connecting on social media and they completely
rely on the information shared on this electronic platform
(Fig. 1).
In Queensland Flooding case, the use of face book was
more prominent in comparison to twitter, face book and
Google person finder. “Safety Check”feature launched by
Facebook was supported by its location tracking feature.
Thus Social media has spread its wings ever since its
inception and when it comes to disaster management, the
scope has been widened.
1.3 Chennai Floods 2015
An example of extensive use of social media in India can be
traced to December 2015 when Chennai was hit by series of
heavy rainfall which resulted in severe urban floods. It lasted
for more than a month. The National Disaster Response
Force (NDRF) was busy in rescue and relief operations, A
strategy was framed to reach people through social media
instead of being dependent more on broadcast media/print
media. The information sharing was quick through social
media. Social media platforms such as Facebook, Twitter
and WhatsApp being two way communication podiums on
which, people can not only receive messages, but also they
can send instant videos, messages to share real time infor-
mation instantly across the globe.
It is evident from the study carried out by [15] that about
63% people accepted using social media for news and
information. During Chennai floods, each and every call,
tweet, SMS, WhatsApp message, email and phone calls or
any other electronic traffic coming from Chennai was being
acknowledged by few dozens of National Disaster Relief
Force (NDRF) personnel working 24 7 for response and
relief. Giving social media usage a totally different direction
this NDRF team was responding to the messages sent by the
victims to ensure people feel they are being heard and relief
is reaching out to them.
The messages which were coming in from all social
media channels were disseminated to the teams working at
Fig. 1 Growth of “Likes”on
Facebook page of QPS from May
2010 to February 2011 [13]
352 D. Giri and A. Vats
ground zero. The NDRF was also posting pictures on its
Twitter handle @NFRFHQ and some of the trending hash-
tags were #NDRF, #ChennaiRains, #PrayforChennai,
#ChennaiFloods. During Chennai floods, whole community
came together to save lives. Private companies like Ola (a
taxi ride company) also launched boat rides app free of cost
for rescue operations [16]. Skype also announced free
international calls on landline and mobiles. Facebook used
its “Safety Check”tool on its home page. This tool was
incidentally first launched during Nepal Earthquake. The
search engine giant Google also initiated a link “Resources
for Chennai Floods”to help the victims. Moreover, some
Indian companies like Reliance, Vodafone, Aircel also were
offering free benefits to those stuck in floods. Airtel (one of
the Indian telecom establishments) offered loan credit of Rs.
30, free calls benefit and about 50 MB data to the flood
victims [15]. Chennai floods, was considered to be one of
the costliest disasters in the history, with estimated loss of
$2.2 billion out of $6.2 billion was incurred during Chennai
Floods [17]. WhatsApp calls were convenient for connecting
with family and friends as it had lower call drops. Paytm
(money transfer and payment application) worked as a
bridge between those who wanted to donate and the flood
survivors during the calamity.
Some of the images below provide the evidence that
social media has spread its fangs and not just Twitter and
Facebook but other electronic sources are also becoming
more useful in the disasters. A team led by Professor Amit
Seth, who has already worked in Jammu and Kashmir
Flooding in 2014, developed crowdsourcing maps to provide
help to people who were worried about their kin stuck in
floods [18]. It provided necessary data about flooded street
and locations of flood relief camps. Blogging communities
like Chennai Rains were broadcasting regular weather
updates to reduce the rumours related to weather (Figs. 2,3
and 4).
2 Discussions and Recommendations
These achievements indeed help concluding that social
media has a lot of scope in the future. While there are
scopes, and achievements that can never go unnoticed, yet
there are some limitations that must be taken care of while in
disastrous situations.
2.1 Scope
During the dawn of millennium, GIS technologies were the
only source of collection of geospatial data. Although, a very
effective tool to get satellite imagery of the disaster hit
region, it is expensive and takes time to generate images.
Adding to it, this mechanism lacks information sharing and
collaborating during disaster times [8,20]. It was felt that
there was a need to mainstream social media into disasters as
well. In the recent past many protests and agitations have
been handled and coordinated with the use of social media.
With Haiti earthquake, social media’s worth was also
applied to disaster situations. From fund raising to mapping
out disaster hit areas, social media’s scope has increased in
no time.
According to [8], “social networks can play two major
roles in effective emergency management. First, information
generated and disseminated over social networks is incred-
ibly valuable for disaster response. Second, the study of the
relationships, behaviours, and interactions in social networks
may provide important insights for gathering information,
planning evacuations and sheltering, and other rescue
efforts.”Social media has become integral part of our lives
and it has a very high consumption in the today’s time.
During Queensland Flood more than 1200 tweets were
recorded every hour, which proves the widespread use of
social media in dissemination of information faster than any
other media source [21].
Fig. 2 Location finder launched by Facebook during disaster in
Chennai [19]
Fig. 3 Facebook launched safety check feature during events like
Nepal earthquake and Chennai floods [19]
Social Media and Disaster Management in India …353
Talking about social media, every platform that falls under
this category has different roles to play during the disaster.
Since, Twitter is a micro-blogging social media site, it can be
used for faster dissemination of short but effective messages
like SoS texts and fund raising notes. Facebook has a totally
different use, when it comes to disasters. This social media
platform can be useful for sharing videos and photos related to
disasters, information like coordinating activities, locating
family and friends that is much sorted on Facebook than any
other social media. While YouTube can play vital role in
dissemination of information from the local coordinating
government bodies, WhatsApp and Skype can connect people
from around the globe. During disaster many teams and
experts are coordinating with people stuck in the situation.
With social media connecting with people in the disaster hit
region from a remote area has become easier than before.
Availability of Big Data has also enabled people with
multi-dimensional use of social media. Big Data is set of
large amount of complex and unorganized data that is col-
lected from networks all around the globe and produced into
comprehensive analytics that can be used in improving
business operations and now also in disaster response [22].
“Big data helps create a kind of spatial data infrastructure,
making the foundation of policies, protocols, and ways to
exchange information an on-going priority. Such sharing of
data helps both responders and survivors to create new
best-case scenarios”[22]. Using crowdsourcing maps is the
latest trend being incorporated in disaster relief that can be
produced using Big Data analytics. The differences between
Twitter and Facebook also came into play, where Twitter
was used for widespread, fast communication of informa-
tion, Facebook was used for providing detailed information,
such as coordinating activities and contacting flood-affected
friends and family [21].
Some of the potential areas where social media has
important space are:
(1) Use of social media can help in locating people in
disasters like in Chennai Flood.
(2) A two way communication enabled by social media is
far better than other media sources.
(3) Information dissemination is quicker which lets people
take necessary action in timely manner.
(4) Raising money for help and collaboration with impor-
tant organisations become easy as seen in Haiti
Earthquake.
(5) Relief operations are more timely and effective as evi-
denced in Chennai flood.
(6) Social media provides information to local authorities
alerting them for calamity like situations thus providing
opportunities for early/timely evacuation from the areas
prone to disasters.
(7) Continuous data collection and dissemination of new
information can be very useful.
Fig. 4 Flooded streets mapped
by using crowd sourcing for the
purpose of helping people stuck
in floods [19]
354 D. Giri and A. Vats
2.2 Limitations
With increasing scope of advanced technology, there are
limitations too. With advanced technology and increasing
use of social media, the question often arises whether the
news or videos circulated in social media are real. This is
due to improper use of social media which raises finger on
the reliability of such media. A misuse of social media may
lead to questioning its credibility and authenticity. Regular
monitoring of social media becomes necessary, if it is
serving disaster issues. Disaster situations often are associ-
ated with some rumours and some hype.
According to [5], rumours are collective behaviour sur-
rounding information and based on the psychology of
humans. This means when disaster strikes, many people are
looking to get first hand situation report. Due to this
eagerness to get information about the surroundings, often
some people try to mislead and spread rumours thus,
sometimes leading to tension and agitation, which otherwise
could be avoided, if social media information is regularly
watched and monitored by the responsible authority. While
we see that in Haiti earthquake, rumours did circulate, which
might have led to difficulty in rescue operations. In disaster
like Queensland Flooding and Chennai Floods, this aspect
was taken care of well from the beginning as most of the
social media activity was being monitored by government
sources. Any scope of misinformation or rumour was elim-
inated by issuing clarification audio or video messages by
the authorized agencies on the concerned pages and media.
Accessing first hand authentic data is one of the most
important concerns that strike along with disasters. Addi-
tionally there is always a trust issue in accepting information
generated by volunteers [23]. According to [3], in India the
broadband users are 149.75 millions and narrowband users
are 192.90 millions while the population of India is more
than 1.3 billion and rising every hour [24]. Looking at
current scenario, even though social media has been
increasing its scope, but with the ratio of broadband users
and population scenario in India, it is evident that many
people in India are still deprived of social media availability.
Moreover, when urban and rural population is compared, the
user ratio varies 609.69 million to 449.17 million respec-
tively [3]. This means that most of the rural population is yet
not connected with internet/broadband/telephone services
and in such situation, social media usage seems a far cry.
Adding to this constraint, not everyone is comfortable using
social media, especially, older generation, people in the
lower economical strata and those who are not literate.
This also means that not everyone can possibly handle
social media accounts in professional manner. Disaster man-
agers need to be trained in using social media before they are
sent to respond to disaster events. According to [25], the
public’s views on the disaster and response to it could be
erroneous, immediate corrections, necessitating a commit-
ment of communications resources, may be necessary. This
means that not everyone would have same views related to
disaster rescue and relief operations and during crisis times it
becomes necessary to keep a check on what people are posting
throughout all social media channels. The negative views of
people during crisis can further complicate the situation. Such
chaos definitely becomes overwhelming at the time of crisis
and this could rather be an added burden to the people moni-
toring social media sites regularly during disasters [25]. Some
significant disadvantages in the use of social media are:
(1) The scope of developing rumours cannot be ruled out
from social media.
(2) Misuse of data available on social media serves as a
high potential risk for losing privacy.
(3) At times, authenticity of the information spread through
social media cannot be trusted.
(4) Monitoring rumours on social media can be difficult
task. It needs to be cleared immediately through
prompts, videos and audios, which can be a time taking
task.
(5) Internet in India is not available to each and every class
of people, which restricts the use of internet to mostly
urban and few rural population.
(6) Few segments of population do not fully understand the
use of social media and they are not even interested in
connecting with the world through social media
networking.
(7) Even if the technology is provided, most of the people
working at the ground level during crisis do not
understand the usage of social media and are not very
comfortable in disseminating information through
social media.
(8) Training the professionals who hail from different strata
of society for using social media in disaster time can be
a huge task.
(9) Network connectivity issues are common in the higher
altitudes in India and this definitely means that not
many people are exposed to social media who live in
hills.
As the final conclusion researchers would like to submit
that social media if utilised in a streamlined and objective
manner can prove to be constructive tool in mitigating the
post disaster complications in any eventuality. The focus of
all the stakeholders needs to be on the maximum utilisation
of the platform in a restrained way so as to drive maximum
benefits without confounding the chaos and uncertainty.
Social Media and Disaster Management in India …355
References
1. Ramani, S.: The story of how the internet came to India: an
insider’s account (14 Aug 2015). Retrieved from News18.com:
http://www.news18.com/news/tech/the-story-of-how-the-internet-
came-to-india-an-insiders-account-1039533.html
2. Verma, L.K., Goyal, R.: Internet penetration and e-commerce
developments in India. Int. J. Innovations Adv. Comput. Sci.
(4 May 2015) (Special Issue). Retrieved from http://www.
academicscience.co.in/admin/resources/project/paper/
f201505031430646289.pdf
3. TRAI: TRAI Annual Report 2015–16. Telecom Regulatory
Authority of India, New Delhi (2016)
4. Dugdale, J., Van de Walle, B., Koeppinghoff, C.: Social media and
SMS in the Haiti earthquake. In: WWW 2012 Companion—
SWDM’12 Workshop. ACM, Lyon (2012). Retrieved 08 09 2017
from https://www.researchgate.net/publication/241624291_Social_
media_and_SMS_in_the_Haiti_Earthquake
5. Oh, O., Kwon, K.H., Rao, R.H.: An exploration of social media in
extreme events: rumor theory and twitter during the Haiti
earthquake 2010. In: Thirty First International Conference on
Information Systems. Gateway to the Future, St. Louis (2010)
6. Google Person Finder: Wikipedia. https://en.wikipedia.org/wiki/
Google_Person_Finder. Accessed July 2017
7. Vince: How google person finder helps in times of disaster (14
Nov 2013). Retrieved from Vulcan Post: https://vulcanpost.com/
1765/google-person-finder-helps-times-disaster/
8. Li, L., Goodchild, M.F.: The role of social networks in emergency
management: a research agenda. Int. J. Inf. Syst. Crisis Response
Manage. 2(4), 49–59 (Oct–Dec 2010)
9. Pew Research Center Journalism & Media: Social media aid the Haiti
relief effort (21 Jan 2010). Retrieved from journalism.org: http://
www.journalism.org/2010/01/21/social-media-aid-haiti-relief-effort/
10. Charlwood, J.: Use of social media during flood events. flood-
plainconference.com. (2012). Retrieved from http://www.
floodplainconference.com/papers2012/Jilly%20Charlwood%
20Full%20Paper.pdf
11. Bird, D., Ling, M., Haynes, K.: Flooding facebook—the use of
social media during the Queensland and Victorian floods. Aust.
J. Emerg. Manage. 27(1), 27–33 (2012). Retrieved 08 10 2017
from https://riskfrontiers.com/pdf/flooding_facebook.pdf
12. Sykes, E.: Emergency 2.0: how social media proved itself in the
Queensland floods (2011). Retrieved from http://www.abc.net.au;
http://www.abc.net.au/local/audio/2011/04/05/3182906.htm
13. Media and Public Affairs Branch, Queensland Police Service:
Queensland police service: disaster management and social media—
a case study. Creative Commons Attribution (n.d.)
14. Queensland police service—disaster management and social media
—a case study (n.d.). Retrieved from police.qld.gov.au: https://
www.police.qld.gov.au/corporatedocs/reportsPublications/other/
Documents/QPSSocialMediaCaseStudy.pdf
15. Chandrashekar, G., Sampath, N.: Social media and disaster
management. Global Media J. Indian Ed. Students Res. 7(1) (June
2016)
16. PTI: Ola launches boat service in flood-affected Chennai (17 Nov
2015). Retrieved from gadgetsnow.com: http://www.gadgetsnow.
com/tech-news/Ola-launches-boat-service-in-flood-affected-Chennai/
articleshow/49816195.cms
17. IANS: Chennai floods caused economic loss of $2.2 bn: study (30
Mar 2016). Retrieved from timesofindia.indiatimes.com: http://
timesofindia.indiatimes.com/city/chennai/Chennai-floods-caused-
economic-loss-of-2-2-bn-Study/articleshow/51618326.cms
18. Fernandes, S.: Chennai floods: how social media and crowd-
sourcing helps people on ground (5 Dec 2015). Retrieved from
https://www.oneindia.com/india/chennai-floods-rescue-operations-
social-media-technology-twitter-1947228.html
19. Pradnya: Digital marketing blog. (17 Dec 2015). Retrieved from
http://www.digitalvidya.com;http://www.digitalvidya.com/blog/
how-social-media-helped-during-chennai-floods-as-a-disaster-
management-tool/
20. National Research Council: Successful Response Starts with a
Map: Improving Geospatial Support for Disaster Management.
National Academies Press, USA (2007)
21. Social media and the Queensland floods (2017). Retrieved from
publicrelationssydney.com.au: https://publicrelationssydney.com.
au/social-media-and-the-queensland-floods/
22. Allerin: Big data in disaster management (17 May 2017).
Retrieved from Allerin.com: https://www.allerin.com/blog/big-
data-in-disaster-management
23. Murray, J. (ed.): Managing Crises and Disasters with Emerging
Technologies: Advancements. IGI Global (2012)
24. Worldometers: India population (LIVE) (16 Aug 2017). Retrieved
from Worldometers: http://www.worldometers.info/world-
population/india-population/
25. Kalson, D.: Pros and cons of social media before, during and after a
crisis. (01 Sept 2015). Retrieved from Preparedex: http://www.
preparedex.com/pros-and-cons-of-social-media-before-during-and-
after-a-crisis/
356 D. Giri and A. Vats
Strengthening Your Social Media Marketing
with Live Streaming Video
Matthew A. Gilbert
Abstract
With more than 3 billion users worldwide, social media
has transformed marketing; it offers individuals and
organizations alike the ability to effectively and afford-
ably attract, convert, and transform consumers. Mirroring
the growth of social media (and in many ways fueling it)
are mobile devices: there are more than 5 million unique
mobile users worldwide with nearly 2.8 million people
accessing social media with mobile devices and 80% of
worldwide internet users owning at least one smartphone.
Mobile video is a particularly promising platform to
communicate to consumers; 80% of Internet traffic will be
video by 2019 and 74% of consumers are more likely to
buy a product or service after watching a branded video.
However, recorded video is costly and cumbersome to
produce; live streaming video decreases costs while
increasing customer engagement and enhancing influ-
ence. Recognizing that live streaming video can
strengthen social media marketing strategies, this paper
reviews the rise of social media, explains the role of live
streaming video, previews live streaming video platforms,
proposes live streaming video strategies, shares live
streaming video survey results, and evaluates the impact
of live streaming video.
Keywords
Content marketing Facebook Instagram
Live streaming video Marketing Mobiles
Smartphones Social media marketing
Periscope
1 Introduction
Social media offers individuals and organizations alike a
marketing channel with which they can effectively and
affordably attract, convert, and transform consumers [1].
With more than 3 billion social media users worldwide [2],
social media has arguably transformed modern marketing.
Mirroring the growth of social media (and in many ways
fueling it) are mobile devices. Kemp [3] reports more than 5
million unique mobile users worldwide with nearly 2.8
million of those individuals actively using their mobile
devices to access social media.
Given this, marketers should create content for consumers
using portable digital devices. Mobile video is a particularly
promising platform: 80% of Internet traffic will be video by
2019 [4] and 74% of consumers are more likely to make a
purchase after watching a branded video [5]. However,
recorded video is costly and cumbersome to produce; live
streaming video increases engagement and decreases costs
while increasing influence [6].
Recognizing that individuals and organizations alike can
strengthen their social media marketing with live streaming
video, this paper reviews the rise of social media, explains
the role of live streaming video, previews live streaming
video platforms, proposes live streaming video strategies,
shares live streaming video survey results, and concludes by
discussing the risks and rewards of live streaming video.
2 Rise of Social Media
More than 3 billion people—40% of the global population—
actively use social media; with one million new users per
day worldwide this growth shows no indication of slowing
down [2]. Looking at the Middle East, 93 million people use
social media; within this population the United Arab Emi-
rates boasts 9,200,000 social media users (99% penetration)
[3]. Embraced by consumers, social media has arguably
M. A. Gilbert (&)
American University in the Emirates, Dubai,
United Arab Emirates
e-mail: matthew.gilbert@aue.ae
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_42
357
transformed marketing while offering benefits and presenting
unique risks to marketers.
Benefits of social media include: gaining customer
insights, increasing brand awareness and loyalty, running
targeted ads with real-time results, generating higher con-
verting leads, providing rich customer experiences, increas-
ing website traffic and search ranking, learning about your
competitors, sharing content faster and easier, creating
geotargeted content, and building relationships [7].
But with benefits come risks; common challenges and
obstacles include: connecting authentically with your audi-
ence, creating a social media marketing strategy, managing
organic reach, creating consistently high-quality content,
distributing content to a large audience, encouraging sharing,
supporting intuition with data, creating quality visuals, pri-
oritizing projects, and picking the right platform [8].
Because there are so many social media platforms it’s
tough for marketers to know where to align their efforts.
Consumers have more difficulty differentiating the many
messages they receive via social media on a daily basis. It’s
therefore important to focus on the most popular platforms
while delivering the most customer-friendly content.
Marketers can balance the benefits and risks of social
media across a plethora of platforms. As presented by Kemp
[2], Facebook dominates social media with more than 2
billion active monthly users; this is followed by YouTube
(1.5 billion), WhatsApp (1.2 billion), Facebook Messenger
(1.2 billion), Chinese mobile text and voice message app
WeChat (938 million), Chinese instant messaging service
QQ (861 million), Instagram (700 million), Chinese social
network Qzone (638 million), Tumblr (357 million), and
Twitter (328 million).
These numbers indicate strong growth among messenger
apps, but tracking their performance country-by-country is
difficult because they don’t publish their user numbers for
individual markets consistently [2]. Nevertheless, as Dunn
[9] clarifies, “more people use messaging apps than social
networks thanks to more affordable devices, falling data
costs, and innovative and fun features,”(para. 2). This
growth correlates to increased use of artificial intelligence
and bots by marketers in messenger apps; there are currently
more than 100,000 bots on Facebook alone performing
various functions including brand awareness, customer ser-
vice, content delivery, product purchases, travel and trans-
portation information, and more [10].
Mirroring the growth of social media (and in many ways
fueling it) are mobile devices. Worldwide there are more
than 5 billion mobile users (67% penetration) with nearly 2.8
billion of those using mobile devices to access social media
[2]. More than 650,000 new mobile users are added daily,
adding to the population of mobile device users worldwide
that consumes more than 2.3 GB of data monthly—a 70%
year-on-year increase from June 2016 [2].
In the Middle East, mobile devices play an even bigger
role in daily life: there are more mobile phone subscriptions
(312 million) than people (246 million); within that popu-
lation, 83 million people actively use social media via
mobile devices [3]. Radcliffe [11] elaborates that “for many
users, mobile is the only way that they interact with social
networks,”(p. 3).
3 Role of Live Streaming Video
Video has emerged as one of the most effective forms of
social media content; mobile video is a particularly
promising. Research reveals 55% of consumers prefer video
over other forms of content including blogs, long form
articles, podcasts, and research [12]. Ross [13] further shares
that an average video post generates 135% more organic
reach than a photo post.
Video is being consumed at an ever-increasing rate: the
number of daily video views on Facebook doubled to 8
billion while the number of video posts increased 94% in the
US and globally [14]. Additionally, 74% of consumers are
more likely to make a purchase after watching a branded
video [5]; 46% of those surveyed have done so. This aligns
with the projection that 80% of all Internet traffic will be
video by 2019 [4].
However, while it is an effective medium for marketers,
video can be both costly and cumbersome to produce.
Conversely, live streaming video offers an affordable and
efficient alternative option [6]. Given that audiences expect
live streaming video to be less polished than recorded video,
[6] live video is likely to yield increased engagement and
decreased production costs.
Echoing this idea, Facebook Founder Mark Zuckerberg
emphasizes, “live video…gives people more intimate
environments and more raw environments where you have a
reason to just be yourself. It doesn’t need to feel like it’s
super curated,”[14]. Further to Zuckerberg’s point, consider
that consumers spend three times longer watching live video
than video that was recorded [15].
Adding to this insight, Golum [16] reports several facts
including: 80% of people prefer live video to reading a blog,
81% watched more live video in 2016 than in 2015, 82%
prefer live video to posts; live video outpaced the growth of
other online video with 113% increase in ad sales.
Considering 80% of worldwide internet users own a
smartphone [17], marketers should create video content
while keeping in mind that a large percentage of their
audience will be watching their videos on mobile devices.
This concept connects to live streaming video because a
majority of videos that are streamed live are created by
individuals with handheld mobile devices. While handheld
mobile devices are the first of four levels of live streaming, it
358 M. A. Gilbert
is nonetheless a common entry point for individuals and
organizations streaming live videos [18].
Stelzner [19] explains that live streaming video is
attractive to consumers because, “when people are watching
you on live video, they know you’re not faking it…When
you offer something in a live video, it’s easier to sell it
because you’re not really selling. When somebody asks a
question, your answer proves the value of your products or
services,”(para. 17 and 18).
The popularity of live streaming video is ever-increasing.
Yeung [20] reports that Periscope, Twitter’s live streaming
video app, hosted 200 million broadcasts in its first year with
users watching more than 110 years’worth of live video
daily. Further, viewership increased 91% in the second half
of its first year [20].
4 Live Streaming Video Platforms
Given the aforementioned information the question is not if a
marketer should embrace live streaming video, but with
which platform? There are several live streaming video
platforms; some popular options closely connected with
social media platforms include:
Facebook Live
Facebook’s live video system launched in April 2016. Users
can broadcast live from a smart phone or other device and
publish their video to the newsfeed of their profile or page
[21].
Instagram Live
Launched in November 2016 Instagram’s live video plat-
form allows users to share a live video with their followers in
real time and for 24 hours after the initial broadcast via
Instagram Stories [22].
Periscope
A mobile live-streaming app founded in 2014 that lets users
shoot and broadcast video in real time and makes them
available online for another 24 hours; purchased by Twitter
in March 2015 [23].
Vimeo Live
After purchasing live video streaming platform Livestream,
Vimeo will integrate its features, enabling video creators to
capture, edit, stream and archive their live events [24].
YouTube Live
A feature that allows a user to stream video from a mobile
device, webcam, or desktop to host webinars, broadcast
vlogs, and more in real time [25].
5 Live Streaming Video Strategies
Leveraging live streaming video requires a strategy tied to
organizational goals and linked with key performance indi-
cators. Strategies will differ among the organizations using
it, but all strategies should address four components: Con-
tent, Equipment, Production, and Broadcast—each is
explained in greater detail below.
5.1 Content Strategy
The content you share using live streaming video should
align with organizational goals and marketing objectives.
Broadcasters also need to remain mindful of which platforms
their target audience is most likely to use and the type of
content from which they would gain the most value.
Timoteo [26] suggests 14 general types of live streaming
video content strategies including the following:
•Broadcasting live events.
•Conducting an interview.
•Crowdsourcing feedback.
•Demonstrating your sense of humor.
•Giving a behind-the-scenes peek.
•Giving a project status update.
•Hosting training seminars or courses.
•Introduce new products or services.
•Inviting customers to submit reviews.
•Offering customer service help.
•Running a contest or launching a game.
•Scheduling a question and answer hour.
•Setting customer service expectations.
•Showing how your product is created.
5.2 Equipment Strategy
Once the topics for a live video stream are defined through a
content strategy, Petrucci [18] lists four levels of equipment
from which to choose to broadcast live video:
•Level 1, The Selfie Stream: The simplest method of live
broadcasting, this level involves holding a mobile device
Strengthening Your Social Media Marketing …359
by hand. While the easiest avenue of entry, the video can
be shaky (unless a tripod is used) and the audio is limited
to what is native to the device. This level is ideal for
informal and random videos sharing something fun.
•Level 2, Phone and Extra Gear: This level involves
adding an external microphone, light, and video stabi-
lizer to a phone; the cost is approximately $200. Con-
sidering that, “we often see with our ears: high-quality
audio can improve low-quality video; likewise,
low-quality audio can make high-quality video seem
amateur,”[27], these changes will certain strengthen the
quality of the stream.
•Level 3, Live from a Computer: This level involves
shifting from a handheld device to a desktop computer. It
ensures a much higher quality stream, but it is a much
more complicated endeavor that requires software such
as Open Broadcast Software (OBS) or Wirecast, but both
add a watermark to your video unless you are prepared to
license the software. The computer used must also be a
high-quality machine and the broadcaster must have an
advanced degree of technical aptitude.
•Level 4, TV Quality from a Dedicated Streaming System:
This level offers professional grade quality broadcasting,
but requires advanced technical skill and a significant
financial investment. Everything can be customized with
full control over branding and the user experience of the
live video stream. A dedicated machine is needed to
produce the live stream and only professionals should be
involved.
5.3 Production Strategy
Once topics for a live video stream are defined in a content
strategy and an equipment strategy is determined, Stelzner
[19] suggests following a four-part live streaming video
production strategy based on ideas from Petrucci [18]:
•Part 1: Produce a show reliably once a week on the same
day, at the same time.
•Part 2: Stream randomly in real time twice weekly on a
different day than the weekly broadcast; this leads to
audience loyalty which can be converted into revenue.
Consider eventually sharing behind-the-scenes content
daily.
•Part 3: Repurpose recordings of live videos into other
forms of edited content such as podcasts, YouTube
videos, or any other media that align with the live
streaming strategy; consider boosting a recorded live
video on Facebook or sharing it via email.
5.4 Broadcast Strategy
Stelzner [19] offers insights into a broadcast strategy that
might help an individual on camera settle nerves and manage
their adrenaline. The steps include the following:
•Start with a short tease to get things started and give time
for your audience to arrive.
•Welcome your audience, referring to them collectively
by a unique name of choice.
•Inform your audience what you are going to do or teach
them in your live broadcast.
•Ask your audience a question and ask them to share their
responses as a comment.
•Engage with the audience following their responses and
replies to your question.
•Restate the video’s topic and share the promised infor-
mation with your audience.
•Conclude the show with a call to action that is tied to a
specific goal or strategy.
5.5 Live Streaming Video Survey
Golum [16] stresses quality content is the motivator for
successful live streaming video. With the three facets of live
streaming video strategy now defined, additional insight can
be gained by exploring different (and similar ways) live
streaming video is used in real-world situations by reviewing
results of a live streaming video survey.
5.6 Methodology
To better understand how different individuals and organi-
zations have embraced live video streaming, a survey was
created and a selected group of participants was invited to
complete it. The survey, which was originally designed for a
book chapter project that was not completed, was made
available on Google Docs as a form with ten questions, two
of which were optional. The questions include the following
[28]:
1. Which live streaming video platform(s) do you use?
2. Why do you use live streaming videos to market your
products/services?
3. Which products/services do you market with live
streaming videos?
4. How do you market your products/services with live
streaming videos?
360 M. A. Gilbert
5. Who is the target market of your live streaming videos?
6. How do you promote your live streaming videos?
7. How frequently do you broadcast live streaming
videos?
8. With which metrics do you evaluate your live streaming
videos?
9. Describe a success you have experienced using live
streaming videos to market your products/services.
(Optional)
10. Describe a challenge you have faced using live
streaming videos to market your products/services.
(Optional)
5.7 Participants
Five participants were invited to complete the survey; they
submitted their answers between July 30, 2016 and
December 6, 2016. Although the small number of responses
hinders generalizing findings or making broad recommen-
dations, the answers offer a qualitative look into the live
streaming video strategy of five different individuals and
organizations across an array of industries and locations, as
follows:
•American University in the Emirates (AUE): A privately
owned university in Dubai, United Arab Emirates
licensed by the UAE Ministry of Education to offer
undergraduate and graduate degrees in seven colleges.
This survey was completed by Ms. Nadia Al-Dhahir,
who was working as a content writer at the time she
completed the survey, but has since left the university.
•Marketing Melodie: The San Diego, California digital
marketing and social media training agency of Mrs.
Melodie Tao Girvin.
•Mike Garson Productions: The Los Angeles, California
production company of Mr. Mike Garson, a classically
trained jazz and rock pianist who has worked with David
Bowie, the Smashing Pumpkins, Nine Inch Nails, and
numerous symphonies. This survey was completed by
Mr. Mark Bakalor, manager of Mike Garson
Productions.
•Satisfactionist Consulting: The San Francisco, California
consulting agency of Dr. Ben Olmos, Ph.D., an adjunct
professor, business consultant, and public speaker.
•Scott Monty Strategies: The Ann Arbor, Michigan con-
sulting agency of Mr. Scott Monty, the CEO and
Co-Managing Partner at Brain+Trust Partners, and
Former Global Digital & Multimedia Communications
Manager at Ford Motor Company.
5.8 Findings
Given the small sample size of this survey (for which each
participants answers are shared in the Appendix) it is diffi-
cult, if not irresponsible, to draw conclusions. However, the
responses do offer insights into actual use cases of live
streaming video and therefore provide value. Each question
is shared in a table in the Appendix with the answers from
each participant presented either as they were submitted, or,
in some cases, minimally edited for clarity and expediency.
6 Conclusion
Reviewing the live streaming video survey results it is clear
that, while there are similarities among live streaming video
broadcasters, there is not a “one size fits all”approach.
Savvy marketers will develop a strategy aligned with the
goals of the individual and organization for which they are
broadcasting content.
Given the relative newness of the medium and the evo-
lution of each platform it is reasonable to recommend that
flexibility and adaptability are two key characteristics that
are ideal to embrace. Ultimately, a combination of
well-defined strategy mixed with improvisational efforts
should yield a good balance and lead to content that is both
engaging and relevant. In understanding the present impact
and future potential of live streaming video it is also
important to consider its positive and negative.
There is certainly significant merit to the medium. As noted
by Hertzberg [29], “live video will continue to prove a
rewarding and highly engaging way to connect with con-
sumers. As more brands go live, we will continue to witness
creative and groundbreaking new ways to connect with audi-
ences and customers in an authentic and seamless way,”(p. 3).
However, live streaming video is not without its risks.
Chief among them are ethics and privacy concerns in addi-
tion to legal and law enforcement issues. Dewey [30] cau-
tions, “rawness is fast emerging, in fact, as the central
paradox of live streaming: The very intimacy and immediacy
that make the medium attractive are also the things that make
it almost impossible to keep clean”(p. 1).
As for suggestions for future research it would be bene-
ficial to further explore the use of live streaming video
within specific market segments and industries, taking a
Strengthening Your Social Media Marketing …361
deeper dive to more thoroughly understand how it is and
could be used. It would also be interesting to investigate a
specific region’s current and potential use of live streaming
video and to compare differences between different regions
and cultures.
Additional research should also be conducted to ascertain
the usefulness of live streaming video as a tool for improving
accountability and increasing transparency in both the public
and private sectors within smart cities. Whatever is next for
live streaming video it will almost certainly push boundaries
culturally, professionally, and personally while expanding
capabilities technologically and economically.
Appendix
See Tables 1,2,3,4,5,6,7,8,9and 10.
Table 1 Which live streaming video platform(s) do you use?
Participant Response
American University in the Emirates Facebook Live
Marketing Melodie Facebook Live
Snapchat Live Stories
YouTube
Mike Garson Productions Facebook Live
Satisfactionist Consulting Facebook Live
Google Hangouts
YouTube
Scott Monty Strategies Facebook Live
Table 2 Why do you use live streaming videos to market your products/services?
Participant Response
American University in the
Emirates
It helps…people…know an event is happening if they have missed any advertisements…it brings more
engagement
Marketing Melodie It gives people a behind the scenes look into my business. They…feel like they are a part of my team. It also
humanizes my brand and develops a stronger connection because they are seeing raw footage of me live, just
like if they were right next to me
Mike Garson Productions The immediate connection with Mike’s fans is powerful. We can launch a live broadcast on either Periscope or
Facebook…and immediately be connected with his followers on the platforms. They allow for back and forth
communication and instant feedback and provide content we can use down the line
Satisfactionist Consulting Live media…creates a greater level of engagement and intimacy with my audience. It makes me as a brand
more genuine and allows people to get to know me in a way in which print media and websites can’t match.
Live streaming allows my audience to see not just what I do but how I do it. They also get to participate in the
process
Scott Monty Strategies To provide a preview for a weekly publication and to create a personal connection with my audience
Table 3 Which products/services do you market with live streaming videos?
Participant Response
American University in the
Emirates
Mostly events for the university
Marketing Melodie I use it to promote my personal and professional brand, Marketing Melodie. I live stream speaking
engagements to promote my speaking services
Mike Garson Productions We’ve used them with the intention of reaching fans, sharing stories and increasing his audience which has had
the extra benefit of organically marketing his products and services including his biography, albums and
writing, and performance services
Satisfactionist Consulting I am marketing my subject matter expertise through the art of conversation with others who are relevant in my
field of study, which is business. Through conversation I…help others engage and learn, showcase my own
knowledge and insights, and promote the guests…and the work they are doing
Scott Monty Strategies My newsletter (and by extension, my consulting/speaking practice)
362 M. A. Gilbert
Table 4 How do you market
your products/services with live
streaming videos?
Participant Response
American University in
the Emirates
By showing the physical building and the students and faculty…students
are able to get an insight into how it feels to study at the university
Marketing Melodie I use it to build relationships and engage with my audience so they see me
as a resource and trust worthy brand. This way when they do need my
services, I will be top of mind
Mike Garson Productions Mike is his own amazing walking, talking, playing product. We don’tdo
any hard selling via our live streaming broadcasts, though they certainly
help to gain interest, awareness, and increase his audience
Satisfactionist Consulting To promote my work and engage potential clients I started doing a podcast,
which focuses on interviewing entrepreneurs, business leaders, and
academic professionals
Scott Monty Strategies I mention the newsletter outright and provide a subscription link in the
slates and in the description of the video. The rest is implied
Table 5 Who is the target
market of your live streaming
videos?
Participant Response
American University in
the Emirates
Prospective students, 16–35 years old
Marketing Melodie Professionals who are entrepreneurs, service professionals, and business
owners
Mike Garson Productions Fans of Mike and David Bowie looking to hear stories, music, and
information about available products, upcoming concerts, and more
Satisfactionist Consulting For my consulting services I am targeting males and female between 35 and
55 who are managers, senior leaders, and or owners of organizations. For
my podcast I focus on males and females between the ages of 18–65 who
are entrepreneurs, business leaders, academic professionals, and college
students who are interested in topics related to business
Scott Monty Strategies General business people
Table 6 How do you promote
your live streaming videos? Participant Response
American University in
the Emirates
By doing as many as I can. This way people start to ask if a future event will
be on Facebook Live
Marketing Melodie I use Facebook, Instagram, LinkedIn, and Twitter to promote my live
streaming videos. I also send out past streams to my email list
Mike Garson Productions A majority of our publicity is done via announcements on Facebook,
Twitter, and MikeGarson.com in addition to the internal promotion of…
launching a live broadcast with tens of thousands of followers
Satisfactionist Consulting I promote each episode to my followers on Facebook both on my public
profile and on my podcast’s Facebook page. In between live streaming
events I also promote each podcast episode by boosting each post using
Facebook ads
Scott Monty Strategies Twitter, Facebook, website, and newsletter
Table 7 How frequently do you
broadcast live streaming videos? Participant Response
American University in the
Emirates
About twice a week
Marketing Melodie 4–6 times a month
Mike Garson Productions Depends on what’s going on in the world and when Mike’s schedule
allows
Satisfactionist Consulting I do a live stream once a week in support of my podcast and business
overall
Scott Monty Strategies Once a week
Strengthening Your Social Media Marketing …363
Table 8 With which metrics do
you evaluate your live streaming
videos?
Participant Response
American University in
the Emirates
Facebook analytics
Marketing Melodie Analytics on my website and Facebook Insights
Mike Garson Productions Facebook and Periscope provide internal analytics specific to broadcasts,
coupled with our standard website and store analytics
Satisfactionist Consulting I am currently using the view count on YouTube, which is where my
Hangouts On Air get published but I also monitor downloads of my
podcast, engagements on Facebook, and views to my business web page to
for additional insights
Scott Monty Strategies Mostly on views and on the level of engagement with comments
Table 9 Describe a success you
have experienced using live
streaming videos to market your
products/services? (Optional)
Participant Response
American University in
the Emirates
The enrolled students accelerated and the university name became better
known
Marketing Melodie I have received more views and shares on my Facebook Live updates on my
business page than other posts. I…get more visibility and brand awareness
Mike Garson Productions No answer
Satisfactionist Consulting Using Facebook ads my posts are reaching a broader audience around the
country as well as other parts of the world I would not have initially thought
would be interested in my podcast. Each month we are learning more about
how to engage the right audience and interest in the show is gaining
momentum. Each week we test new targeting methods and new ways of
publishing posts to gain interest in what we are doing. In our first month we
had over 500 downloads from around the United States as well as placed we
never thought about like Netherlands, Italy, Dubai, Canada, and the UK
Scott Monty Strategies No answer
Table 10 Describe a challenge
you have faced using live
streaming videos to market your
products/services? (Optional)
Participant Response
American University in
the Emirates
As they are live videos, a lot can go wrong such as someone saying
something inappropriate
Marketing Melodie No easy way to save and edit the videos for later use
Mike Garson Productions Despite using the latest phone hardware, video and sound quality haven’t
been the best. We’re…working with more advanced video and sound
hardware to provide multi camera broadcasts with improved sound quality
to enhance our audience’s experience
Satisfactionist Consulting Using Google Hang Outs On Air was not as intuitive as I would had
hoped…I had to be sure I was logged into my primary business account
with Google…I had to authorize my Google Apps account to allow me to
setup a YouTube Channel and…to use Google Hangouts. I also had to
allow my account to be associated with Google+ …Because my partner did
not have an email account with the same domain name as my company…I
had to authorize Google Hangouts to send him an email outside the
company…I tried using Facebook Live Stream along with Open Broadcast
Software (OBS) but it was a tremendous resource drain on my computer and
created difficulties…to simultaneously live stream and tape my podcast
form the same computer. I ended up getting feedback loops with the
audio…I also tried using an iPhone on a tripod to live stream but this would
not allow my viewers to hear who I was interviewing or interact with the
show. Another option…was to record my Skype conference calls and
publish them on YouTube but this does not allow…audience participation
Scott Monty Strategies I’m always concerned with the production value. As a solo practitioner, it
can be difficult to get everything set up and act as director, producer, writer,
and engineer, all while being the on-air host. I’ve managed to integrate OBS
to allow me to be more creative and offer higher production values by
streaming from my desktop web cam
364 M. A. Gilbert
References
1. Hyder, S.: The Zen of Social Media Marketing, 4th edn. BenBella
Books, Dallas, TX (2016)
2. Kemp, S.: Number of social media users passes 3 billion with no
signs of slowing. The Next Web (2017). Retrieved from https://
thenextweb.com/contributors/2017/08/07/number-social-media-
users-passes-3-billion-no-signs-slowing/
3. Kemp, S.: Digital in 2017: global overview. We Are Social (2017).
Retrieved from https://wearesocial.com/special-reports/digital-in-
2017-global-overview
4. Cisco: Cisco visual networking index: forecast and methodology,
2014–2019 white paper. Cisco, San Jose, CA (2015). Retrieved
from http://www.cisco.com/c/en/us/solutions/collateral/service-
provider/ip-ngn-ip-next-generation-network/white_paper_c11-
481360.html
5. The Science of Social Video (2016). Retrieved from https://go.
brightcove.com/marketing-social-research
6. Piontek, K.: The periscope trend: using live video in content
marketing. Articulate Inbound Content Marketing (2016).
Retrieved from http://www.articulatemarketing.com/periscope-
live-video-in-content-marketing
7. Copp, E.: 10 benefits of social media for business. Hootsuite Blog
(2016). Retrieved from https://blog.hootsuite.com/social-media-
for-business/
8. Peters, B.: Solving the 10 most common social media marketing
challenges. Buffer Social (2016). Retrieved from https://blog.
bufferapp.com/solving-the-10-most-common-social-media-marketing-
challenges
9. Dunn, M.: Why messaging apps and bots are the future. Likeable
Blog (2017). Retrieved from https://www.likeable.com/blog/why-
messaging-apps-and-bots-are-the-future
10. Mathison, R.: Facebook messenger bots for business: a guide for
marketers. Hootsuite Blog. (2017). Retrieved from https://blog.
hootsuite.com/facebook-messenger-bots-guide/
11. Radcliffe, D.: Social media in the middle east: the story of 2016.
Social Media in the Middle East. Damian Radcliffe, Eugene,
Oregon (2016). Retrieved from https://damianradcliffe.wordpress.
com/2016/12/07/report-social-media-in-the-middle-east-the-story-
of-2016/
12. An, M.: The future of content marketing: how people are changing
the way they read, interact, and engage with content. Hubspot
(2016). Retrieved from https://research.hubspot.com/reports/the-
future-of-content-marketing
13. Ross, P.: Native facebook videos get more reach than any other
type of post [Blog] (2015). Retrieved from https://www.
socialbakers.com/blog/2367-native-facebook-videos-get-more-
reach-than-any-other-type-of-post
14. Mohan, P.: Mark Zuckerberg: soon, the majority of content we
consume will be video. Fast Company (2016). Retrieved Mar 27
2016 from http://www.fastcompany.com/3057024/fast-feed/mark-
zuckerberg-soon-the-majority-of-content-we-consume-will-be-video
15. Savage, J.: Top 5 video marketing trends for 2016 [INFO-
GRAPHIC]. SocialMediaToday (2016). Retrieved from http://
www.socialmediatoday.com/marketing/top-5-video-marketing-
trends-2016-infographic
16. Golum, C.: 62 must-know live video streaming statistics. The
Stream (2016). Retrieved from https://livestream.com/blog/62-
must-know-stats-live-video-streaming
17. Miles, G.: 8 Mobile marketing stats to help you plan for 2016
(2016). Retrieved from http://www.socialmediatoday.com/
marketing/8-mobile-marketing-stats-help-you-plan-2016
18. Petrucci, L.: The new 4 levels of LIVE streaming! (2018).
Retrieved from https://livestreamingpros.com/the-new-4-levels-of-
live-streaming/
19. Stelzner, M.: Live video strategy: how to create a show that
engages. Social Media Examiner (2017). Retrieved from https://
www.socialmediaexaminer.com/live-video-strategy-how-to-create-
a-show-that-engages-luria-petrucci/
20. Yeung, K.: Twitter’s periscope broadcasts 200 million streams in
its first year. VentureBeat (2016). Retrieved Mar 30 2016 from
http://venturebeat.com/2016/03/28/twitters-periscope-broadcasts-
200-million-streams-in-its-first-year/
21. Bernazzani, S.: How to use facebook live: a bookmarkable guide.
Hubspot (2016). Retrieved from https://blog.hubspot.com/marketing/
facebook-live-guide
22. Constine, J.: Instagram stories hits 250 M daily users, adds live
video replays. Tech Crunch (2017). Retrieved from https://
techcrunch.com/2017/06/20/instagram-live-video-replays/
23. Shieber, J., Constine, J., Constine, J., Perez, S., Lynley, M., Perez,
S., et al.: Periscope. TechCrunch (2017). Retrieved from https://
techcrunch.com/topic/company/periscope/
24. Perez, S.: Vimeo acquires livestream, launches its own live video
product. TechCrunch (2017). Retrieved from https://techcrunch.
com/2017/09/26/vimeo-acquires-livestream-launches-its-own-live-
video-product/
25. Hines, K.: How to broadcast with youtube live. Social Media
Examiner (2016). Retrieved from https://www.socialmedia
examiner.com/how-to-broadcast-with-youtube-live/
26. Timoteo, J.: 14 ways your business can successfully use
live-streaming video. Impact (2017). Retrieved from https://
www.impactbnd.com/blog/ways-to-use-live-streaming-video
27. Gilbert, M.A.: EdX E-Learning Course Development, 1st edn.
Packt Publishing, Birmingham, England (2015)
28. Gilbert, M.A.: Live streaming video survey (2016). Available at:
https://docs.google.com/forms/d/17PDfh2KG3yBcCcKW1Qhrhe1
ttSsSciQtOqFIOWQcfKI/viewform
29. Hertzberg, J.: Best practices: how to use live video to enhance
events. Adage (2016). Retrieved from http://adage.com/article/
digitalnext/practices-live-video-enhance-events/304099/
30. Dewey, C.: The (very) dark side of live-streaming that no one
seems able to stop. The Washington Post (2016). Retrieved from
https://www.washingtonpost.com/news/the-intersect/wp/2016/05/
26/the-very-dark-side-of-live-streaming-that-no-one-seems-able-to-
stop/
Strengthening Your Social Media Marketing …365
The Complexity of Governing Smart
Cities—An Integrated Approach
Geetha A. Rubasundram
Abstract
Smart Cities are emerging as a strategy to manage the
problems generated by urban population growth and rapid
urbanization. The push for sustainable growth via the
Sustainable Development Goals (SDG), as well as the
motivation of companies to adopt the Integrated Report-
ing (IR) framework (which also echoes sustainable value
creation) interlinks the collaborative governance relation-
ship between global institutions, countries, government,
businesses and the public. The comparison of smart
governance or e-governance, to the traditional concept of
good governance is relevant to ensure consistency of
goals and motivations, across all levels of stakeholders.
This study initially identified firms recognized for their
financial reporting, as a proxy for firm level good
governance, which were then grouped into the top five
countries based on frequency. The countries identified
were UK (17%), Sweden (12%), Germany (11%), Japan
(11%) and France (8%). All five countries are developed
nations and are members of the OECD and UN. The
results suggest an interesting “East meets West”perspec-
tive, with each of the countries reflecting different cultural
values that motivate the route to good governance. The
five countries were initially measured using the traditional
measures of good governance and culture, and subse-
quently compared to e-governance and e-participation
indexes. Data for this research have been extracted from
reliable sources such as the World Bank, United Nations,
Transparency International, World Justice Project and
OECD. The research reports inconsistent results when
using different basis of assessments, which indicates the
lack of integration across goals and methods, differing
between platform and the genuine intent to participate or
to allow participation.
Keywords
Culture e-governance e-participation
Good governance Sustainable development goals
1 Introduction
Development has seen a significant shift from rural to urban.
Cities are becoming overcrowded with an approximate
66.4% of the world’s population expected to reside in cities
by 2050 [1]. This is already causing sustainable issues due to
the lack of integrated and organized development. Consid-
ered as “building blocks of sustainable development”[1],
smart cities may be the solution for sustainable value
creation.
Smart cities should aim at to improve quality of life, as
well as the efficiency and quality of services provided by
governing entities and business [2]. This implies a need for a
continuous and integrated communication cycle between
governments, firms and society for the success of sustainable
development, leading to transparency and accountability,
which in turn, forms the basis of good governance. Good
governance has long been seen as means to achieve devel-
opment and as a development objective in itself [3]. The
above mechanisms are reflected in the Sustainable Devel-
opment Goals (SDG). The Organisation of Economic
Cooperation and Development (OECD) and United Nations
(UN) have moved their focus to the new set of 17 SDG’s
G. A. Rubasundram (&)
Asia Pacific University, Kuala Lumpur, Malaysia
e-mail: geetharubasundram@yahoo.com
G. A. Rubasundram
University of Malaya, Kuala Lumpur, Malaysia
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_43
367
starting from 2016 and up to 2030. Three of the goals that
are relevant to this paper include:
SDG
11
Make cities and human settlements inclusive, safe,
resilient and sustainable
SDG
16
Promote peaceful and inclusive societies for sustainable
development, provide access to justice for all and build
effective, accountable and inclusive institutions at all
levels
SDG
17
Strengthen the means of implementation and revitalize the
global partnership for sustainable development
Source [4,5]
Though the SDG is not legally binding, it is believed that
ability of civil society and citizens to pressurize governments
to embark on the goals, would lead to the success of the
goals. This reaffirms the need for the integrated relationship
as posited above.
Technology provides the platform for this three-tier
integration, in lieu of the smart city development. How-
ever, the success depends on the integration of the people—
process- technology, and this might be complex due to the
variety of stakeholders involved. Culture could be the driver
of this integration with the ultimate goal of change. Culture
can be a powerful driver of local development and has the
ability to promote a system wide integration of diversified
activities across a value chain (vertical integration) or across
value chains (horizontal integration) [6]. The research fur-
ther argues that legitimate stakeholders must also have the
capacity to participate, including weaker voices due to
unbalanced power distributions. This should also include
knowledge sharing as a social interaction culture [7].
Therefore, members of the public should have access to
relevant information, and be heard. The decision making
process should also be transparent and ensure the voice of
the masses is heard. But, unfortunately, the current gover-
nance structure requires minimal involvement of citizens in
decision-making [2,8], which leads to the question of
whether the smart technologies are just a platform. However,
it is imperative to note that traditional governance mecha-
nisms may be outdated, leading to the emergence of new
governance arrangements [9] which should include measures
of technology adaption as well.
To understand the complexity of the dynamics, this
research draws upon the Actor—Network Theory
(ANT) and its application in terms of a Cultural District [6],
as well as the Actor Centred Instituionalist (ACI) theory.
ANT is a social-philosophical approach that attempts to
understand complex social situations by looking at relational
or associated elements, whilst Cultural Districts are tools for
urban planning authorities to foster the development of
urban centers and revitalizing declining neighbourhoods [6].
The research identified three main issues: (i) the
identification and involvement of key stakeholders (ii) the
maintenance of the collaboration process and (iii) the
long-term implementation of collaborative outcomes. ACI,
combines the rational choice theory and new institutional-
ism, seeking to explain policies and outcomes from inten-
tional actions of the various interdependent actors shaped by
institutional settings [9].
This research raise two crucial concerns that set’s the
direction of this paper, in its aim to understand if the smart
technology is just a platform. In order to identify the
involvement of key stakeholders, this research looks at the
role of institutions in motivating the acceptance of change.
Secondly, in order to assess the maintenance of the collab-
orative process and the long-implementation of collaborative
outcomes, this research uses the proxy measures of tradi-
tional governance in comparison with a more technology
based governance measure to understand if there had been
any change over the years.
The rest of the paper is structured as follows: Sects. 2
and 3cover the literature review for the role of institutions
and the comparison of governance measures. This is fol-
lowed by the results and discussion in Sects. 4and 5, and
finally the conclusion at the end of this paper in Sect. 6.
2 Role of Institutions
The popular definition of [10] refers to institutions as any
form of constraint that human beings devise to structure
political, economic and social interaction. North [11] views
institutions as rules of the game, with firms and organisa-
tion’s being the players. Rasiah [12]reflects the multi level
stakeholder collaborations in his research where institutions
may influence individuals, firms and organisations condi-
tional conduct; either directly sharing the behavior of indi-
viduals and firm’s, or through organisations, networks and
other groupings collective action problems. Likewise, it is
possible to look at institutions from a formal and informal
perspective.
To identify the key stakeholders within the formal ele-
ment of institution, this research will reflect the earlier
mentioned three-tier relationship of government, firms and
society. An additional angle would be also taken to identify
the possibility of global governance institutions such as the
OECD and UN having some sort of influence on the changes
discussed. These global institutions indirectly influence the
paths of their member countries, together with other insti-
tutions such as the European Union and European Com-
mission, in their quest for sustainability, accountability and
good governance, although on multilateral (non-hierarchical)
basis. Likewise, the involvement of global governance
institutions could also motivate the push towards smart
368 G. A. Rubasundram
cities. As an example, although Europe and Japan may not
have a formal agreement in place to cooperate on smart
projects, they are bound together with the commitment of the
global institutions that they belong to, as well as the various
public-private partnerships in relation to smart city projects.
Some examples of the projects include OurSpace, an open
source, social networking and Web 2.0 to encourage young
people and members of the European and National Parlia-
ments to share ideas and engage in debates that affect their
everyday life; Horizon 2020 to carry out research and
innovation activities on open government, Puzzled by Policy
which helps the public with policy matters etc.
Firms seem to be the motivating factor, playing a key role
in collaborating with the government and society. Although
as per [11]definition above, firms are deemed to be the
players, but many firms have taken the lead on the SDG
goals, actively interacting with governments to achieve the
said goals. This paper revolves around the mechanism of
communication, and hence looks at the firm as an institution,
with an assumed ability to influence the decisions. Networks
of private firms can provide a basis of self-organisation of
society and economy, within the multilevel public-private
relationship and have the advantage of flexibility over eco-
nomic governance through hierarchies [9]. Hence, the per-
spective of firms would be a starting point for this research,
based on the quality of its knowledge sharing perspective via
its reporting quality. Apart from its Corporate Social
Responsibility reporting requirements, there is a growing
attention on Integrated Reporting (IR) internationally as a
motivation for firms to re-evaluate their business strategies
and aim for sustainable value creation. IR is defined as a
concise communication on an organisation’s strategy, gov-
ernance, performance and prospects that would lead to short,
medium and long term value creation [13]. Apart from the
South Africa King’s III compulsion, many other countries
have embarked on motivating firms and organisation’s to use
this reporting framework.
Licht et al. [14] considers culture as an informal institu-
tion, as it operates as a constraint using unwritten, unspoken
rules of the game, consistent with [11]defined element.
Researchers such as [12,14,15] have discussed the role of
culture in terms of governance, absence of corruption and
rule of law. Culture as an informal institution of social norms
and underlying values; shares common elements as tech-
nology, with education (growth of knowledge) being the
acquisition of both [15]. Change could impact perception’s,
requirements and the way things are done (i.e. culture).
Although many perceive culture to be static, [15] distin-
guishes between slow-moving (e.g. culture) and fast-moving
institutions (e.g. political institutions), with slow-moving
institutions being able to influence fast-moving institutions.
However, authorities acknowledge the challenges dealing
with the differing pace of change, complexity and the need
for integrated systems to be in place, compared to the pre-
vious silo method of administration [16]. Zhao et al. [8]
likewise find that culture has an effect on e-government.
3 Comparing the Measures of Governance
Governance by itself in its traditional form is a complex and
multifaceted relationship. Although in essence, the meaning
of governance remains the same, the complexity of its scope
and depth has increased significantly especially in this cur-
rent era of technology and innovation. Based on the devel-
opments in the last few years, it is significant to question the
role of governance in lieu of this, as well as whether the
manner on good governance is characterized is sufficient to
address the movement in smart technology, firms and cities,
and eventually countries. In a traditional manner, the World
Bank views good governance as characterized by pre-
dictable, open and enlightened policy making, a bureaucracy
imbued with a professional ethos; an executive arm of
government accountable for its actions; and a strong civil
society participating in public affairs; and all behaving under
the rule of law [17]. The World Bank’s World Governance
Indicators (WGI) ranks countries with respect to Voice and
Accountability, Political Stability and Violence, Govern-
ment Effectiveness, Rule of Law, Regulatory Quality and
Control of Corruption. The Rule of Law, Voice and
Accountability and Control of Corruption angles are also
reflected in other indexes from Transparency International
and World Justice Project. An interesting development to
further offer a robust comparison is the Sustainable Gover-
nance Index (SGI) that further aims to combine the element
of Governance and Sustainability.
Smart cities should be treated as an organic whole; as a
network and linked system [2,18]. This holistic perspective
using technology to bind systems and thinking should be used
to address public issues on the basis of multi-stakeholders [1,
19]. Building on the work of the European Smart City Project,
[19] considers a smart city is one with at least one initiative
addressing one or more of the following six characteristics:
Smart Governance, Smart People, Smart Living, Smart
Mobility, Smart Economy and Smart Environment. The same
report also mentions that the smart initiative seems to be more
focused on Smart Mobility and Smart Environment, with
Smart Governance projects being mainly implemented in
France, Spain, Germany, the UK, Italy and Sweden, with
Japan using ICT to address a range of issues such as rapidly
aging society on health care, energy shortages, environmental
challenges and public safety.
For the purpose of its relevance, this paper focuses on the
Smart Governance initiative. Manville et al. [19] describes
Smart Governance as a within city and across city gover-
nance collaboration, including services and interactions
The Complexity of Governing Smart …369
which integrate private, civil and European Community
organisations to achieve smart objectives such as trans-
parency and open data, using ICT and e-government in
participatory decision making and co-created services.
Rodriguez Bolivar [2] differentiates between institutional
conservation (traditional governance of smart cities) that
leads to a bureaucratic model; and institutional transforma-
tion (smart urban governance), which leads to a more
self-governance model. This has led to the creation of
Electronic Governance (E-Governance), Electronic
Government (E-Government) and Electronic Participation
(E-Participation) indexes, all of which aim to assess and rank
a countries governance level based on technology, which
includes as well the involvement of citizens.
The Electronic Government (E-Government) aligns the
traditional view of WGI and SDG, but by using ICT.
The SDG 2030 agenda is reflected in the E-Government, as
the growth of ICT and global interconnection does not only
reduce the digital gap, but also develops knowledge societies
and hence, increasing the potential for human progress;
which in turn can promote transparency, accountability and
efficiency in public service delivery via citizen engagement
[1]. With the increasing use of social media, countries are
increasingly networking and engaging with the public,
towards participatory decision making, also known as
E-Participation, which would subsequently hope to achieve
e-democracy. Improvements in E-Participation are driven
more by civic activism of the public, rather than the coun-
tries available resources or expensive technologies.
E-Participation is the process of engaging citizens through
ICT’s in its policy, decision making and service design and
delivery in order to make it participatory, inclusive and
deliberative [1] shifting towards a “government with you”
rather than “government to you”, ranging from passive or
active engagement by the civil society. E-Participation can
be divided into three (3) levels: Information (Informative
Public Participation), Consultation (Consultative Public
Participation) and Cooperation (Cooperative Public Partici-
pation). Efforts to promote Whole-of Government
(WoG) service delivery and policies have to be accompanied
with efforts to ensure organisational cultures, coordination
mechanisms and financial and accountability systems sup-
port collaboration among public institutions [1].
4 Methodology
This study analyses data extracted from secondary sources. In
order to assess a more interactive mechanism of governance,
this research assesses good governance from the initial basis
of firm level governance, to build on country profiles and the
focus on smart cities. An indicator of firm level good gov-
ernance is reflected in the quality of its corporate reports, as
indicated as a proxy for knowledge sharing. Using the Best
Report List—2016 from ReportWatch, the research analysed
the 300 firms, and segregated the firms according to the
country of origin, taking the top five countries based on
frequency. This database of firms was selected for this
research as the reports were submitted voluntarily to
ReportWatch, which reflects the commitment of the firm to
good governance. Created in 1996, ReportWatch has fre-
quently been regarded as one of the most comprehensive and
authoritative survey on international annual reports.
Data for the country level has been obtained from trust-
worthy sources such as the World Bank, UN, OECD and other
country level data such as from municipalities or ministries.
Due to the limited research and available information to gauge
smart cities and municipalities/ministries in a robust manner,
country level indicators are used as a basis of comparison for the
complex smart city performance and governance, with quali-
tative information being used as a basis of enhancing the dis-
cussion for the municipality and local city level. Zhao et al. [8]
has also used this in their study of culture and E-Indexes.
A key indicator of good E-Governance would come from
the E-Government index. The progress of the E-Government
effectiveness has been published in nine editions United
Nations Department of Economic and Social Affairs
(UNDESA) survey, measuring effectiveness of the delivery
of basic economic and social services to people in terms of
education, health, labour and employment, finance and
social welfare and environment. The survey assesses the
e-government based on relative measures across countries in
comparison to absolute measures. The survey measures the
progress of E-Government using the E-Government Devel-
opment Index (EGDI), a composite index based on the
weighted average of three normalized indices; Telecommu-
nications Infrastructure Index (International Telecommuni-
cations Union), Human Capital Index (United Nations
Educational, Scientific and Cultural Organisation—
UNESCO) and Online Service Index (Independent survey
questionnaire that assesses the national online presence of all
193 United Nations Member States). The survey question-
naire assesses a number of features related to online service
delivery, including whole of government approaches, open
government data, e-participation, multi channel service
delivery, mobile services, usage up-take, digital divide as
well as innovative partnerships through the use of ICT,
under the supervision of UNDESA. The E-Participation
Index (EPI), which forms part of the E-Government mea-
sures E-participation according to a three level model of
participation that includes E-information (provision of
information on the internet), E-consultation (organizing
public consultations online) and E-decision making
(involving citizens directly in the decision process).
The more traditional good governance indicators, as
formed by the World Bank Worldwide Governance
370 G. A. Rubasundram
Indicators (WGI) are used to assess the five countries as
well. Although the methodology of the WGI indicators have
been questioned, researchers have still used the indicators
due to the global coverage of that they have been produced
by World Bank researchers. Data by the researchers has been
generated since 1996–2015. This research took the 2015
percentile rank, in order to be able to match with the time
period of the firm financial statements recognition of 2016.
The percentile rank ranges from 0 to 100, in comparison
with a country recognized for its best practice of 100. Based
on [20] the WGI project uses six dimensions of governance:
•Voice and Accountability (VA) to measure political, civil
and human rights.
•Political Stability and Absence of Violence/Terrorism
(PSAVT), to measure the probability of violent threats
(including terrorism) to/or changes in government.
•Government Effectiveness (GE) to measure the compe-
tence and quality of public service delivery/bureaucracy.
•Regulatory Quality (RQ) to measure the regularity of
market-unfriendly policies.
•Rule of Law (RoL), to measure the quality of contract
enforcement, police, and courts, in line with the prospect
of crime and violence.
•Control of Corruption (CoC), to measure the possibility
of misuse of public power for private gain (i.e. bribery
and corruption).
To have a robust perception, this research also extracted
information from Transparency International’s (TI) Corrup-
tion Perception Index (CPI). Each year, TI score countries
based on how corrupt their public sector are perceived to be,
providing a connection between corruption and inequality.
The CPI combines the perceptions of business people and
country experts from various sources to assess the level of
corruption in the public sector. The CPI 2016 is calculated
using 13 different data sources from 12 different institutions.
The data is then standardized to a scale ranging from 0 to
100, where 0 is the highest level and 100 is the lowest level
of perceived corruption, and then averaged, followed with a
standard error and confidence interval [21].
The World Justice Project (WJP) takes into account nine
(9) factors to assess the Rule of Law: (1) Constraints on
Government Powers, (2) Absence of Corruption, (3) Open
Government, (4) Fundamental Rights, (5) Order and Security,
(6) Regulatory Enforcement, (7) Civil Justice, (8) Criminal
Justice and (9) Informal Justice; and further disaggregated into
forty-seven (47) specific sub-factors. The data collected from
forty-four (44) of the sub-factors from factors 1 to 8, is pro-
cessed and normalized on a 0 (lowest) to 1 (highest) scale, and
finally validated against qualitative and quantitative
third-party sources to identify any inconsistencies [22].
Not to be confused with the Sustainable Development
Goals (SDG), the Bertelsmann Stiftung Sustainable Gover-
nance Indicators (SGI) is built on three (3) pillars; Policy
Performance, Democracy and Governance. The basis of this
indicator differs from the other indicators, as in the SGI relies
on a combination of qualitative assessments by country
experts and quantitative data drawn from official sources, and
undergoes a six-stage peer review to minimize the subjective
bias and ensure the validity of the assessment [23].
In order to understand the impact and change of culture,
this research uses the indicators as per the Hofstede study.
[24,25] analysed IBM employee’s value scores collected
between 1967 and 1973. Similar to the WGI, the Hofstede
research has also been criticized and considered outdated by
some. Since it is based on a one firm basis, it is important to
this research as it removes the firm level cultural biasness
which maybe prevalent in multi firm analysis and focuses on
a country level culture. The scale runs from 0 to 100 with 50
as a midlevel, with a score of under 50 being low and above
50 being high.
The Hofstede indicators consist of:
•Power Distance (PD)—The expectation and acceptance
of unequal power distribution by the less powerful
members (based on ranks and backgrounds) of a coun-
try’s institutions and organisations. The higher the score
of PD, the more the acceptance of privileges.
•Individualism (IN)—Comparing the level of interdepen-
dence between members of the society, differentiating
between a group oriented “Collectivist”society and a more
self or immediate family oriented “Individualist”society.
•Masculinity (MAS)—Higher scores reflects a masculine
society driven by competition, achievement and success,
with the values in built from school and continued in the
individual’s organisational life. A low score (Feminine)
focuses on values such as caring for others and enjoying
a better quality of life.
•Uncertainty Avoidance (UAI)—Measures the threat level
felt when facing ambiguous situations, and the creation
of beliefs and institutions in the attempt to avoid the
ambiguous situation. The higher the UAI score, the more
equipped the country is to avoid any uncertain situation.
•Long Term Orientation (LTO)—Compares the lower
scoring normative societies that prefers to maintain tra-
ditions and the higher scoring pragmatic societies that
encourage change with a strong emphasis on education.
•Indulgence (IND)—Contrasts “indulgence”based on
weak control and restraint of desires based on upbringing
indicating strong control.
This is then compared to current culture as discussed in
other relevant literature to understand the changes, if any.
The Complexity of Governing Smart …371
Lastly, the achievements and success of the five countries in
terms of SDG goals as well as Smart City projects is further
discussed.
5 Findings
The countries identified are United Kingdom (UK), Sweden,
Japan, Germany and France. All are members of OECD and
United Nations (UN).
The discussion on culture is based on Table 1. Japan is
somewhat neutral in terms of its perception of PD, not
accepting or rejecting the unfairness of the system. This is
reflected in their education system, with the principle that
individuals are born equal and success is achieved by hard
work. UK, Sweden and Germany do not accept unfair PD,
whilst France seems to have a higher PD, implying the
acceptance of unfairness.
The four European countries also seem to be more indi-
vidualistic, with Japan being the exception and being
somewhat group oriented. However, for masculinity, there
seems to be a gap between Japan and Sweden, with Japan
being highly masculine and Sweden being highly feminine.
Both Germany and UK are somewhat masculine, with
France at the borderline feminine. Being masculine is
reflected in the drive for excellence and being possible
workaholics. Japan’s mild collectivism (IN), as compared to
the other four countries reflects the lack individual assertion,
with competition noted more amongst groups. The unique
French combination of high PD and IN suggests that sub-
ordinates may reject formal obedience requirements, and this
could cause conflicts. Sweden’s more feminine approach
posits a work-life balance, valuing equality and participative
style of decision-making.
Germany, Japan and France have higher LTO, with UK
and Sweden score indicating a neutral position. Japan’s
scores the highest for LTO, reflected in its constantly high
rate of R&D investment even during economic constraints.
This reaffirms its priority of sustainability over profitability,
to maintain stakeholders and society in the longer term.
Germany, Japan and France score low in IND; with UK and
Sweden more indulgent in comparison. UK and Sweden also
have low UAI whilst Germany, Japan and France have high
UAI. Japan’s high UAI indicates good planning skills,
insinuating being prepared for any situation accordingly.
The discussion on WGI is based on Table 2. The Euro-
pean based countries score well in almost all sectors, except
for PSAVT. This is especially so with Sweden. However,
Japans scores the highest in PSAVT, whilst is the lowest
amongst the five countries for VA. France is the lowest for
PSAVT, GE, RQ, ROL and COC, with only PSAVT
recording a significant lower mark together with UK and
Germany. This could be due to the higher number of terrorist
attacks. Sweden is top with a perfect score of 100 for both
VA and ROL, and a close to perfect score for COC.
[23] shows Sweden in the lead, with Germany and UK
slightly trailing behind, and Japan and France lagging
behind in comparison with the other three countries. The
same pattern is noted with the Rule of Law rank, Open
Government Rank and Absence of Corruption Rank, with
the exception of UK with rank lesser than Japan for the
Absence of Corruption Rank (Table 3).
Table 1 Hofstede cultural dimensions
Country PD IN MAS UAI LTO IND
France 68 71 43 86 63 48
Germany 35 67 66 65 83 40
Japan 54 46 95 92 88 42
Sweden 31 71 5 29 53 78
UK 35 89 66 35 51 69
Source [24,25]
Table 2 Worldwide governance indicators
Country VA PSAVT GE RQ ROL COC
France 86 57 89 84 88 88
Germany 96 70 94 93 93 93
Japan 79 82 96 85 89 91
Sweden 100 81 96 97 100 99
UK 92 62 94 99 94 94
Source [26]
372 G. A. Rubasundram
Transparency International [21] is also consistent with
[23] with France and Japan lagging behind the other three
countries in terms of policy performance. In terms of
democracy, UK ranks lower than Sweden, Germany and
France. Governance ranking reflects that Germany ranks
lower than UK, but much higher than Japan and France by a
wide margin. Sweden scores the best in all three pillars
(Table 4).
The five countries score well in all three (3) E-
Government, E-Participation and Online Service Index,
based on Table 5. The United Kingdom and Japan are the
top two countries for E-Participation, with France being at
number twelve (12), and Germany and Sweden tying for
number twenty-seven (27), across the 193 United Nations
countries.
6 Discussion
6.1 The United Kingdom
The UK ranks the lowest among the five countries resear-
ched, and positions itself at 15th out of 34 countries for the
SDG. It ranks high in terms of low rate of domestic material
consumption, among the five most generous countries in
terms of development assistance, among the best performing
in terms of air quality and wastewater management. It scores
poorly in terms of its income gap inequality, access to
modern energy, has high levels of nitrogen and phosphorous
used in farming which harms the environment, and a high
rate of obesity. Interestingly, one of the key weaknesses as
Table 3 Corruption perception index and world justice project rule of law
Country CPI
a
Rule of law
(score)
b
Rule of law
(rank)
b
Open govt.
(score)
b
Open govt.
(rank)
b
Absence of
corruption (score)
b
Absence of
corruption (rank)
b
France 69 0.72 21 0.77 13 0.74 19
Germany 81 0.83 6 0.79 10 0.84 10
Japan 72 0.78 15 0.68 21 0.83 13
Sweden 88 0.86 4 0.84 5 0.91 5
UK 81 0.81 10 0.84 7 0.82 14
Source
a
[21]
b
[22]
Table 4 Sustainable governance index 2017
Country Policy perf.
(score)
Policy perf.
(rank)
Democracy
(score)
Democracy
(rank)
Governance
(score)
Governance
(rank)
France 6.22 16 7.08 21 6.05 26
Germany 7.39 6 8.78 5 7.04 11
Japan 5.83 23 5.80 33 6.17 24
Sweden 8.03 1 9.19 1 8.40 1
UK 6.99 8 7.29 23 7.19 9
Source [23]
Table 5 E-government, E-participation and online service index
Country E-government development index (2016) E-participation index (2016) Online service index (2016)
France 0.8456 0.8983 0.9420
Germany 0.8210 0.7627 0.8406
Japan 0.8440 0.9831 0.8768
Sweden 0.8704 0.7627 0.8768
UK 0.9193 1.0000 1.0000
Source [1]
The Complexity of Governing Smart …373
highlighted in the UK SDG Index is the failure to manage
inequality, which further corroborates with the Hofstede
cultural research; reporting a lower PD score amongst the
higher society, in comparison to the working class.
The UK government has promoted Open Data as a means
of holding the government accountable, improving the
quality of public services and creating new businesses. Some
key players and initiatives include the Public Sector Trans-
parency Board, Public Data Group and the Open Data
Institute [3]. These initiatives justify the perfect score of
1000 achieved for the Online Service Index and the
E-Participation Index for 2016. However, if comparing it to
the traditional WGI and SDG, there seems to be discrepancy
in the reporting of between traditional and technology.
This is further expanded in the [23] report. The report
supports that increasing amounts of government information
is available online with outreach campaigns targeting
specific groups. However, citizens are still reported to have
moderate level of policy knowledge. The media is broadly
independent, with reported scandals between the press and
politicians, with the government reported reluctance to
report on issues of state surveillance. The lower score on the
[23] democracy pillar however is a cause of concern, and
more efforts need to be incorporated.
6.2 Sweden
Sweden scores first out of the thirty-four OECD countries for
the SDG. In line with its culture leaning towards being
feminine, it leads the OECD in female representation in
parliament by a good 45%. It is amongst the top three
countries to combat climate change, with good employment
rate and economic performance. However, surprisingly, it
rates low for its education especially in terms of the PISA
results where it is positioned at number 28 out of 34. It also
ranks low for energy efficiency and terrestrial biome pro-
tection. Based on feminine culture and low PD, it is expected
that it would score well in terms of good governance, which
is reflected in the traditional WGI and SDG. However, in
terms of technology and the assessment of E-Indexes, it
ranks 27 out of the 193 countries, which does not corrobo-
rate with the earlier results. An example of its citizen
empowering platform is the Delivery and Access to Local
Government and Services (DALI) Project in Gotenborg,
Sweden which aims to empower citizens, providing infor-
mation about the municipal processes and services, and
acting as a medium for debate.
Sweden ranks first place in all aspects of the SGI Index,
consistent with its SDG results. Sustainable Governance
Indicators SGI [23] reports that its electoral process is well
regulated, but monitoring and disclosure policies with
regards to funding are weak. Media independence is well
protected, rule of law is strong and corruption is rare, with
growing reports of abuse at local levels. The public has a
strong interest in politics, with political party decision
making gradually becoming more open.
6.3 Japan
Japan ranks 13th out of the 34 OECD countries for the SDG.
Japan is a leader in terms of Goal 12: Consumption and
Production, Goal 4: Education and as well as healthy life
expectancy. The score for education reflects on their culture
that focuses on education. They score well in the risk of
homicide, and are one of the slimmest countries of the
world. However, they perform poorly in terms of gender
equality and control of poverty. Granier and Kudo [27]in
their study of Japan differentiate between Smart Cities and
Smart Community, to which the Smart Community differs in
their focus of participation of all stakeholders among which
the citizens and behavioral change through lifestyle inno-
vation. The same research analyses the unique characteristics
of Japan’s democracy due to its history and culture, con-
trasting the rather passive and mostly reactive citizens prior
to the 1990s and the more institutionalized and participatory
mechanisms subsequent to the 1990s, till date. Manville
et al. [19] reports that civil society groups have increasingly
participated in expressing public concerns, however, it has
little effect on policies.
Granier and Kudo [27] also found that citizen participa-
tion is guaranteed in two processes, one where residents are
briefed before the project initiation and the other is feedback
meeting during implementation, with no direct participation
during the project design. Several interesting points were
reflected during the research, especially with the expecta-
tions of the city officials for the citizens to cooperate, the
companies involved consider citizens not competent in ICT
and energy issues, hence the perception that the citizens
lacked legitimacy to actively participate, and should only
focus on a specific and limited set of actions. This contrasts
with the [23] report that finds that the citizen policy
knowledge is strong, which debates that it is a deliberate
attempt to not consider the public perception. This is con-
sistent with their lower WGI score for VA. Therefore, even
though Japan may be positioned number 2, after UK in the
E-Index scores, the overall use of the technology to achieve
citizen participation seems artificial. This is agreed by [28]
who discusses the possibility that Japanese planners are not
aware of the global discourse on the need for citizen par-
ticipation in smart cities.
Japan’s efforts to increase the public trust in the gov-
ernment and media needs to improve. Increasing reports of
government control over the media and other changes to
legislation has concerned many on the growing threat of
374 G. A. Rubasundram
press freedom and public information access. This is also
linked to issues of transparency in campaign funding, with
reports of scandals [23].
6.4 Germany
Germany ranks sixth out of the thirty-four OECD countries
in the SDG. As Europe’s economic powerhouse, it scores
high in terms of economic performance, employment and
narrow poverty gap. It also scores well in terms of conser-
vation, low homicide rate and relatively high expenditure in
terms of research and development. However, like the UK, it
also has a level of nitrogen and phosphorous use, high risk of
pollution for soil, air and water, low protection of animal and
birds and high waste per capita.
The concept of citizen participation is not new in Germany;
with the first citizens initiative (Bürgerinitiative) founded in
1947 to protect German forests, and subsequently grew to
prevent dominance of West German bureaucracy. The citi-
zen’s initiative active participation takes a more adversarial
position with increased interest caused by changes in value
and engagement with social and environmental issues. The
existence of the citizen centered municipality (Bürgerkom-
mune) and volunteer centers or citizen foundations (Bürger-
stiftungen) add value and reflect the initiatives taken over the
years. A minimum of signatures of 2.5–17% is needed to
formally submit a demand for a local referendum including, to
rescind a council decision. Since 2005, Germany has provided
their citizens with the possibility to submit online petitions to
the German parliament, participate in online discussions and
also able to co-sign petitions [29]. Although Germany seems
to have a historical basis of citizen participation, a key hin-
drance for the further development of this is the lack of
financial initiatives [30]. This explains that although Germany
is positioned number 27 among the E-Indexes, the VA score in
WGI is reasonably higher than the other three countries, with
the exception of Sweden.
The Berlin Smart City attaches great importance to its cit-
izen’s rights to self -determination with regards to informa-
tion; data protection is a fundamental right and therefore one of
the foundations of a free and democratic society. In a smart
society, it must be possible for the public to remain anony-
mous when travelling through the city i.e. to ensure data with
regards to their movement is not passed around to private
sector or state agencies. Another initiative is the proposed
E-Government law aiming to set the preconditions required to
link up all procedures. Under the E-Government law, the
participation of the urban society is supported electronically.
One example is the platform “Service City Berlin 2016”,a
commitment to make the city more business and citizen
friendly, transparent, participatory and efficient [31].
Sustainable Governance Indicators SGI [23] reports citi-
zens demonstrate a low average level of political knowledge,
reflecting declining interest in political and parliamentary
debates and declining trust in the media. However, stake-
holders such as employer’s organisation’s and unions remain
powerful, providing a good platform for further debate and
improvement.
6.5 France
France ranks tenth out of the thirty-four OECD countries
assessed for the SDG performing well in its activities com-
bating climate change. It has lower greenhouse gas emis-
sions per GDP than 29 other OECD countries. France also
has made commendable strides towards ending poverty. The
French also expect 72 years of life in full health, putting it
among the top ten countries for this indicator. However, it
requires significant policy action to reduce inequality caused
by socio economic status in terms of education opportuni-
ties. Also, the French generate about 530 kg of municipal
waste per capita, ranking 24th among the OECD countries.
In 2015, the city of Paris launched “Paris, smart and sus-
tainable city”(“ville intelligente et durable”), with the inten-
tion to transform Paris into a “sustainable, connected and open
city”. It aimed to integrate technology such as sensor net-
works, data collection and analysis, to promote collaboration
between Parisians and civil servants in order to build efficient
public service via the co-construction of policies. Using citi-
zen participation as a key element, an online portal called
“Madame la Maire, j’ai une idée”(Lady Mayor, I have an idea)
was launched. The portal provides a central platform to help
Parisian’s contribute to the life of the city by proposing ideas
and projects, which primarily serve to define the budget of the
city. The ideas and projects are then debated, augmented and
enriched in a collaborative approach, and voted on for appli-
cation. It also organizes workshops to co-construct projects
amongst the interested stakeholders. Reports reflect that at
least 5000 proposals were submitted for the 2015 budget, with
hundreds proposed for a vote.
Though this is a good step for France, it is ranked number
12 amongst the E-Indexes among the 193 countries. Com-
paring this to its historical culture of high PD, it is not sur-
prising that it scores lower among the five countries in terms
of the WGI good governance, consistent with the CPI and
WJP scores as well. The SDG reports structural problems and
a lack of consistency, which has also caused the country to
lack competition. The low PSAVT is line with
terrorism-related state of emergency which was extended to
2017, following the Nice attack in 2016. France ranks low
middle in terms of democracy and governance, both cor-
ruption and legal uncertainty continue to be a concern, amidst
The Complexity of Governing Smart …375
the strengthening of framework and rules. Citizen’s policy
knowledge is deemed to be relatively poor, with a reluctance
to accept change noted [23]. This differs with the high UAI as
measured by the Hofstede’s Cultural Dimension as normally
high UAI countries prefer to be structured, well planned and
are more open to changes. This could explain the rising
tensions with the increasing demonstrations and social vio-
lence reported, with more French becoming dissatisfied.
Sustainable Governance Indicators SGI [23] reports that
trust in government, and the reflection on the French gov-
ernment’s credibility has reduced due badly managed com-
munications. Media independence is legally guaranteed, but
is somewhat affected by government subsidies and corporate
ownership. However, to end on a positive note, dynamic
new technology start-ups seem to be breathing new life into
the business sector, with the rise of the online sector
appearing to improve the quality of democracy.
7 Conclusion
Despite wide ranging initiatives and investments, progress to
integrate systems in smart cities is slow. Factors affecting
this could include information failures, coordination failures
especially in terms of silo systems and aged infrastructure,
the inability of cities to gain first mover advantage, lack of
finance and the lack of trust in data privacy and system
integrity [16]. To be successful, clear and genuine visions
are needed to support innovative, participative and trans-
parent cultures to be embedded within all levels of society,
public—private partnerships and legislations.
However, this is not reflected based on the study carried out.
Discrepancies when comparing between the traditional good
governance indexes and technology based E-Indexes reflect
that it still remains uncoordinated and not being utilized
appropriately. In the traditional approaches, Sweden and Ger-
many are leaders, with UK generally being in third place and
France and Japan, taking the last two positions. This is con-
sistent with both France and Japan’s Power Distance scores.
Zhao et al. [8] found that PD had a negative correlation with
E-Government development. In the E-Participation platform,
UK, France and Japan take the lead, with Sweden and Germany
taking the last two positions. Likewise, it is obvious that citizen
input is not expected beyond a very specific and limited set
of expression and actions [27] as possibly reported in Japan.
This is consistent with Japan’s lower WGI VA score and
SGI Democracy score. The gap between UK’sperfect
E-Participation score and the SGI score for democracy, SDG
rank in comparison with the other four countries and WJP Rule
of Law is a matter of concern and reflects the same.
Smart cities stakeholders need to enhance the genuine effort
to actually achieve collaborative and participative gover-
nance. Although, most cities are still at the beginning stages of
the smart city life cycle, the silos remain and are still haunting
the positive input-output expectation and returns on invest-
ment. Citizens should be allowed to be more pro-active in
voicing their opinions and ensuring that governance,
accountability and transparency is upheld. Though the five
countries score reasonably well in terms of their WGI indi-
cators, the impact of the VA is yet to be seen in the e-capacity.
The subjectivity of the e-framework indicators also need to be
scrutinized further as measures to include a key performance
indicator with clear input-output ratios, taking into time
frames of receiving feedback, assessment and inclusion of the
feedback should be taken into account. Of course, one would
need to logically accept that not all feedback maybe con-
structive to the development of the budget or project, but clear
process flows and criteria’s should be in place to ensure that
there is interaction and a proper feedback mechanism. Media
and other marketing efforts to ensure that citizens have access
to basic infrastructure need to be in place, have knowledge of
the e-system’s need to be in place, to build the trust and open
communication between the members of the public and the
government. The flow of communication and good gover-
nance should be two-way, from the global governance per-
spective to a country level basis, and finally down to the smart
cities and a more local perspective. A bottom’s up perspective
is important as well, with the public pushing for more active
participation. However, this does not seem to be as effective.
Further research is required, to identify the gaps in terms
of collaboration of the various institutions and goals
required, as well as the security of the systems as well the
data contained. The responsibility of the smart city should
not just be municipality based, but a top down, bottoms
approach should be incorporated to ensure a consistent and
integrated result is achieved beyond cities, countries and
institutions. More surveys could be carried out to gauge the
public expectation and satisfaction of the e-government
initiatives as there seems to be a lack of required informa-
tion. With the high level of migration, cultures are expected
to change albeit slowly, and governance codes and conducts
are expected to integrate, reducing the subjectivity of the
current indicators. The role of global and country-level
institutions is expected to increase, with the need to increase
the level of genuine participation from the members of the
public. Otherwise, being smart or the e-platforms remains as
it is, a tool that requires further public spending without any
real benefit in terms of governance or sustainability, being
further aggravated with the diminishing public trust in
governments and media reported.
376 G. A. Rubasundram
References
1. United Nations E-Government Survey 2016, E-Government in
Support of Sustainable Development. Department of Economic
and Social Affairs, United Nations New York (2016).
https://publicadministration.un.org/egovkb/en-us/Reports/UN-E-
Government-Survey-2016. Last accessed 21 Sept 2017
2. Rodriguez Bolivar, M.P: Transforming City Governments for
Successful Smart Cities. Public Administration and Information
Technology 8, Springer International Publishing Switzerland
(2015)
3. Thomas, M.A: What do worldwide governance indicators mea-
sure? Eur J. Dev. Res. 22(1), 31–54 (2010)
4. United Nations Transforming Our World: The 2030 Agenda
for Sustainable Development A/RES/70/1. https://sustainable
development.un.org/content/documents/21252030%20Agenda%20
for%20Sustainable%20Development%20web.pdf. Last accessed
21 Sept 2017
5. Kroll, C.: Sustainable Development Goals—Are the Rich Coun-
tries Ready? Bertelsmann Stiftung September 2015 with the
support of the UN Sustainable Development Solutions Network
(2015)
6. Arnaboldi, M., Spiller, N.: Actor—network theory and stakeholder
collaboration: the case of cultural districts. Tour. Manage. 32,
641–654 (2011)
7. Tuan, L.T.: From corporate governance to balanced performance
measurement. Knowl. Manage. Res. Pract. 2014(12), 12–28 (2014)
8. Zhao, F., Shen, K.N., Collier, A.: Effects of national culture on
e-government diffusion—a global study of 55 countries. Inf.
Manage. (2014). https://doi.org/10.1016/j.im.2014.06.004(2014)
9. Van Kersbergen, K., Van Waarden, F.: Governance as a bridge
between disciplines: cross-disciplinary inspiration regarding shifts
in governance and problems of governability, accountability and
legitimacy. Eur. J. Polit. Res. 43,143–171 (2004)
10. North, D.C: Institutions. J. Econ. Perspect. 5(1), pp 97–112 (1991)
(Winter)
11. North, D.C: Economic performance through time. Am. Econ. Rev.
84(3), 359–68 (1994)
12. Rasiah, R.: The role of institutions and linkages in learning and
innovation. Int. J. Institutions Econ. 3(2), pp 165–172 (2011)
13. IIRC Integrated Reporting. In The International Integrated Report-
ing Council. http://www.theiirc.org/. Last accessed 21 Sept 2017
14. Licht, A.N., Goldschmidt, C., Schwartz, S.H: Culture rules: the
foundations of the rule of law and other norms of governance.
J. Comp. Econ. 35 659–688 (2007)
15. Roland, G.: Understanding Institutional Change: Fast-Moving and
Slow-Moving Institutions. Studies in Comparative International
Development (2004)
16. BIS Smart Cities: Background Paper, Department of Business
Innovation and Skills. https://www.gov.uk/government/uploads/
system/uploads/attachment_data/file/246019/bis-13-1209-smart-
cities-background-paper-digital.pdf. Last accessed 21 Sept 2017
17. World Bank: Governance, The World Banks Experience. World
Bank, Washington DC (1994)
18. Nam, T., Pardo, T.A: Conceptualizing smart city with dimensions
of technology, people and institutions. In: The Proceedings of the
12th Annual International Conference on Digital Government
Research. https://www.ctg.albany.edu/publications/journals/dgo_
2011_smartcity/dgo_2011_smartcity.pdf. Last accessed 9 Sept 2017
19. Manville, C. et al.: Mapping Smart Cities in the EU, Directorate
General for Internal Policies, Policy Department A: Economic and
Scientific Policy. European Parliament’s Committee on Industry,
Research and Energy (Available from http://www.europarl.europa.
eu/RegData/etudes/etudes/join/2014/507480/IPOL-ITRE_ET(2014)
507480_EN.pdf. Last accessed 21 Sept 2017
20. Kaufmann, D., Kraay, A., Mastruzzi, M.: The worldwide gover-
nance indicators: a summary of methodology, data and analytical
issues. World Bank Policy Research Working Paper No. 5430
(2010) http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1682130.
Last accessed 21 Sept 2017
21. Transparency International, Corruption Perceptions Index 2016.
https://www.transparency.org/news/feature/corruption_perceptions_
index_2016. Last accessed 21 Sept 2017
22. WJP: Rule of Law Index 2016, World Justice Project. https://
worldjusticeproject.org/our-work/wjp-rule-law-index/wjp-rule-law-
index-2016. Last accessed 21 Sept 2017
23. Sustainable Governance Indicators SGI. Bertelsmann Siftung.
http://www.sgi-network.org/2017/. Last accessed 21 Sept 2017
24. Hofstede, G.H: Culture’s Consequences: Comparing Values,
Behaviours, Institutions and Organisations Across Nations. sec
ed Sage, Thousand Oaks, CA (2001)
25. Hofstede, G.H.: Culture’s Consequences: International Differences
in Work Related Values. CA, Sage, Thousand Oaks (1980)
26. World Bank Worldwide Governance Indicators. https://data
catalog.worldbank.org/dataset/worldwide-governance-indicators.
Last accessed 21 Sept 2017
27. Granier, B., Kudo, H.: How are citizens involved in smart cities?
Analyzing citizen participation in Japanese “Smart Communities”.
Inf. Polity 21,61–76 (2016). https://doi.org/10.3233/IP-150367
IOSPress(2016)
28. DeWit, A.: Japan’s rollout of smart cities: what role for the
citizens? Asia PacificJ.11(24) (Number 2) (2013)
29. Vrabie, C.I., Tirziu, A.M.: E-participation—a key factor in
developing smart cities. In: EIRP Proceedings, vol. 11. The
European Citizen and Public Administration (2016)
30. Tessmann, J., Kirchner, I.: The Participation of Citizens in
German Local Government. City Mayors. http://citymayors.com/
government/german-local-government.html. Last accessed 21 Sept
2017
31. Berlin Senate Department, Smart City Strategy Berlin, Senate
Department for Urban Development and the Environment Berlin.
http://www.businesslocationcenter.de/imperia/md/blc/wirtschafts
standort/standort/content/strategie_smart_city_berlin_en.pdf. Last
accessed 21 Sept 2017
The Complexity of Governing Smart …377
The Impact of Smart Technology
on Advertising: A Case Study of Pepsi-Egypt
Bassant Eyada and Mai El Nawawy
Abstract
Brands are turning technology in a way to attract and
engage consumers in new and innovative ways. Adver-
tising embracing technologies have proved to have
greater impact and more sophisticated ways to reach
their target audience, gain great social connection and
product value. Advertising is an experience delivered to
the consumers, the more the interaction the more
memorable and effective the experience becomes, leading
to higher levels of brand loyalty and motivation. The
creativity in using digital capabilities is considered a very
effective way to breathe life into advertising campaigns.
The research aims to explore the new technologies used in
advertising in Egypt, using the Pepsi Campaign created
during the month of Ramadan 2017, with a different,
smart and futuristic approach using digital advertising
channels for campaign activation. In the past Ramadan
campaigns Pepsi adverts were mainly nostalgic, remind-
ing Egyptians with the glory of the past, carrying the
same concept of gatherings, reunions, and get together.
With the increasing importance of digital technology and
smart phones in precise, and with the increasing reliance
on smart phones, it has become almost impossible to ask
consumers to let go of their phones. With almost 2.32
billion smart phone users worldwide, and 23.6 million
users of smartphones in Egypt, the campaign narrows the
gap between the brands slogan “Let’s Complete our
Gathering”versus what is happening in reality. Using an
interactive video and by utilizing the smartphones, Pepsi
asks consumers not to put aside their phones to watch the
ad, but to use their phones to watch it. The research
explores the impact of technology on advertising trends.
Keywords
Advertising Smart advertising Smart technology
Pepsi campaign Egypt
1 Introduction
The development of technology has changed the life of
every human being on earth; with a very strong impact on
the way people communicate with each other and the way
they lead their lives. With the widespread of smart phones
and technology, the world has become totally reliant on this
technology in every detail of human lives, people now tend
to greet each other at various occasions with e-cards, emails,
text messages, whatsapp chats and many other online
applications. The traditional methods of reading, sharing
information, communicating, living, and watching TV have
changed dramatically, people find it more convenient to
communicate through a smart phone application, read books
with e-readers, tablets and smartphones, watching TV has
also evolved with the development of technology, nowadays
people do not need to be sitting in front of the TV to watch
what they want, they can watch whatever they want wher-
ever they want with the help of their smartphones. Based on
Flurry Analytics research, the average time a person spends
on mobile device daily is almost 3 h and 40 min, a survey
done by Bank of America in 2013, exploring mobile trends
among adult consumers across the US, indicated that 47% of
US consumers would not last a day without their smart-
phones, the survey also found that young millennials of ages
18–24 consider their phones more important than their
self-hygiene, 60% consider their smartphones more impor-
tant than coffee, stating that they check their phones every
6.5 min [1].
Technology has changed the consumer behavior, as
consumers became more mobile, more social, and with more
simultaneous consumption. These changes are creating a
major transformation of marketing and advertising aspects,
B. Eyada (&)M. El Nawawy
American University in the Emirates, Dubai, UAE
e-mail: bassant.eyada@aue.ae
M. El Nawawy
e-mail: mai.elnawawy@aue.ae
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_44
379
creating challenge for the brands to connect with their
consumers through their devices and social media, which
highly impact the increased relevancy of the targeted audi-
ence and content.
2 Literature Review
2.1 Traditional Versus Digital Advertising
In some definitions, traditional advertising refers to the
content of the advertising rather than the medium being
used, a traditional advert is the one that has no other purpose
than to sell the advertised product, other definitions refer to
traditional by means of the format of the medium being used
such as radio, TV, and print ads, usually considered as a
one-way form of communication.
According to McLuhan, the manner in which a message
is being communicated has a much more profound effect on
consumers than the content of the message itself. McLuhan’s
[2] statement “The medium is the message”defines the
medium as an extension to the human’s mind, body and
senses. Smartphones are hence considered as a medium that
extends social connectivity, the medium exerts a much more
powerful effect on consumers than the content delivered.
McLuhan states “the personal and social consequences of
any medium, that is, of any extension of ourselves, result
from the new scale that is introduced into our affairs by each
extension of ourselves, or by any new technology.”
With the vast shifting of technology, over the past two
decades the traditional forms of advertising is being gradu-
ally displaced, digital advertising is taking over television
advertising in total dollar spending in 2017, whereas the
market share of radio, TV and print advertisements has been
shrinking over the past 10 years [3].
In their article Martinez and her colleagues [4] state that
ineffective traditional advertising planning methods and the
growth in the digital advertising are among the reasons that
urged a need for new tools and methods for advertising in
the age of the internet. Throughout their paper they studied
Programmatic advertising as one of the new effective forms
of automation in the new online advertising ecosystem. They
defined programmatic advertising “as advertising business
that develops buying and selling processes via software
based on automation.”
In the digital age, advertisers are no longer committed to
place their ads on the traditional media and to bare subsi-
dizing content production. Stole [5] believes that it is not
necessary for advertisers in the digital age to waste their
money on consumers with no interest in the products being
advertised, as “smart advertising”can target individuals and
personalize their needs wherever they went via the internet
and their smart phones.
This shift towards digital campaigning has redirected
advertising strategies to a more mobile centric direction,
considering that smart phones are not only receivers of
information, but are transmitters as well. Consumers tend to
use their smartphones for everyday instant decisions; where
to shop, where to eat, and fastest route etc. With this, speed
and relevance become the most important points to be
considered by brands, advertising needs to reach consumers
at their convenience with the relevant message, specific
timing, and most importantly leaving the intended impres-
sion. With brands not only competing with their local
entrants, but with competitors all over the world innovation
and marketing wise, digital advertising therefore has a huge
advantage over traditional forms of advertising. With the
rapid change in technology, digital advertising has more
potential of grabbing consumer attention, creating a two-way
communication status with the brand through interactivity,
on-the-move access, and data-driven targeting (Fig. 1).
A few good reasons are behind the shifting from tradi-
tional to digital advertising, based on a study done by Wall
Street Journal in 2014, 60% of television viewers download
or record the TV shows on their smart devices so they can
watch them skipping the ads, consumers shift to the internet
as a source of information for the brands or services they are
they are interested in. Digital advertising allows advertisers
to measure and accurately determine the Return of Invest-
ment, as an example, in 2013, Raffles Potato Chips had spent
only 29% on digital advertising, while nowadays it is
spending 100% of their ads on digital media. Under Armor
was also spending 70% on TV advertising, in 2016, it shifted
its budget to 50–50% split between TV and digital adver-
tising. The main reason was that digital advertising has the
ability of more specific targeting, reaching the exact people
at the exact time, with more flexibility in testing and opti-
mizing advertising results and feedback. Internet ad spend
grew 17% in 2016, an average rate forecast of 11% is
expected between 2016 and 2019 globally. By 2019 it is
expected that internet advertising accounts for 41.7% of
global ad spend [6].
Egypt has a resilient advertising industry which was
buoyant even during the financial crisis during 2009. Headed
by telecom services, the online advertising industry has
grown of 71.9% from 2007 till 2012, comprising mainly of
search engine advertising and display advertising. While
video, mobile and online advertising are minimal in the
industry [7]. Net advertising spent on TV has been estimated
at $368 million in 2015, which is 12.5% more than 2014.
Rates for TV slots increased by 15% during 2015, a one
minute time slot costs between %1360 and $8180 depending
on the channel [8] (Fig. 2).
In 2017, Bentley launched the “Bentley Inspirator App”
as part of its campaign, available only on IOS, the app uses
an emotion recognition software to suggest the most suitable
380 B. Eyada and M. El Nawawy
car for the consumer, the app analyzes the consumer’s facial
reactions through the smartphone camera, and based on that
suggests the best car color, features and specifications for
him. In another campaign, Bentley uses NASA’s space
exploration technology to create a zoom in feature on the
smartphones where consumers can zoom in with almost 53
billion pixels, starting with a wide panoramic view of San
Francisco’s Golden Gate Bridge, zooming in until the
Bentley motif stitched signature is seen on the headrest of a
Bentley car on the bridge.
2.2 Digital Advertising and Customer Loyalty
Companies and corporates performing in the online sector
realize the privilege of the digital world and value the
quantity and the quality of the data and technologies pre-
vailed on the digital platforms. These resources are used to
empower all parties in the communication processes,
including advertising as one of these processes. By the late
90s, Yahoo, Google, later Facebook and other similar
companies, started to realize the information they have about
Fig. 1 Growth in digital advertising. Source Adage.com published February 23, 2017
Fig. 2 Digital advertising surpassing TV. Source Wall street journal
The Impact of Smart Technology …381
internet users and their using patterns for the online platform
is important for advertising and commercial sectors. Differ-
ent plans and protocols were made to track people’s online
activities [5].
Digital channels provide the best tools for message per-
sonalization, changing the role of the consumer from being a
customer to becoming an interactive part of the advertise-
ment gives the advantage of better information search
options and allowing them to spend more time with the
advertised brand. This customer involvement based on their
channel and content preferences increases the level of
interest, which enhances customer loyalty.
Brand communication is a term used to describe the
communication between the brand and the consumer,
establishing a relationship that can mainly occur through
digital media advertising. There are factors affecting this
relationship, mainly frequency and content. For this rela-
tionship to extend, a pattern of repeated purchases and a
positive attitude need to exist. A brand communication
strategy relies heavily on four main components: the target
audience; where advertisers need to know exactly who they
are, what are their main interests, their attitudes, lifestyles,
demographic descriptions, and their preferred form of
communication. The message; the story of the brand must be
relevant and persuasive to the selected target audience. It
should relate to their lifestyle, beliefs and way of thinking.
The message communicated needs to change the mindset of
the audience who do not follow the product, it also needs to
reinforce brand image to those who do. Creativity; the cre-
ativity of the advertisement is fully related to the message
being communicated, it has to determine the end effect
required from the whole communication process. Creativity
also relies on the emotional role of the brand within con-
sumer’s lives, as messages play on two main levels rational,
which states facts, features and benefits of the brand, and
emotional which is how the message will leave the con-
sumers thinking about the brand. The increase of the emo-
tional strength of the message leads to long-term brand
existence within the consumers’lives. Media; the selection
of the type of media used to advertise must be part of the
consumer’s everyday habits, the message will only reach the
consumers if it is where they are, if it targets the audience
when they are most receptive. The proper allocation of the
message with the repeated frequency of advertising moves
the consumer effectively through the four stages of the A.I.
D.A response model: Awareness, Interest, Desire and
Action.
Nike sets an efficient example of using digital media and
smartphone technology to create consumer involvement in
several of its campaigns. One example is their campaign
“Time is Precious”a series of videos that use no visuals, but
only black and white text. With these videos, Nike gives a
message to stop texting and wasting time on smartphones
and start training. The campaign starts with the text “This
commercial is just one minute out of the ten hours a day you
spend glued to your screens”.
In another campaign, in 2009, Nike sets up an interactive
digital billboard in Times Square, New York, allowing
people to text their own words for a chance to win Nike
shoes. The audience had to dial a number displayed on the
billboard, and use their smartphones to customize the shoe
on the screen. In 2010, Nike launched its “Nike Grid”giant
virtual game board campaign in the UK. The players would
need to reach different checkpoints around London to earn
points. The campaign was considered as the first attempt to
merge real life sports with digital advertising. Another
campaign promoting Nike’s free running shoes, a digital
campaign was created challenging people to clock their
fastest running time over two miles. The application Shazam
App was used to download the song “I would run to you”
requesting people to sing it while running.
Bringing brands closer to consumer’s everyday life is the
key point to brand loyalty, changing the role of consumers to
co-producers of the ads. The relation between customers and
advertising in the digital and internet world has been going
through different developing stages. As Stole [5] mentioned
that early internet users were not welcoming the first intro-
duced online advertisements like banners and pop-up ads.
Yet, the CEO of Procter and Gamble Edwin Artz as say that
“emerging technologies were giving people the opportunity
to escape from advertising grasp altogether”yet, corpora-
tions needed to, as Artz adds “grab all this new technology
in our teeth once again and turn it into a bonanza for
advertising [5].
2.3 The Digital Sphere and Advertising
The digital ecosystem is serving the marketing and adver-
tising industry in a great deal. It has been providing the
industry with unlimited paths and abilities, starting from the
research and data collection stage, passing by the content
creation, production and presentation, in addition to target-
ing the needed audience with the tailored messages, reaching
the stage of obtaining an instant and interactive feedback
from the consumers. With all the technologies and digital
features available advertising can be put in the right context
of the consumers’lives. In his article, Digital Advertising
Trends You Need to Know, Grensing-Pophal states that in
the report “Digital Marketing Landscape: The Power of
Digital experience in 2014”it was mentioned that the
majority of the respondents in the study considered the
creation of digital experiences as ‘high’or ‘very high’and it
was found that there is a relationship between organizations
placing a high priority on digital experiences and revenue
growth [9].
382 B. Eyada and M. El Nawawy
Grensing-Pophal has listed a number of the most signif-
icant digital advertising trends. On the top of the list comes
the Big Data Trend. The author explains this trend as, not
only the ability of the marketers to gather and measure data
about the market needs, but also to manage this huge amount
of data to be able to draw useful conclusions and to take
meaningful decisions. It is said that the within the frame of
the Big Data trend, the internet has been giving more
strength for small marketing and advertising corporations,
empowering them against larger competing entities. Another
noteworthy feature for digital and smart technologies is their
ability to chase consumers and engage them in the com-
munication process wherever they are. This feature was
presented by Grensing-Pophal in his list as the Location
Based Communication Trend. The author pointed out that it
is a key digital advertising trend as it blurs the line between
benefit and intrusion. Backing the same idea, the CEO and
founder of Connectivity Marketing and Media in Florida
says “with GPS pinpointing becoming more and more
prevalent, and with advances in smartphone technology,
many brands are beginning to utilize push technology that
allows them to push specific ads within a radius of a con-
sumer’s phone”[9].
Smart phones and Mobiles are the main players in the
digital era, and when it comes to the advertising sector, these
new media are growing and are leading the communication
and marketing processes. As Grensing-Pophal mentions the
opportunities in mobile are evolving as consumers are
depending more and more on their smart devices wherever
they go. The prevalence of new and digital technologies in
media and advertising sectors, is presenting new forms of
content presentation, like micro- blogging and micro- video.
Applications like twitter and Vine are being presented as part
of the marketing and advertising tools used to send tailored
messages to homogenous and heterogeneous audiences with
controlled budgets and unlimited options [9].
Having the opportunity to present the different formats
for Advertising in the age of the new media can be con-
nected to the concept of Multiplatform Consumption.
Grensing-Pophal has listed this concept as a significant
digital advertising trend, arguing that delivering the com-
munication content effectively across multiple platforms is
“a must for 21st-century marketers”[9]. As Stole concludes
that “The commercially driven internet model heightens the
blurring of advertising and media content and obscures
distinctions between producers and consumers of news,
entertainment, and advertising”[5].
2.4 2017 Pepsi Campaign
Every year during the month of Ramadan, large companies
and corporations are competing to present their campaigns
and to seize the highest share of consumers’viewer-
ship. Content managers and producers are utilizing all the
available resources and tools to execute a successful cam-
paign to reach and persuade the target audience with the
messages of the campaign. In Egypt, Ramadan is a special
month, which is labeled as the month of family and charity.
Most of the time marketing and advertising campaigns
presented during Ramadan, are stressing the celebrated
values and traditions for this Holy month.
Big advertising campaigns during and after Ramadan are
part of the social and media debate, to the extent that
sometimes it is considered a media entertainment content in
itself, with dedicated viewers and followers. In 2015, there
was a 17% jump in ad spending during the month of
Ramadan, accounting for almost 30% of total ad spending in
Egypt for 2015.
For the past decade Pepsi has been sending one message
in its Ramadan campaign. This message focuses on values
related to family and the idea of (let’s all be together.) In the
previous Pepsi campaigns, new technologies have been
serving the creativity of the presentation of the message in
the campaign, yet, this year Pepsi has been taking the usage
of technology and new media to another level, through
engaging the technology in the social life of the viewer. Not
only sending messages on the importance and joy of being
together in the ads of the campaigns, but also asking the
viewers to come together physically to be able to watch the
ad displayed and if they are not together they will not be able
to watch it.
In the previous Ramadan campaigns of 2013, 2014, and
2015, Pepsi had been always insisting on the message of
gathering people together, with the concept that Ramadan is
the month of family and friends gathering, Pepsi used
celebrities from different eras of the Egyptian Cinema and
reminded people of the glories of the past, bringing together
the entertainment icons who carry the best memories. In
2017, Pepsi introduces a new tactic of advertising, with the
amount of time youth are spending on their smart phones,
Pepsi decides to use this technology to create the ad. Car-
rying their message of “let’s complete our gathering”
bridging the gap between the slogan and reality, in order to
view the ad, three smartphones are required to be placed next
to each other for the full view. The strategy was to actually
use the smart phones technology to enjoy this advertising
experience that would not be complete without the gathering
of family or friends. The ad was divided into three sections,
as mentioned, each part is seen on one smart phone, without
having the other two smart phones, the picture would be
incomplete. The ad is known to be “the first ever multi
screen mobile ad”.
The ad starring the famous Egyptian actor “Samir Gha-
nem”being a multi generational figure and an icon of family
entertainment, long with four other millennials tells a story
The Impact of Smart Technology …383
of a group of friends getting together for Iftar, and although
together how they are all busy doing different things and
distracted by their smart phones. At the end of the ad, the
actor states that “we have took the first step to put you all
together, now it’s time to put down your phones and focus
on one another let’s get together”. The message was clear
reinforced by the technology used to compel the people to
unite, considered as a reality check to make the people
realize that they are actually now together enjoying time
with one another, the ad was able to shift smart phone
technology from being an individualistic used tool to a
collective social experience (Figs. 3,4and 5).
Fig. 3 The advertisement as seen with three smartphones
Fig. 4 A combined view of the three parts of the advertisement
384 B. Eyada and M. El Nawawy
The text has also been divided among the three parts so
that viewers can only read the whole slogan only if the three
phones are put together.
3 Research Methodology
This study is considered a pioneer and a pilot study in the
area of smart advertising. The results presented here is not to
be generalized yet, it can give an indication and a scientific
base for future researchers in this new area.
3.1 Semi-structured Interviews
Semi- structured interviews is a qualitative research method.
When using Semi- structured interviews, pre-structured and
fixed questions are set, asking the interviewee to answer
them openly.
Studying the effects of technology on presenting adver-
tisements, along with examining the impact of using smart
technology on consumers’perception and brand image, and
the influence of the digital message on their behavior, the
researchers resorted to the qualitative semi-structured inter-
views method.
A purposive sample of five participants was selected
based on the criteria that the interviewee has watched the
studied advertisement presented by Pepsi Egypt in Ramadan
2017. The scope of the interviews focuses on investigating
how participants see the effects of using smart technology in
advertising, and to what extend did the use of these
technologies influence the brand image and the perception of
the consumers about the advertised brand. In addition to this,
the interviews will discuss the effects of using new and smart
technologies on the behavior of the audiences regarding the
addressed message.
The questions of the interview were preceded by a fil-
tering question asking participants whether they have wat-
ched the stated advertisement or not. If they answered that
they have watched it, they are asked to complete the inter-
view. The purpose of this question is to help the researchers
to choose the purposive sample of the study with the criteria
stated. The Semi- structured interviews have 3 fixed ques-
tions serving the purpose of the study. They are stated as
follows:
•How do you see the new advertisement released by Pepsi
Egypt in Ramadan 2017?
•To what extend did the new advertisement released by
Pepsi Egypt in Ramadan 2017 affect your perception of
the brand?
•Do you think that the use of smart technology helped
achieve the aim of the advertisement?
3.2 Effects of Technology on Advertising
Participant (1) believes that the advertisement presented by
Pepsi in 2017 was very creative and new. The idea of using
technology to connect people together and try to make use of
audiences’new digital activities is very smart. He adds that
Fig. 5 A combined view of the three parts showing the text “Let’s Get Together”
The Impact of Smart Technology …385
way Pepsi created the advertisement can tell us that they are
targeting audiences with specific characteristics and age
group, may be different than those solely watching
television.
On the same line, Participant (2) has admired the tech-
nology presented in the advertisement, stating that it is very
interesting that Pepsi was able to bring people together
physically and changing its old motto to real life activity. He
adds that he tried to watch each part of the advertisement
alone but he couldn’t understand it, except when the three
parts of the advertisement were put together on the three
mobile phones.
Participant (3) said that she liked the idea and the pre-
sentation of the advertisement, and she believed that it was
brilliant to use new technology that we use every day to
bring people together, and it very well serves the motto that
Pepsi have long been adopting “Let’s come together.”
Participant (4) liked the idea of the advertisement, and the
way Pepsi tried to apply their campaign motto “let’s come
together”. He adds that the way of presenting the adver-
tisement and the technology used is enhancing the message
of the advertisement. Yet, he believed that he would prefer
to watch the advertisement on the television the traditional
way. On the other hand, participant (5) said she would prefer
to watch the advertisement on the traditional media, as she
thought the advertisement was so complicated to watch and
to comprehend the idea.
3.3 Effects of Using New Technology
on Audiences Brand Perception
Participant (1) thinks that the image of reputable and
well-known brands like Pepsi, can’t be changed easily based
on one of its advertisement, as the brand equity is bigger
than that, yet, the way Pepsi presented this advertisement
made me think of it as a creative company trying to use new
tools to reach its audience.
On the other hand, the participant (2) said that the
advertisement hasn’t changed his perception regarding Pepsi
Company, adding that when he was watching the adver-
tisement he was more focused on the idea of advertisement
Participant (3) said that the advertisement that Pepsi pre-
sented in Ramadan 2017 didn’t affect the way I see the
brand. She adds “I was not surprised with what Pepsi pre-
sented, as I always see them as creative and I have always
seen their advertisements as new and futuristic.”
Participant (4) said that he was surprised with this
advertisement and the way it was presented, and using this
digital technology made him think of Pepsi as a creative and
updated company. Participant (5) believes that the adver-
tisement hasn’t changed the Pepsi brand image, although she
didn’t like the use of the technology in the advertisement,
yet, for her Pepsi is still a successful corporation which has
always been releasing creative ads.
3.4 New Technology and Audience’s Behavior
Participant (1) states that although he likes the idea of the
advertisement presented by Pepsi in 2017, he finds it a bit
complicated, and to encourage more audience to watch this
advertisement technical issues should be made much easier.
He adds that the creativity of the idea will not be the only
factor affecting my social behavior.
On the same line, participant (2) states that using this new
digital version in the advertisement made the message very
clear and lovable. He added “it urged me out of curiosity to
meet up with my friends to watch the full advertisement.”
Participant (3) said that although she liked the advertisement
and described it as new and creative, she doesn’t think that it
affected her social behavior, she only was gathered with her
friends to watch the advertisement.
Participant (4) says that presenting Pepsi advertisement
with this new way made the idea and the message of the
campaign very clear, yet, it doesn’t affect his social behavior
on the long run. Participant (5) says that what can more
affect her behavior is the message presented more than the
technology and the medium used to present the
advertisement.
4 Research Findings and Conclusion
Smart technologies, smart phones and mobiles have become
a major part of people’s everyday lives. The rate of digital
media users are increasing, people are being more and more
exposed to the digital world. In 2017, almost one third of
advertising is being spent on digital media. Digital media is
gaining ground globally, the validity and persuasiveness of
digital advertising is on the increase. Advertisers are moving
from the high cost traditional media to the relatively low cost
digital and mobile advertising. Smart phones and Mobiles
are the main players in the digital era, when it comes to the
advertising sector, smart technology and phones have the
ability to chase consumers and engage them in the com-
munication process wherever they are.
Digital channels provide the best tools for message per-
sonalization, changing the role of the consumer from being a
passive message receiver to becoming an interactive part of
the advertisement. This customer involvement based on their
channel and content preferences increases the level of
interest, which enhances customer loyalty over time. The
repeated use of technology as a part of the advertising pro-
cess enhances brand image, solely when positively serving
the aim of the advertising campaign.
386 B. Eyada and M. El Nawawy
Continuous use of technology may change consumer
behavior, as consumers became more mobile, more social,
and with more simultaneous consumption. These changes
are creating a major transformation of marketing and
advertising aspects, creating challenge for the brands to
connect with their consumers through their devices and
social media, which highly impact the increased relevancy of
the targeted audience and content. Consumer behavior
changes rapidly with time and advancing technology,
influencing their purchase decisions, how they consume
time, and interact with different brands.
5 Recommendations
1. With the expanding use of smartphones and with the
increasing percentage of time spent on interactivity with
the internet and smart phone technology, advertising in
Egypt needs to reconsider the amount of money being
spent on traditional advertising versus digital advertising.
2. Technology has changed the consumer behavior; people
tend to let go of television in favor of watching their
favorite shows online. The main reason behind this is the
fact that they can skip watching the ads, causing a loss
for the brand existence in consumer’s minds. People need
to be targeted where they exist, with selection of media
technology that best fits and integrates within their daily
lifestyle.
3. More research to be conducted on the psychological
influence of smart technology and the digital
environment on the social interaction and consumer
behavior.
4. The use of smart technology in advertising should be
used as a tool to serve the advertisement aim, not to be an
ultimate aim itself.
References
1. Tanyel, F., Stuart, E., Griffen, J.: Have “Millennials”embraced
digital advertising as they have embtaced digital media? J. Promot.
Manage. 19, 652–673 (2013)
2. Mcluhan, M.: Understanding Media: The Extensions of Man, 1st
edn. McGraw Hill (1964). ISBN 8114675357
3. www.socialmedia.biz/2016/10/13/how-digital-marketing-is-
supplanting-traditional-advertising
4. Martinez, I., Aguado, M., Boeykens, Y.: Ethical Implications of
digital advertising automation: the case of programmatic advertising
in Spain. El profesional de la información, 26(2), 201–210 (2017).
Retrieved from EbscoHost Database
5. Stole, I.: Persistent pursuit of personal information: a historical
perspective on digital advertising strategies. Crit. Stud. Media
Commun. 31(2), 129–133 (2014)
6. Executive Summary: Advertising Expenditure Forecasts March
2017. www.zenithmedia.com
7. Ken Research. Egypt Online Advertising Market Outlook to
2017: Favorable Prospects in Online Search Advertising (February
2014)
8. www.oxfordbusinessgroup.com/analysis/bouncing-back-after-
difficult-period-advertising-expenditure-once-again-rise. Retrieved
12-07-2017
9. Grensing-Pophal, L.: Digital advertising trends you need to know.
Econtent (2014). http://www.econtentmag.com
The Impact of Smart Technology …387
The Onion Router: Is the Onion Network
Suitable for Cloud Technologies
Galia Novakova Nedeltcheva, Elior Vila, and Marina Marinova
Abstract
The present paper introduces the Onion Router
(TOR) also known as anonymity network. In the time
of cloud technologies, when everything is stored partially
or completely remote the question for our information
safety is felicitous all the time. Usually the answer is no.
Of course, there is an explanation for that, too. Compa-
nies think that their software is perfectly safe, because
they previse every known threat and make it stable—no
known viruses and bugs are provided with this imple-
mentation. The key word is known. Yes, expert pro-
grammers can write safe and reliable code, to resist on
any familiar menace, but attackers are always a step
forward—they find a new code vulnerability and prevail
the software. Then developers provide a fix. Then
everything starts all over—that is the vulnerability life
cycle. For the first time developers take a step forward—
so called TOR. It is an attempt for a safer network, a
tentative to stop tracing packets, so our personal data
could be safe even in the cloud. Main purpose of this
paper is to provide discussion about cloud technologies,
TOR network and how they can work together. As main
subject is pointed a group parameter hold solution which
purpose is to increase the security level of the TOR
network itself.
Keywords
Cloud Onion router (TOR) Security
1 Introduction
Cloud technologies has become an immutable part of the IT
infrastructure. Increasingly more and more companies star-
ted migrating to cloud technologies where they upload a part
or their whole information. There are many reasons for
switching to cloud—not all the business has enough
resources to build own hardware network with trustworthy
devices, cables and all-time support. As well, specialists are
needed who have to develop and manage the software
components of this organization—to ensure permanent
access of employees, but with no risk of exposing and
stealing business information, to create database backups in
order to provide traceability and activity history.
An important note is that cloud technologies are service,
not a product, and as one requirements should be covered, so
the clients using it are satisfied and feel sure for their
information. Banks, hospitals and other own personal cli-
ents’data and this requires usage of innovative and secure
technologies. Having the cloud integrated in their structure,
that kind of organizations has to guarantee that the personal
info is perfectly secured, but at the same time all authorized
employees can access it. This is a great challenge for cloud
providers because they need to restrict the access to
resources from outside of company’s network, but to ensure
it inside.
Another challenge is to transfer information securely
from client’s device to the cloud. Figure 1shows the
structure of the Internet.
A request from a client device is made, the computer
finds the router in the current segment, through its routing
table. The router finds and connects to the next router in the
structure and so on until the data reaches its destination. For
faster results the routers save the path and if a request to the
same destination is made, the router uses the already stored
path.
This, considered as an advantage and speed improve-
ment, became a vulnerability, too. Every router stores the
G. N. Nedeltcheva (&)M. Marinova
Faculty of Mathematics and Informatics James Boutchier Str.,
Sofia University “St. Kliment Ohridski”, 1164 Sofia, Bulgaria
e-mail: g.novak@fmi.uni-sofia.bg
E. Vila
Faculty of Natural Sciences, University of Elbasan “A. Xhuvani”,
Rinia Str., 3000 Elbasan, Albania
e-mail: elior.vila@uniel.edu.al
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_45
389
destination path in its routing table and if this router is
compromised this could lead to “man in the middle”,so
attacker can collect all the data. The creators of TOR have
spotted this exposure and tried to avoid it implementing The
Onion Router.
2 The Onion Router (TOR)
The variety of people who use TOR is actually part of what
makes it so secure. TOR hides you among the other users on
the network, so the more populous and diverse the user base
for TOR is, the more your anonymity will be protected [2].
The main protection that TOR offers is against the so
called “traffic analysis”. This is used to interfere between the
users on public network—by knowing the source and des-
tination, malicious software could find out the client’s
behavior and copy it with no good intention.
The internet data packets have two parts—data payload and
a header, which is used for routing. The payload is the actual
data that is sent and the header stores info about the source,
destination, size, checksum, etc. Some of the more powerful
traffic analysis uses very complicated algorithms and statistic
info for the client’s way of communication which can’tbe
secured even with sophisticated encryption, because it would
encrypt only the payload part and not the headers.
TOR prevents the usage of traffic analysis by using dif-
ferent access points (onions) on the Internet for each trans-
action and neither one of them can link the source with the
destination. This path is chosen randomly. Every time there
is a new connection in the routing, a separate encryption
negotiation is made and the access points know from which
node it receives data and knows to which it should send, but
never knows the whole path.
Once a circuit has been made, there is no limit for the
type of data or the applications that could be applied to the
TOR network. This is so, because no access point knows
the source and destination. All applications that support the
Socket Secure Internet Protocol can be used inside TOR.
This circuit is reused about ten minutes after which a new
one is created so, no one can track the sequence (Fig. 2).
3 Group Parameter Hold
3.1 Group Parameter Hold
Group parameter hold is the root of the implementation for
improving the security of TOR. It consists of variables of the
Fig. 1 Structure of the internet
[1]
Fig. 2 Tor network [3]
390 G. N. Nedeltcheva et al.
type vector<unsigned_int32>group_parameter_hold. Identi-
fiers of the groups will be stored in them, through which the
parts of the package will transfer. The most important part of
the solution is that only one part of package is allowed to
pass through a specific group.
3.2 Router Grouping
For the current implementation are used 10 groups of routers
of router_group type.
struct router_group
{
unsigned _int32 ID;
unsigned _int32 group_id;
};
Where ID is identificator for a current router, group_id is
group identificator which this router belongs.
Two initial operations are performed—groups creating
and router_group parameters initialization (Table 1).
The function which sets random group_id to a group of
routers, gets as parameters router_group and positive integer
number n:
At the end all the groups are collected in vec-
tor<router_group>groups:
groups.push_back(n0);
groups.push_back(n1);
groups.push_back(n2);
groups.push_back(n3);
groups.push_back(n4);
groups.push_back(n5);
groups.push_back(n6);
groups.push_back(n7);
groups.push_back(n8);
groups.push_back(n9);
3.3 Where the Implementation Is Added
in the Packet Structure?
struct TOR_ipv4_protected
{
unsigned _int8 version:4, ihl:4;
unsigned _int8 dscp:6, ecn:4;
unsigned _int16 total_length;
unsigned _int16 identification;
unsigned _int16 flags:3, fragment_offset:13;
unsigned _int8 time_to_live;
unsigned _int8 protocol;
unsigned _int16 header_checksum;
unsigned _int32 source_ip_address;
unsigned _int32 destination_ip_adress;
unsigned _int32 router_group_tаken;
};
For the needs of this implementation, unsigned _int32
options is replaced with unsigned _int32 router_group_taken.
In order to use group parameter hold, all the packages
have to store identification information, which indicates that
they are part of same package. The next example presents
simple implementation in which all packet parts of
packet_10 are initialized with value 1010. In the same
manner Packer_20 is initialized with 2020. That solution is
implemented only for the purposes of the present paper and
only 2 packages will be considered routing through the
network.
Example:
Example:
//Initialize parts of first packet
vector<TOR_ipv4_protected> packet_10;
for (int i=0; i<4; ++i)
{
TOR_ipv4_protected _new;
_new.identification = 1010;
packet_10.push_back(_new);
}
//Initialize parts of second packet
vector<TOR_ipv4_protected> packet_20;
for (int i=0; i<4; ++i)
{
TOR_ipv4_protected _new;
_new.identification = 2020;
packet_20.push_back(_new);
}
void group_id_random_assign (router_group &r, unsigned _int32 n)
{
random_group = rand()%100;
r.ID = n; r.group_id = random_group;
}
The Onion Router: Is the Onion …391
3.4 How the Implementation Is Used?
The most important part of the implementation is that it is
required if parts belong to certain package, they must go
through different groups.
void send_packets_to_random_groups(vector<TOR_ipv4_protected>
&packet_all)
{
srand (time(NULL));
for(int i = 0; i < packet_all.size(); i++)
{
__int32 random_hops = 1;
for (int j = 0; j < random_hops; j++)
{
__int32 random_group_index = rand()%groups.size();
router_group group = groups[random_group_index];
if (!check_for_exisiting_index(group_parameter_hold, group.ID))
send_packet_to_group(packet_all[i],
groups[random_group_index]);
}
}
}
Table 1 Creation and group
assign operations Creation Group assign
router_group n0;
router_group n1;
router_group n2;
router_group n3;
router_group n4;
router_group n5;
router_group n6;
router_group n7;
router_group n8;
router_group n9;
group_id_random_assign (n0, 1);
group_id_random_assign (n1, 2);
group_id_random_assign (n2, 3);
group_id_random_assign (n3, 4);
group_id_random_assign (n4, 5);
group_id_random_assign (n5, 6);
group_id_random_assign (n6, 7);
group_id_random_assign (n7, 8);
group_id_random_assign (n8, 9);
group_id_random_assign (n9, 10);
392 G. N. Nedeltcheva et al.
The group that the package takes is chosen randomly.
Using groups[random_group_index] a random group index
is set. This repeats for every package part checking if it
hasn’t already taken it. All passes are stored in group_pa-
rameter_hold and the check is performed by:
bool check_for_exisiting_index(vector<unsigned __int32> used_indecies,
unsigned __int32 index)
{
router_group new_group = find_router_group_by_router_id(index);
for (std::vector<unsigned __int32>::iterator it=used_indecies.begin(); it
!= used_indecies.end(); ++it)
{
router_group used_group = find_router_group_by_router_id(*it);
if (new_group.group_id == used_group.group_id)
return true;
}
return false;
}
Boolean function which returns true if a current part of a
package has already passed through the group and it is false
if the pass is not allowed. When a group is taken, it is added
to group_parameter_hold so the next part of the same
package cannot choose this group again. This is done by:
void send_packet_to_group(TOR_ipv4_protected &part, router_group&
router)
{
part.router_group_taken = router.ID;
group_parameter_hold.push_back(router.ID);
}
3.5 Console Output
The two packages, their parts and the routers are presented
on the console output. When a package is identified with
1010 it shows that it is a part of a bigger package, consisting
of parts with the same identifier. The precondition of not
taking the same group more than once is met: the first is
taking group 80, second chooses 81, the third—0 and the
fourth goes through group 33. The router identifiers partic-
ipating in a current group are printed, too—2, 1, 81, 4
(Figs. 3and 4).
Second compilation’s output is presented:
Now the values of routers and groups are different. The
reason is that the algorithm always assigns them randomly.
This implies next level security—there is no template on
choosing the values.
The Onion Router: Is the Onion …393
Fig. 3 One exit of group hold algorithm
Fig. 4 Another random exit is presented when a second compilation is triggered
394 G. N. Nedeltcheva et al.
3.6 Advantages and Disadvantages
of the Implementation
One of the main advantages of this implementation is that
safety is improved. The implementation is limited to
non-complex tasks which allows easy maintenance. Defining
simple operations makes easy to perform unit and integration
verification. This solution is not only TOR limited—it makes
sense even in other cloud services. In a world where com-
puter threats are permanently increasing it is good to have
high security standards. This is a technology and as such it
has vulnerabilities, too.
Two of the most common cyber threats are the provision
of timely and qualitative countermeasures to the attacks, as
well as the extreme complexity that they have reached today
[4]. In the present section are described advantages and
disadvantages of the current implementation.
Advantage 1: Prevent man-in-the-middle attack
Man-in-the-middle is a very often performed attack fol-
lowing this scenario (Fig. 5).
User 1 and User 2 are communicating—User 1 sends
information to User 2, but instead of reaching its destination
directly the message goes through a third machine owned by
the attacker and then reaches User 2. When User 2 tries to
send information back to User 1 it is again caught by the
man-in-the-middle. Not only traffic of a low level can be
interrupted, but high level traffic like e-mails and messages
are endangered, too. Moreover, if the attacker does not
change the information when it passes through him, User 1
and 2 may not suspect they are eavesdropped. This is one of
the reasons of not sending sensitive information through the
network, because somebody can be in the middle of its route.
Next level of man-in-the-middle attack is changing the
information. Even more, eliminating one of the users and
pretending to be him instead.
Solution: As soon as the group parameter hold solution
allows only one pass in current group, the man-in-the-middle
as part of come group would be able to catch only a part of
the information. The rest of it will be distributed across the
other router groups.
Advantage 2: Prevent DOS and DDOS attacks in certain
conditions.
Denial of service (DOS) and Distributed DOS are fol-
lowing this scenario (Fig. 6):
The attacker takes control over several machines in the
network. The next step is: everyone starts sending queries to
a certain server. The purpose of this attacker is DOS of the
destination due to inability to process all the data. This can
be critical for a software company in case of DOS of a mail
server for example—then the employees would not receive
e-mails any more. The clients would not be able to connect,
too. Regarding the server itself—it will have no more
additional free space to process all the fake requests.
Solution: This implementation can prevent DOS and
DDOS attacks only in certain conditions, if all the requests
are treated as part of a same package. In this case they will
be distributed through the router groups. When they reach
the last group, no more fake requests can be sent. The reason
is that the algorithm allows only one part of the same
package to take a single group of routers. This will limit the
amount of requests to the number of groups implemented.
Advantage 3: Group solution is used widely in many soft-
ware technologies. That is why it will be easily perceived by the
IT society. The developers, network and system administrators
Fig. 5 Man-in-the-middle attack
[5]
The Onion Router: Is the Onion …395
are familiar with group strategies and use them well. Providing
a familiar work environment will result in greater continuity and
experience—the advantages and the vulnerabilities of this
solution are already known (group policies as a management
strategy [8], VLANS [9] for improving security). Security
teams have been working on improvements in algorithms using
groups for a long time and the proposed implementation can
easily be upgraded for a higher level of security.
Disadvantage 1: With an extremely small number of
routers, groups and lots of packages, the group implemen-
tation solution will not work. The reason is in the require-
ment that no two parts of a package pass through the same
group. For example, let’s have 100 routers randomly allo-
cated in 15 groups, each group having at least one router and
20 parts belonging to the same packet. In this situation, at
most 15 parts will be routed to the network, and the
remaining 5 will not be sent because there will be no
unspotted group.
The following parameters are introduced:
Let:
n—amount of routers
m—amount of groups
l—parts from a single package
Constrains and limitations:
nm and each m contains at least 1 element belonging to
n and m l
Disadvantage 2: Group parameter hold solution may
lead to lower performance. The reason is the following
verification:
(…)
if(!check_for_exisiting_index(group_parameter_hold,
group.ID))
(…)
It is called for every packet part routing. This verifies that
the group is chosen for the first time and there is no other
part which has already gone through it.
Disadvantage 3: Centralized memory containing all used
groups
(…)
vector<unsigned __int32>group_parameter_hold;
(…)
In order to ensure different group pass every time,
there is a place where all taken groups are stored. That is the
way to verify if the next hop is allowed. In the current
implementation this is covered by values stored in vector
structure.
Fig. 6 Distributed denial of
service attack [6]
396 G. N. Nedeltcheva et al.
Disadvantage 4: Another problem of the presented
solution is that for the current implementation there is no
mechanism of processing a lot of packages in parallel. The
operations are executing in a pipe, i.e. there is no way to start
new operation if the previous one has not yet finished.
4 Statistics of the Solution
In the current implementation there are n routers, distributed
in m groups and l package. In the following statistics are
presented different values for n, m and l representing the
number of possibilities for choosing different routes that
package can take.
Area of definition: There are no groups without included
routers.
N/A—In case the packages are more than groups defined
it is not applicable for the algorithm.
Current limitations: the packages and routers are distin-
guishable, but the groups are not (Table 2).
The algorithm in fact is providing more different route
possibilities. In real life all the groups, routers and packages
are distinguishable which increase the amount of routes.
5 Conclusion
In the present paper is presented an implementation aiming at
improving TOR security. The solution can also be used out-
side of it, because it offers a versatile grouping method. This
implementation would also enhance the security of other
cloud-based solutions as threats grow with technology
developments [7]. It is considered within the onion router
network, because it is subject to many hacker attacks.
Suggestions to improve the security of a new implementation
are always up to date and entire teams work on the security part
of the product being developed. Moreover, when talking about
Cloud services, the biggest concerns of customers are referred
to security. The idea of groups comes naturally, as it is widely
used in the IT [8,9]. So, in combination with cloud computing,
it becomes a pretty useful idea to improve the security level.
Table 2 Initial solution statistics n—amount of routers m—amount of groups l—amount package parts Possible different routes
11 1 1
11 l2 N/A
12 8l Out of area of definition
21 1 1
21 l2 N/A
22 1 2
22 2 2
22 l3 N/A
23 8l Out of area of definition
31 1 1
31 l2 N/A
32 1 2
32 2 2
32 l3 N/A
33 1 3
33 2 6
33 3 6
33 l4 N/A
34 8l Out of area of definition
8nmn8l Out of area of definition
8n8mlm N/A
nm1 m
n m 2 V (2; m)
n m l V (l; m)
The Onion Router: Is the Onion …397
The main purpose of this paper is to attempt a new level
of security not only in TOR, but in every routing system.
The group parameter hold is added in the package structure
which would not require additional space beyond the IPv4
package. The check if a group is available is not a complex
task so reducing performance in big amount is not expected.
The complete solution is at an early stage of development
and is used only for the purposes of this paper. The imple-
mentation is proprietary and does not borrow the source
code from third parties. Any information used by other
sources and authors is noted and described in the section
References.
References
1. Structure of Internet. http://www.lao.ca.gov/2000/013100_inet_tax/
FIG_1.GIF
2. TOR Project. https://www.torproject.org/about/overview.html.
en#whyweneedtor
3. Tor Network. http://www.extremetech.com/wp-content/uploads/
2014/08/Tor-software.png
4. Willian, D., Nedeltcheva, G.N.: Security in the supply chain of ICT
companies. In: 6th International Conference on Application of
Information and Communication Technology and Statistics in
Economy and Education (ICAICTSEE 2016). December 2–3rd
2016, University of National and World Economy (UNWE), Sofia,
Bulgaria
5. Man in the Middle Attack. http://www.carmelowalsh.com/wp-
content/uploads/2015/03/mitm.png
6. Distributed Denial of Service Attack, http://harshaddhale.weebly.
com/uploads/7/5/3/3/7533197/9414632.jpg?598
7. Galia Novakova Nedeltcheva, Willian Dimitrov. Security Dynamics
—adaptation of ICT structure to Cloud Computing and IoT—
opportunities and threats. 2nd Intern. Conference High Technolo-
gies, Business, Society (HTBS)—2017. Borovets, Bulgaria, 13–16
March 2017. http://www.hightechsociety.eu
8. The Benefits of Group Policy, http://blog.tcitechs.com/blog/
benefits-group-policy/
9. Benefits of VLAN, https://www.slideshare.net/logitrainsocial/
benefits-of-vlan
398 G. N. Nedeltcheva et al.
The Role of e-Governance in IoT Semantic
Interoperability
Lyubomir Blagoev and Kamen Spassov
Abstract
In the article, we analyze the Semantic Interoperability
problems in Internet of Things. Currently it is hard to
integrate IoT components from different companies and
groups in a solution. The thesis discussed is that it is
unrealistic to expect creation of a common IoT environ-
ment that provides Semantic Interoperability because big
players are working to enforce their own standards.
e-Governance is presented as a generator of different
environments and also as a creator of resources of IoT
environments with Semantic Interoperability. Govern-
ments can play a role in IoT development by encouraging
the transfer of Semantic Interoperability from
e-Governance to IoT sphere. The problem of electronic
identification of individuals, artificial “assistants”, orga-
nizations and objects in IoT environment is raised. There
is also a reverse effect: the development of IoT affects the
e-Governance development. The transfer of practices to
IoT in the area of Semantic Interoperability will lead to
the evolvement of a common semantic space in which
people interact with physical objects, organizations and
countries.
Keywords
Semantics Interoperability Internet of things
IoT e-Governance
1 Introduction
Internet of Things (IoT) development requires solving of
different problems. For two of them the proposed current
solutions are not so successful:
•Security of IoT implementations;
•Sematic Interoperability (SI) in integration of complex
IoT solutions.
The vision presented by Blagoev and Spassov [1]defines
SI as intrinsic to IoT implementations but also as a prereq-
uisite for realization of other IoT specifics. All who work in
IoT need an environment that provides a comprehensive and
Common Semantic Interoperability (CSI). By now there are
many limited in their scope IoT solutions with Local
Semantic Interoperability (LSI) locally applied by different
companies or groups. It is hard to integrate different IoT
solutions each one with specific LSI.
The problem of SI is recognized long ago when systems
were defined as “complex”but not as “intelligent”. The
problem was not named as “semantic”, but just as a problem
that can be solved using standards. Different organizations
like W3C, ISO, IEC created a lot of standards in this
direction, but the problem is still in place. Even such an
institution like European Union started and supports the
initiative SEMIC [2] as an essential element of a large-scale
program to achieve SI. But the application of the created for
this purpose is advisory rather than binding, which in itself
reflects the lack of confidence that CSI can be achieved even
in a community that has declared its intention to achieve
integration on the basis of generally accepted principles and
rules.
Gradually the problem of CSI acquired a paradoxical
character—all are aware of the problem, all are ready to
participate in creation of resources for its solution, but there
is no consensus, and above all, there is no desire for com-
mon utilization of the resources created.
L. Blagoev (&)K. Spassov
e-Governance Laboratory, Bulgarian Academy of Sciences,
Sofia, Bulgaria
e-mail: lyuboblagoev@gmail.com
K. Spassov
e-mail: kspassov@gmail.com
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_46
399
2 Who and What Semantic Interoperability
Needs?
Small IT players need SI to integrate their products with the
products of big players. They want to be able to integrate
with the products of all IT giants to achieve greater market
share. Therefore, small IT players need CSI. IT giants,
however, have opposite interests—for them it is advanta-
geous to maintain LSI to keep in their orbit smaller IT
players and this way to protect better their market share. In
turn, IT end users have the same interest as smaller IT
players—they would like to be able to assemble suitable for
their needs IT configurations without compatibility problems
of their components. This creates the impression that con-
sumers and small IT players are able to put enough pressure
on IT giants to adopt CSI.
An example from the recent past shows that this is not
possible. In 2006 AIIM launched a project interoperable
Enterprise Content Management (iECM) [3]. This project
was initiated under pressure from end users of the products
of large-scale projects involving the integration of hetero-
geneous systems. The aim of the project was the creation,
dissemination and application of a set of standards for
interaction of heterogeneous systems, which is also a key
feature of IoT implementations.
The project did not succeed. We can say IT giants ruined
it. Moreover, AIIM now is not what it used to be in 2006.
Which can be seen as bleak fate for anyone who tries to
establish CSI.
3 Is It Possible a Global CSI?
The answer is negative, but not as a conclusion from the
short but extremely dynamic IT history in recent decades.
We need to take into account the impending impact of
another player in IT field. It is still seen as submissive to IT
development, as a consumer of IT implementations, but the
future will change that.
This player is e-Governance
From what has been achieved so far in different countries, a
major conclusion can be made: the more successful an
e-Governance implementation is the more comprehensive SI
is achieved. This results in a large volume of unified and
provided with formalized presentation definitions of con-
cepts, data, and processes. Here it is necessary to make an
important clarification: an environment with SI within an
e-Governance is subordinated to national law, which gives
the semantics of basic definitions of concepts, data and
processes. These definitions are not always optimal but
semantics set in is mandatory to use. An important element
of building e-Governance is to create definitions (including
formalized) with semantics equivalent to the relevant
enshrined in legislation. As a result of the establishment of
e-governance each country will establish national environ-
ment with SI. These environments more or less will differ
and SI could be consider as LSI.
This is currently happening in the EU regardless of the level
of harmonization of national legislations of the member states
and the European Program (currently ISA2 [4]) to achieve the
SI within the EU. Particularly indicative are the results of the
project to create Core vocabularies [5]. The work of working
groups for the creation of several widely used data models
fluctuated between achieving optimal (whatever that means)
and as close as possible to the legal regulation of the semantics
of the same data in Member States. The second, as can be
expected, turned out to be “mission impossible”. The created
data models are not directly applicable in most Member States
because they do not comply with semantics of the national
legal regulations for them. Hence, the only significant result of
the work on these Core vocabularies is that W3C recognized
some of the models and added them to their collection of
definitions of concepts, data and processes.
So far, the impact of e-Governance as “SI-player”is
limited and suppressed with some acceptable compromises
(e.g. data for addresses, names of people, etc.) but only in
terms of off-line connectivity with datasets supported by
states. Soon, as a result of the Open data initiatives state
institutions will have to provide on line access to data
maintained by them and so will require some SI to the
integration of IT implementations in the private sector with
relevant IT configurations of state institutions.
Thus, each country will form a national SI (i.e. LSI) for
the following main reasons:
The establishment of SI environment for the purpose of
e-governance in any given country, which does not comply
with national legislation, requires modification of large
amounts of this legislation and related datasets supported
according to it. This is very costly, economically unaccept-
able, and will not happen with a leap, and if it happens, it
will happen gradually. Given the pace with which of EU
member states harmonize the laws, it can be estimated that
the reduction of differences in national legislations to a level
acceptable for a European SI will take, let say, 40–50 years.
Any national legislation regulates semantics of about 15–
20,000 concepts, data, and processes, which by itself is a
huge resource that slowly but surely will develop into for-
malized and unified definitions of the same concepts, data,
and processes during the process of e-Governance
development.
At this stage of IoT development, the inclusion of a
device in the IoT-configuration is seen in very narrow
400 L. Blagoev and K. Spassov
boundaries concerning mainly a functional integration, rep-
resented by a small set of concepts, data, and processes.
Recent advances the Artificial Intelligence (AI) added as a
mandatory element of an IoT-configuration so-called “as-
sistants”. Their work requires the maintenance of a rich
semantic representation of different devices. Many of their
features are subject to legal regulation or control. Hence,
they have a statutory regulation and are parts of SI frame-
work of e-Governance with available definitions of concepts,
data, and processes.
Obviously, it is economically sound and sometimes
mandatory to reuse the already built e-Governance SI
resources in a country to achieve SI in IoT. Naturally, ICT
industry will react to such an economic stimulus and will
build some kind of national IoT SI. As a result, the devel-
opment and penetration of a “global”SI becomes unrealistic.
However, this does not block the work on the creation and
distribution of IoT-compatible configurations.
4 The Question Is not “Who Needs IoT SI?”
the Question Is “for What Purpose IoT SI
Is Needed?”
IoT-interaction is constructed as a set of connected infor-
mation objects representing external physical objects or
systems. The connectivity is represented through the
exchange of data between objects and data processing in the
objects. In [6] this set of objects is called Home Digital
Community, which in itself is a typical IoT-configuration. In
such a configuration, both human and external
devices/systems are represented by corresponding commu-
nity objects. Configuration itself is assembled and ensures its
functioning in an environment LSI.
LSI in such an isolated environment is protected (ac-
cording [6]) from the influence of external environments
through their SI communication infrastructure. The resour-
ces of this infrastructure provide a transition from arbitrary
external environment with SI to isolated environment LSI
and vice versa.
In such SI oriented architecture [6] the type of LSI
practically not only does not depend on external
devices/systems, but there is no significant incentive to
choose a SI even due to market reasons. The cause is the
inevitable development of interface communication infras-
tructure, the volume and complexity of which depends on
the variety of external systems and devices involved in an
IoT-configuration. There are two important requirements to
such LSI environment:
1. Sustainability of LSI that provides seamless and viable
future development of IoT functionality. Such sustain-
ability requires ensuring the absence of changes in the
definitions of concepts, data and processes established in
LSI. Legislation can provide such sustainability. There-
fore, if a LSI is a further development of the
e-Governance SI in the country, it will be easy to achieve
the above-mentioned sustainability.
2. Transition from “user friendly”to “semantic friendly”
user interface. Created IoT configurations will include
known types of systems and digital presentation of
familiar physical objects from the world in which we
live. To make it comfortable for IoT users of these sys-
tems and physical objects it is necessary to use familiar
adopted by all semantic representation. e-Governance SI
framework maintains such a representation.
e-Governance can play a significant role in addressing the
SI problem in IoT. This role has to be recognized by the
state. The state has to invest more intensively in the estab-
lishment of e-Governance, because its results can be applied
in a much broader scale than is implicit in the very idea of
e-Governance.
5 IoT Identification and e-Governance
Another IoT-problem that is discussed still in future time is
the identification of individuals, organizations and objects
presented on the Internet. This problem has a variety of
technical solutions but the choice of a particular solution and
provision of security of its implementation is the responsi-
bility of the states within the realized e-Governance projects.
Here arises again the interoperability problem, this time
with additional complexity because it has to be solved at the
interstate level. In this regard, the EU has developed and
currently applies appropriate regulatory solution with Reg-
ulation 910 of 2014. The results of its application can serve
as a model for intergovernmental agreements to solve the
problem of IoT identification worldwide.
6 IoT Influence on e-Governance
There is also a reverse effect: the development of IoT affects
the e-Governance development. The current work on
e-Governance in different countries affects partly or does not
address at all the introduction of intelligence in
e-Governance. So customer service is limited to providing
administrative services in electronic form, access to open
data collected by the administrations, and services on the
open data provided to citizens and companies from third
parties.
The transfer of intelligence from the IoT world to the
e-Governance will transform administrations from perform-
ers of service requests of citizens and businesses into
The Role of e-Governance in IoT Semantic …401
intelligent assistants solving or assisting in solving their
problems related to the use of administrative services or, in
general, resources maintained by the state.
So far, the developed models of concepts, data, and
processes serving the practice of establishing and maintain-
ing sustainable SI in e-Governance are not designed to be
extended with additional semantic descriptions. This applies
to works such as the European Asset Description Metadata
Schema (ADMS) [7] and for earlier developments in dif-
ferent countries e.g. Bulgarian National Model of Data and
Processes in Administration (NMDPA) [8].
One of the most important but not the only one, extension
of the used concept models, data, and processes for the SI
concerns the introduction of lexical representation in the
composition of these models. This requires integration in
these models of lexical databases (for example, WordNet
[9]). In many cases, this can be a relatively difficult task.
Other important extensions of these models will serve the
learning process, decision-making, etc. In other words, the
perception of the work on the IoT and building
e-Governance as loosely coupled activities could lead to
duplication of identical inherently developments. This is not
only uneconomical but it will continuously generate con-
flicts of semantic incompatibility.
7 Conclusion
Work on IoT emerged as a logical and essentially new stage
of development of information technology at which human
presence in the Internet integrates with the presence of
physical objects from the surrounding world. This can be
seen as a meeting of service systems to support human
activities with physical objects management systems. This
meeting enriches IoT with the experience of real-time con-
trol systems. The time for meeting of IoT with e-Governance
has come. The benefits of this meeting will not only result in
exchanging know how, but rather will lead to mutual con-
vergence of resources. It will lead to the evolvement of a
common semantic space in which people interact with
physical objects, organizations and countries. This meeting
is inevitable. It can become a hard way when no planning
and management or relatively easy when engineers and
politicians work together. Hope we will choose the easier
way.
References
1. Blagoev, L., Spassov, K.: The end of IoT Enthusiasm or the
Beginning of a new IoT Vision. Sofia University, Spring Scientific
Session of Faculty of Mathematics and Informatics, Sofia, Bulgaria
(2016), available at https://www.researchgate.net/publication/
302278861_The_end_of_IoT_Enthusiasm_or_the_Beginning_of_
a_new_IoT_Vision
2. Semantic Interoperability Community (SEMIC), available at https://
joinup.ec.europa.eu/community/semic/description
3. AIIM Announces the Formation of the Interoperable Enterprise
Content Management (iECM) Consortium (2006), available at
http://www.marketwired.com/press-release/aiim-announces-
formation-interoperable-enterprise-content-management-iecm-
consortium-680568.htm
4. ISA
2
Program, Interoperability Solutions for Public Administra-
tions, Businesses and Citizens, available at https://ec.europa.eu/isa2/
home_en
5. Core Vocabularies: Meta Data Standards. https://ec.europa.eu/isa2/
solutions/core-vocabularies_en
6. Blagoev, L., Spassov, K.: Smart Home as a Digital Environment.
Sofia University, Spring Scientific Session of Faculty of Mathe-
matics and Informatics, Sofia, Bulgaria (2015), available at https://
www.researchgate.net/publication/275032974_Smart_Home_as_a_
Digital_Environment
7. Asset Description Metadata Schema (ADMS), W3C (2013),
available at http://www.w3.org/TR/vocab-adms/
8. Blagoev, L., Spassov, K.: National model of data and processes in
administration (NMDPA)—part of the semantic network of the
administration. In: International Conference InfoTech-(2013), avail-
able at https://www.researchgate.net/profile/Lyubomir_Blagoev/
publication/272022118_NMDPA_Part_of_the_Semantic_Network_
of_the_Administration/links/54d8dfeb0cf25013d0406d9e.pdf
9. Fellbaum, C. (ed.): WordNet: An Electronic Lexical Database. MIT
Press, Cambridge, MA (1998), available at https://mitpress.mit.edu/
books/wordnet
402 L. Blagoev and K. Spassov
The Role of the Roads and Transport
Authority (RTA) in the Transformation
of Dubai into a Smart City
Hatem Ahmed Adela
Abstract
This paper investigates the contribution of the Roads and
Transport Authority (RTA) to enable Dubai to be a smart
city for the period 2005–2016. The relationship between
RTA and Dubai development manifest obviously,
whereas, the appliance of the integrated urban develop-
ment plans requires developing projects include the
potential technological aspects that would enable the city
to be a smart city. The research analyzes the RTA projects
that enable Dubai to include elements of the smart city
which imply the potential technological aspects, as well
as providing an econometrics analysis by using cointe-
gration analysis and error correction model. The conclu-
sion indicates that the RTA’s smart transport systems
contribute to increasing the value added of the informa-
tion and communication sector in Dubai, as well as the
increase in the number of New Vehicles Registered in
Dubai and the Road Lengths in Dubai leads to an increase
in Investment of Information and Communication Sector.
Where the sector’s investment is significantly affected by
the development of the RTA projects that implement the
world first-class technology and highest smart systems.
Keywords
Dubai The roads and transport authority (RTA)
Smart city Infrastructure investment Integrated
urban development plans
1 Introduction
The dense populations in the modern cities impose chal-
lenges to experiment new approaches intended to facilitate
the continuing growth by the integration of all the economic
activities, based on the information technology, urban
infrastructure, professional human resources and norms of
behaviour. As well as the globalization puts the cities in a
competition to gain a maximum utility form their resources,
in addition to the increase of the citizens’wants. The hurdle
of these overwhelming challenges requires the urban system
collaborative to develop the inter-disciplinary collaboration
that controls both of macroeconomic activity and micro
levels. The implementation of the urban system collaborative
creates a smart city.
Dubai is the largest city in the United Arab Emirates; the
population increased from 1.3 million in 2005 to 2.7 million
in 2016, as well as the number of tourists increased from 6.1
million in 2005 to 14.9 million in 2016 [1]. It derived its
fame and prosperity from trade and became one of the
biggest trade centers in the world. It started the Planning for
urban development over the past two hundred years and
implemented the integrated economic policies for consoli-
dating the Dubai’s thriving commercial center. Dubai set up
a modern municipality in 1938 to improve the city to its
rapid economic growth and to plan future infrastructure
development with the idea of keeping Dubai’s character as a
merchant community [2].
The recent approach of Dubai economic policies places
the concept of the smart city in the center of integrated
economic Planning for achieving the urban development.
Where, technological developments have become increas-
ingly omnipresent in Dubai for optimizing the use of finite
resources to provide a sustainable boom without disturbing
the environment and deliver sustainable prosperity to their
citizens to improve the quality of their life, as well as for
achieving the happiness of present and future generations.
Therefore, it launched Strategic Plan 2015 which
describes the future of Dubai into six themes; the most
significant of them is to be a smart and sustainable city,
through drive major investments in broadband infrastructure
that supports the economic and social life of Dubai as a city
matches world-class of efficiency and citizen accessibility.
As well as allow the city growth through a diversity of
H. A. Adela (&)
American University in the Emirates, Dubai, UAE
e-mail: hatem.adileh@aue.ae
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_47
403
economic sectors. The government structures and local
authorities built for city sustainable, efficiency and innova-
tion. Dubai looks forward to the city of the future; it
establishes all crucial infrastructures such as the high stan-
dard roads, bridges, and water and energy systems, with an
accurate system of maintenance activities.
It also needs security, which considered a core require-
ment for a smart city. Where the economic development in
Dubai requires the existence of different nationalities and the
necessity of control them. It needs more than other smart
cities to digital actions to be implemented automatically
when an event happens and empowers citizens and inhabi-
tants to have a readiness to variant events. The significant
role of the Roads and Transport Authority (RTA) on Dubai
development shows through determinants that included in
the two main definitions of the smart city. First, focuses on
the investments lead to sustainable development, through the
integrated urban development plans, which reflects in sus-
tainable smart urban economic growth, increased quality of
life and management of natural resources.
Second, identifies the smart city by digital intelligence
based on technology and human intelligence based on
knowledge and innovation. While technologies develop at a
fast pace and put pressure towards their usage “technological
push”, the demand for implementation of smart cities is also
important “application pull”. This approach focuses on the
application by local authorities of the human and digital
intelligence in planning development. From both view-
points, the Roads and Transport Authority (RTA) not only
an authority meant to contributes to overall urban develop-
ment through Dubai adopts the integrated urban develop-
ment plans for achieving the growth, but also specific project
contributes as part of strategic planning to make Dubai as a
smart city.
This study focuses on endeavours made by local
authorities. The Roads and Transport Authority (RTA) as a
model contributes towards becoming Dubai a smart city.
Accordingly, the research was divided into three parts. The
first part investigates the literature review, which focuses on
the role of the public authorities in transforming cities into
smart ones. The second investigates the role of the RTA in
such transformation of the city of Dubai. The third part
estimates the relationship between the RTA projects and the
information and communication technology (ICT) develop-
ment in Dubai.
Research Objective
The study aims to investigate the role of the Roads and
Transport Authority (RTA) on achieving the integrated
urban development plans to enable Dubai to be a smart city
by using the modern econometric methods, which have not
been highlighted, especially, in the recent researches.
Research significance
The study manifests the role of massive authorities through
the integrated urban development plans to enable the cities to
be smart, the Roads and Transport Authority (RTA) in Dubai
as a model. Also, illustrates the importance of further studies
that examine the contribution of the public authorities on
cities to be smart by using the econometric methods.
Methodology
The study based on the inductive approach to analyzing the
role of the Roads and Transport Authority (RTA) to trans-
form Dubai into a smart city. Also, the econometric methods
“Co-integration analysis and error correction model”for
estimating the relationship between the RTA projects and the
development of information and communication technology
(ICT) sector in Dubai.
2 Literature Review
There are two main streams of research initiatives of the
smart city. First, every procedure relative to governance and
agencies authorities use new thinking paradigms to promote
the economy and the quality of citizens’life. Second, the
smart city is all about the integration of Information and
Communications Technology (ICT), networks of sensors
and intelligent devices conduct the city movement. There is
no generally agreed upon definition what makes a city smart,
almost researches indicate to technological dimensions,
implementations of Information and Communications
Technology (ICT) in cities. Other indicates to the infras-
tructure investment. Therefore, a city considered smart when
investments both in traditional and in modern sectors with
the involvement of public authorities and efficient conduct of
natural resources for achieving sustainable economic growth
and increase the quality of life.
The phrase of smart city has been adopted since 2005 by
many technology companies (Cisco 2005; IBM 2009; Sie-
mens 2004) for the application of complex information
systems to integrate the operation of urban infrastructure and
services such as buildings, transportation, electrical and
water distribution, and public safety. It has since evolved to
mean almost any form of technology-based innovation in the
planning, development, and operation of cities [3].
404 H. A. Adela
Joshi et al. [4] considers the most important factor
affecting the smart city initiative is Sustainability by the
integrative framework of Social, Management, Economy,
Legal, and Technology. Where, the urban civilization chal-
lenges are the pollution level, scarcity of resources and
traffic, it can develop and conduct all infrastructures: roads,
tunnels, and water and energy networks. Also, foster needs
related to security.
Mitchell [5]defines the smart city technologically, that
uses broadband infrastructure to support e-Governance and
effective environment for operating the transactions effi-
ciently. Dirks and Keeling [6] consider the transport as one
of the core systems of smarter cities; they identified the
smart city which has interrelationships between core city
systems: Communication, Business, Transport, Energy,
Water, and Human Capital. Cairney and Speak [7] consider
the smart city initiative exists by developing the information
technology capacities in collaboration with public sector
institutions for business and community development.
Bronstein [8] explains the significance of architectural forms
of buildings related to other structures such as the streets and
the overall design of a community to create an environment
for industrial development, productivity improvement and
facilitate the dense.
Ballas [9] indicates to the role of the government and
public authorities for the goal of enhancing the quality of life
for their citizens and creating of subjective happiness. They
are embracing the notion of a smart city for targeting social
justice, urban and regional planning and sustainable devel-
opment. Washburn et al. [10] identifies a smart city is a city
with a great presence of Information and Communications
Technology (ICT) implements on the critical infrastructure
and services. Caragliu et al. [11] indicates to the role of
investments of governmental agencies in human capital,
transportation and communication infrastructure for
enhancing sustainable economic growth and a high quality
of life, with an optimizing of natural resources. Chen [12]
defines a smart city which can provide the infrastructure
needed, software networks services, devices and sensors to
optimize electrical, transportation and other logistical oper-
ations for conducting daily people life.
Jensen et al. [13] formulates a model of smart cities based
on traffic generation rules to be applied over the Geographic
Information Systems. Eger [14] indicates to a smart com-
munity which makes decisions depends on crucial technol-
ogy and high-speed broadband infrastructures to satisfy
society and business needs. Raj and Raman [15] identifies a
smart city based on information technology used by smart
governance, the inflow among different subsystems for
enhancing citizen services, business services and makes the
ecosystem more efficient to enable the city sustainable.
Komninos et al. [16] indicates to the role of the road map
on Smart City. the research proposes a smart cities
innovation roadmap framework for supporting the innova-
tion strategies of the smart city. Neirotti et al. [17] explains
the concept of a smart city through applications: natural
resources, energy, transport the pertinent, mobility, build-
ings, living, government, economy and citizens. Hall [18]
identifies a smart city that monitors and integrates conditions
of all its critical infrastructures including roads, bridges,
tunnels, rails, subways, airports, seaports, communications,
water, power, major buildings, as well as optimize its
resources, plan its preventive maintenance activities and
monitor security aspects. Harrison et al. [19] identifies a
smart city which implies the flows of information both
vertically, within the infrastructure system and horizontally,
among the many different infrastructure systems.
Angelidou [20] identifies a smart city by two dimensions.
First, relatives to knowledge and innovation economy based
on technology, where the technological advancement
improves urban function management in fields such as
transport, energy, healthcare, water and waste “technological
push”. Second, relatives to the demand for implementation
of the smart city, the technologies development put pressure
towards their usage for implementation to solve the prob-
lems efficiently and sustainability “application pull”.
Ahvenniemi et al. [21] suggests that the performance of
smart cities should be measured not only by implementing
smart solutions, but also through its ecological, economic
and social sustainability, that contribute to smart urban
growth and development, He concludes the use of the term
“smart sustainable cities”instead of sustainable cities or
“smart”cities. Demetri [22] identifies a smart city which has
some aspects. First, the infrastructure investment uses
broadly with the extensive use of information and commu-
nication technologies to optimize the services for citizens
and businesses. Second, it takes economic advantage of the
benefits of ICT opportunities to increase local prosperity and
competitiveness. Third, the Social role of the human in
urban development is highlighted; a smart city involves the
citizen participation in urban planning and territorial plan-
ning. Fourth, Environmental guarantees and renewable use
of exploitation and natural heritage, where resources are
scarce, and cities increasingly rely on the availability of
tourist and natural resources. Fifth, Road traffic management
saving time and helping to reduce road congestion and
public transport help citizens to improve urban mobility.
3 The Contribution of the RTA’s
Technological Investment to Transform
Dubai a Smart City
The Roads and Transport Authority (RTA) established in
2005 through an organizational structure that adopts an
integrated corporate governance model to plan and
The Role of the Roads and Transport …405
implement road and marine networks and keep up with the
latest technologies and innovative methods to support the
fact that Dubai is one of the fastest growing cities in the
world. Therefore, the Authority has set its strategic objec-
tives towards the contribution to transforming Dubai into a
smart city and implementing happiness strategies, as well as
achieving environmental sustainability (Fig. 1).
It adopts the Smart Systems Since the Government of
Dubai launched the smart government program within the
strategic plan 2021 to make Dubai a smart city. The RTA
implements many different applications such as RTA Mobile
Applications, RTA Smart Drive, Drivers and Vehicles App,
RTA Dubai App, Smart Taxi, Salk App, Public Transport
App, Sharekni App and Wojhati App. In addition to, a
significant number of smart services for Driver and Car
owner services, Public transport services and Business ser-
vices [24] that contribute towards environmental conserva-
tion. Whereas, the customers can save an average of 28 km
per transaction processed through smart applications and
websites, as well as reducing carbon emissions by 10 kg per
transaction [25].
The RTA strategy designed to make public transportation
by smart systems the preferred choice for mobility through
the integration between road networks and public transport
systems for reducing carbon emissions compared to private
vehicles and launched a pilot project for Compressed Natural
Gas (CNG) buses and a carbon footprint measurement
project for vehicles in Dubai. Therefore, the energy con-
sumed per passenger Decreased by 7% from 2013 to 2015.
Also, the carbon emissions decreased by 8.8% in 2016 and
aim to reach 16% in 2021 concomitant to the strategy for
energy and carbon reduction for supporting energy preser-
vation and Green Economy in the projects and services. As
well as, it applied plans comprise the implementation of
power saving road lights and establishment of transport
network infrastructure inherent with green building
requirements and the usage of environmental-friendly vehi-
cles of public transport fleet. Additionally, it Plans to
increase in the length of the public buses network to reach
around 4300 km in 2020, then to be 5400 km in 2030 and
increase in the marine transport network to be 60 km with 22
stations [26]. It has completed the installation of 618 mon-
itors that display bus schedules of 461 bus stops. Passengers
can acquire information about bus arrival time at bus stations
[27].
Furthermore, the RTA executes one of the most vital
technological projects of smart transportation, the Enterprise
Command and Control Centre (EC3) at a cost of AED 335
million and covers an area of 6996 m
2
, which further Dubai
ambition in transforming Dubai into the smartest city
worldwide in the field of transport [28]. A unified platform
brings control of different modes of transport under one
umbrella for linking different operations control centers of
the operational agencies including the Dubai Metro, Dubai
Fig. 1 The roads and transport
authority structure [23]
406 H. A. Adela
tram, public buses and taxis and traffic systems control
centers with a central and integrated control unit that com-
municates simultaneously with all RTA’s agencies and
sectors.
As well as, it has launched in 2017 an Integrated Mobility
Platform project which enabling customers easy access to all
RTA’s mass transit systems through a single window by
smart app integrating with services provided by other entities
in Dubai, organizing electronic taxi booking services and
running limo services [29]. The project offers the available
mobility options that enable the user to plan the journey and
arrange the booking and payment in a smooth and integrated
method. Furthermore, it accomplished environmental-
friendly Hybrid taxis in 2008 which reduce carbon emis-
sions by more than 27% compared to other vehicles and
plans to increase the Hybrid vehicles by 50% by 2021.
Therefore, the number of public transport passengers has
increased from 163 million passengers in 2006 to 539 mil-
lion passengers in 2015 and carried over 1 million passen-
gers per day in the same year.
A smart dynamically charge for cars on the busiest
highway implements by Salk toll system into Dubai for
reducing traffic congestion and Carbon emissions. While
generating revenue flow has reached about 1.4 billion by
2016. Also, implements a new NFC “Near Field Commu-
nication”based on Smart NOL card service that enables
customers to pay the fare for daily trips by passing their
Smartphone through the devices installed at the gates of
Dubai Metro, public buses and water buses [30].
Additionally, a Smart Dubai Metro is the largest driver-
less metro network in the world contributes to the reduction
of carbon emissions by 309 thousand tons in 2015, the
removed CO
2
emissions by using Dubai Metro decrease
from 59 tCO
2
in 2013 to 125 tCO
2
in 2015 [31]. Where, it
works by electricity according to an integrated system for
public transport and implement the highest technology like
the usage of electricity generation of brakes. Therefore,
Dubai Metro reached its break-even plan within just a few
years and accomplished positive outcomes in terms of
cost/benefit analysis. Till the end of August 2017, the Metro
has lifted 1.028 billion riders and generates about AED
10 billion. It plans to raise the share of public transport in the
people’s mobility to 30% by 2030 and reach to 70 Metro
stations by 2020 [32].
The RTA launched in 2016 Hi-tech transport system to be
the world’sfirst operational Hyperloop trains system which
is expected to begin operations for passengers in 2020.
Passengers will be able to book travel on the magnetically
levitated system with a Smartphone applications and
travel between the Emirates at 1200 km per hour [33].
The RTA trials the air taxi in 2017 to launch the first vehicle
capable of carrying two passengers after signing an agree-
ment with specialist German Company in the manufacturing
of Autonomous Air Vehicles. The air taxi is characterized by
its autonomous flying and powered by electricity with high
safety features; it has 18 rotors to ensure safe cruising and
landing of the taxi in case of any rotor failure. The project
contributes to eliminate congestion, generate new revenues
and sustain Dubai into a smart city [34].
Therefore, The RTA’s smart system implementations
contribute to increasing the value added of the information
and communication sector in Dubai from AED 11.1 billion
in 2007 to AED 14.5 billion in 2015 at a growth rate of
30.6%. Despite the decline in the investment of the sector
from AED 5.8 billion in 2007 to AED 3.6 billion in 2015 by
37.9%, as well as the foreign direct investment in the sector
increased by 123 during the period. This indicates the effi-
ciency of the smart systems in Dubai, especially, in the
transport sector. Where the investment increased from AED
11.2 billion in 2007 to AED 23.4 billion in 2015, also, the
contribution to the GDP increased from 10 to 11.4% during
the period [35].
4 Estimate the Relationship Between
the RTA and the Investment
of the Information and Communication
Sector
This model aims to estimates the relationship between the
development of the Information and Communication sector
(ICT) and the independent variables which express the
expansion of the RTA activities in Dubai.
4.1 Source of Data
The study used annual time series data during the period
1995–2016, the data of GDP at constant prices and the
investment of the information and communication sector
obtained from the Dubai Statistics Center, the data on road
lengths and the number of vehicles registered obtained from
the Roads and Transport Authority (RTA).
4.2 Model Variables
CIVN: The Investment of Information and Communica-
tion Sector
DGDL: GDP at Current Prices of Dubai
CARN: The Number of New Vehicles Registered in
Dubai
RODL: The Road Lengths in Dubai
The Role of the Roads and Transport …407
4.3 Model Formulation
The linear formulation of the relationship gave spurious
results, the diagram of the variables showed up the insta-
bility of the mean and the variance, where T and R
2
coef-
ficients recorded very high values. Therefore, the data
transformed into logarithms and the model formulated
according to the logarithmic formula, which releases the
series of variance and the difference method releases the
series of the general trend to become stationary in the mean
and variance.
The investment function of the information and technol-
ogy sector can be expressed as the following formula:
Log CIVNt=a + B
1Log DGDLt+B
2Log CARNt
+B
3Log RODLt
ð1Þ
4.4 The Parameters Estimation Includes
the Following Steps
Unit Root Test Results. Augmented Dickey-Fuller test
considered the best method to test the unit root and deter-
mines the degree of variables integration. The Unit Root test
is applied on time-series of variables according to the
following formulas (Table 1):
DCIVNt¼aþbCIVNt1þX
v
ðr¼1Þ
DCIVNtrþUt
DDGDLt¼aþbDGDLt1þX
L
j¼1
DDGDLtjþUt
DCARNt¼aþbCARNt1þX
k
i1
DCARNtiþUt
DRODLt¼aþbRODLt1þX
m
e¼1
DRODLteþUtð2Þ
where:
H
0
:b=0
H
1
:b<0
•The equations by intersection and trend.
•Lags determined according to minimize the degree of
autocorrelation of errors
•ADF values are T. Statistic values corresponding to
parameter B, whereas b=(1−B) which are compared
to T. Critical values from expanded MacKinnon tables;
Mac.val.
The table shows that: ABS [t
tab
] < ABS [t
cal
]
Therefore, the null hypothesis is rejected, and the alter-
native hypothesis is accepted, that the variables are inte-
grated of the first order I (1), the first differences are
stationary, where the alternative hypothesis is accepted at
1% significance level for all variables except the GDP of
Dubai at 5% significance level.
Cointegration Test Results. Johansen Co-integration
Test uses to test the long-term relationship among the vari-
ables of the first order I (1) based on Augmented Dickey-
Fuller test of the unit root, through comparing the calculated
Eigenvalue (k) with the Tabulated values kmax and ktrace
statistical tests of the roots (Table 2).
where:
Trace
test:
k
H
0
:r=0
H
1
:r=1,2,3
Max
test:
k
H
0
:r=0
H
1
:r=1
The linearity of the time series of the variables under
consideration is tested in the presence of lags. Also, the
variables integrated of the first order and determined
according to A Kaike Information Criterion (AIC). The
Cointegration test in the table shows the variables are
cointegrated. kTrace test indicates one cointegrated equation
at 5% significance level.
Table 1 Augmented
dickey-fuller test results Series (ADF) test statistics of unit root
Max lags Levels ADF Max lags Ist difference ADF
Mac.val Mac.val
1% 5% 1% 5%
CIVN 2 −3.770 −3.005 −1.135 2 −3.78 −3.012 −5.182
DGDL 2 −3.770 −3.005 −0.785 2 −3.78 −3.012 −3.016
CARN 2 −3.769 −3.005 −0.267 2 −3.78 −3.012 −4.340
RODL 2 −3.770 3.005 −0.071 2 −3.78 −3.012 −3.082
408 H. A. Adela
Whereas: k
trace
(cal)
<k
trace
(tab)
Test k
max
indicates one cointegrated equation among
variables at 5% significance level.
Where: k
max
(cal)
<k
max
(tab)
Estimation the Parameters of Error Correction
Model. The error correction model formula contains both
the long-term relationship including the lags, in addition to
short-term relationship including time-series differences,
which reflects the change in values from period to another.
The error correction model formula is as follows:
DCIVNt¼a+B
1DDGDLt+B
2DCARNt
+B
3DRODLt+B
4DUt1+E
t
ð3Þ
where: Δindicates the first difference.
ΔU
t-1
: the lag value for error of one period due to
Co-Integration regression
The long-term relationship of the CIVN function by two
lags as the follows:
CIVNt¼10:96163 þ3:86 DGDLt
ð20:827Þ
þ5:97 CARNt
ð22:422Þþ2:86 RODLt
ð26:739Þ
ð4Þ
The equation shows up the following:
1. The equation is consistent the economic theory hypoth-
esis, whereas, there is a positive correlation between the
Investment of Information and Communication Sector
(CIVN) and GDP of Dubai at Current Prices (DGDL),
the number of New Vehicles Registered in Dubai
(CARN) and the Road Lengths in Dubai (RODL).
2. The variables are significant at 1% level.
3. The increase in GDP of Dubai (DGDL) by 1% leads to
an increase in the Investment of Information and
Communication Sector (CIVN) by 3.8%, whereas, the
multiplier impact of investment manifests after two lags.
This Indicates Dubai’s interest in rapidly developing the
sector to transform into a smart city.
4. The increase in the number of New Vehicles Registered in
Dubai (CARN) and the Road Lengths in Dubai (RODL)
by 1% leads to an increase in the Investment for Infor-
mation and Communication Sector (CIVN) by 5.6, 2.9%,
respectively, that indicates the sector’s development is
significantly affected by the increasing of RTA projects,
which implement the highest world-class technology of
smart systems in the transportation sector (Table 3).
The Vector Error Correction (VEC) indicates the fol-
lowing relationship:
D(CIVN) = −0.93 ΔCIVN
t-1
−1.74 ΔCIVN
t-2
+ 1.21
ΔDGDL
t-1
+ 3.80 ΔDGDL
t-2
−1.09 ΔCARN
t-1
−2.77
ΔCARN
t-2
−0.74 ΔRODL
t-1
+ 0.24 ΔRODL
t-2
+ 0.27
The error correction model (ECM) proves that the devi-
ation between variables from the general trend in the long
term has corrected through the short-term relationship, the
variable for adjusting the deviation is (CIVN) by 1.67% and
(CARN) by 2.7% during the second period.
As well as, the Theil’s Inequality coefficient test indicates
the high efficiency of the model forecasting, whereas Theil’s
coefficient amounted 0.008 (Table 4).
There is a causality relationship, which shows in bidi-
rectional between both the GDP of Dubai (DGDL) and the
Investment of Information towards Communication Sector
(CIVN) at significant level 1%, as well as, shows in one
direction between both (CIVN), (DGDL) towards (RODL)
at 1, 5% significant level respectively, Moreover, the causal
relationship shows between (CARN) towards both (DGDL),
(CIVN) at 1% significant level. This refers the addition of
(DGDL) and (CARN) to the (CIVN) function leads to
improve the results of the regression correlation.
Table 2 Johansen co-integration
test results Test statistics Estimated co-integration equations
0r1r2r3r
(
k
) Eigen value 0.866 0.601 0.301 0.095
k
trace
(cal) 71.315 28.986 9.651 2.98
5% (tab) 47.856 29.797 15.494 3.841
k
max
(cal) 42.329 19.334 7.553 2.982
5% (tab) 27.584 21.131 14.264 3.841
The Role of the Roads and Transport …409
5 Conclusions
The Roads and Transport Authority (RTA) has set up its
strategic objectives towards the consolidation of Dubai into a
smart city. It implements the most vital technological pro-
jects of smart transportation such as the Enterprise Com-
mand and Control Center (EC3), Integrated Mobility
Platform project, environmental-friendly Hybrid taxis, the
largest driverless metro network in the world, the Hyperloop
trains system, the air taxi, a dynamically charge for cars on
the busiest highway, a new NFC “Near Field Communica-
tion”. Also, many different applications such as RTA Mobile
Applications, RTA Smart Drive, Drivers and Vehicles App,
RTA Dubai App, Smart Taxi, Salk App, Public Transport
App, Sharekni App and Wojhati App. Additionally, a sig-
nificant number of smart services for Driver and Car owner
services, Public transport services and Business services.
The RTA aims to environmental sustainability, whereas,
the smart applications save an average of 28 km per trans-
action processed and reducing carbon emissions by 10 kg
per transaction, as well as the public transport systems
contribute to decreasing the carbon emissions by 8.8% in
2016 and aims to reach 16% in 2021. In addition to, the
Dubai metro decreased the CO
2
emissions from 59 tCO
2
in
2013 to 125 tCO
2
in 2015. The number of public transport
passengers has increased to carry over 1 million passengers
per day. Therefore, the RTA generates total revenue flow
amount to AED 7.6 billion in 2016, it has accomplished the
budget balance and contributed to 16% in the Dubai
government budget.
The RTA’s smart transport systems contribute to
increasing the value added of the information and commu-
nication sector in Dubai to AED 14.5 billion in 2015 at a
growth rate by 30.6% compared with 2007, despite the
decline in the sector investment by 37.9% in 2015. This
indicates the efficiency of the smart systems in Dubai,
especially, in the transport sector which contributes to
increasing the GDP from 10% in 2007 to 11.4% in 2015.
Johansen Cointegration Test shows up a long-term rela-
tionship between variables of the first order I (1) at 5%
significance level.
The increase in the number of New Vehicles Registered
in Dubai (CARN) and the Road Lengths in Dubai (RODL)
Table 4 Granger causality test
results Dependent variable Independent variable Chi- Sq. Prop
D(CIVN) D(DGDL) 13.40 0.000
D(CIVN) D(CARN) 12.24 0.002
D(RODL) D(DGDL) 5.96 0.050
D(RODL) D(CIVN) 16.26 0.000
D(DGDL) D(CIVN) 8.63 0.013
D(DGDL) D(CARN) 22.11 0.000
Table 3 Vector error correction
(VEC) results Variable The coefficient of speed adjustment T. statistic
CIVN
t-1
−0.932 1.75
CIVN
t-2
−1.67 −2.44
DGDL
t-1
1.21 1.255
DGDL
t-2
3.80 3.397
CARN
t-1
−1.97 −1.268
CARN
t-2
−2.77 −3.212
RODL
t-1
−0.74 −1.157
RODL
t-2
0.24 0.686
C 0.273665 1.818
Coint Eq1 0.271070 1.754
R
2
0.70
Adj. R
2
0.43
F-statistic 2.610
A Kaike −0.120
Theil Coa 0.008
410 H. A. Adela
by 1% leads to an increase in Investment of Information and
Communication Sector (CIVN) by 5.6, 2.9%, respectively.
This indicates the sector’s investment is significantly affec-
ted by the development of the RTA projects that implement
the world first-class technology and highest smart systems.
The variables responsible for correcting the deviation of
variables in the long term is (CIVN) by 1.67% and (CARN)
by 2.7% during the second period.
Granger Causality Test shows the causality relationship
in bidirectional between both the GDP of Dubai (DGDL)
and the Investment of Information towards Communication
Sector (CIVN) at 1% significant level. As well as the
causality relationship shows in one direction between
(CARN) towards both (DGDL), (CIVN) at 1% significant
level. Moreover, it shows between both (CIVN), (DGDL)
towards (RODL) at 1, 5% significant level, respectively. The
Theil’s Inequality coefficient test amounted 0.008. This
indicates the high efficiency of the model forecasting.
References
1. Dubai Statistics Center, Population and Vital Statistics. Retrieved
from https://www.dsc.gov.ae/en-us/Themes/Pages/Population-and-
Vital-Statistics.aspx?Theme=42. Accessed at 9 May 2017
2. Al Sayegh, F.: Merchants’role in a changing society: the case of
Dubai, 1900–90. Middle Eastern Stud. 98 (January 1998).
Retrieved from http://www.tandfonline.com/doi/abs/10.1080/
00263209808701211?journalCode=fmes20
3. Harrison, C., Donnelly, I.A.: A Theory of Smart Cities. IBM UK
Limited, pp. 2–3 (Jan 2011). Retrieved from http://www.
interindustria.hu/ekonyvtar/en/Smart%20cities%20and%20commu
nities/Publications/A%20theory%20of%20smart%20cities.pdf
4. Joshi, S., Saxena, S., Godbole, T.: Shreya. Developing Smart
Cities: An Integrated Framework. In: Procedia Comput. Sci. 93,
902–909 (2016). Retrieved from http://www.sciencedirect.com/
science/article/pii/S1877050916315022
5. Mitchell, W.J.: Designing the digital city. In: Ishida, T., Isbister, K.
(eds.) “Digital Cities”, Lecture Notes in Computer Science, vol.
1765, pp. 1–6. Springer, Berlin Heidelberg (2000). Retrieved from
https://link.springer.com/chapter/10.1007/3-540-46422-01
6. Dirks, S., Keeling, M.: A Vision of Smart Cities; How Cities Can
Lead the Way into a Prosperous and Sustainable Future. IBM
Institute for Business Value, Dublin, pp. 1–16 (2009). Retrieved
from https://www-03.ibm.com
7. Cairney, T., Speak, G.: Developing a Smart City: Understanding
Information Technology Capacity and Establishing an Agenda for
Change, p. 7. Center for Research and Innovation, Canada
8. Bronstein, Z.: Industry and the Smart City. Dissent mag. 56(3),
27–34 (2009) (New York). Retrieved from https://www.
dissentmagazine.org
9. Ballas, D.: What makes a ‘happy city’? Elsevier 32(1), 39–50 (July
2013). https://doi.org/10.1016/j.cities.2013.04.009. Accessed at
15 Aug 2017
10. Washburn, D., Sindhu, U., Balaouras, S., Dines, R.A., Hayes, N.,
Nelson, L.E.: Helping CIOs Understand “Smart City”Initiatives:
Defining the Smart City, Its Drivers, and the Role of the CIO,
pp. 1–17. Cambridge, MA: Forrester Research (February 2010).
Retrieved from https://www.forrester.com/report/Helping+CIOs
+Understand+Smart+City+Initiatives/-/E-RES55590
11. Caragliu, A., Del Bo, C., Nijkamp, P.: Smart cities in Europe.
J. Urban Technol., 65–82(Aug 2011). Retrieved from http://dx.doi.
org/10.1080/10630732.2011.601117
12. Chen, T.M.: Smart grids, smart cities need better networks. IEEE
Netw., 57–67 (2010). Retrieved from https://www.bibsonomy.org/
bibtex/68a13e3135c90f769fa4d8eccad71541
13. Dagli, C.H. (ed.): Location intelligence application in digital data
activity dimensioning in smart cities. In: Jensen, M., Gutierrez, J.,
Pedersen, J. (eds.) Conference Organized by Missouri University
of Science and Technology, pp. 418–224 (2014). Retrieved from
http://vbn.aau.dk/files/206058762/1_s2.0_S1877050914012642_
main.pdf
14. Eger, J.M.: Smart growth, smart cities, and the crisis at the pump a
worldwide phenomenon. J. e-Government Policy Regul. 32(1),
47–53 (Jan 2009). Retrieved from http://dl.acm.org/citation.cfm?
id=1552016
15. Raj, P., Raman, C.A.: Intelligent Cities Enabling Tools and
Technology, pp. 4–5. Taylor & Francis Group, LLC (2015).
Retrieved from https://arthurlimantara.files.wordpress.com/2017/
03/intelligent-cities-enabling-tools-and-technology.pdf
16. Cunningham, P., Cunningham, M. (eds.): Developing a policy
roadmap for smart cities and the future internet. In: Komninos, N.,
Schaffers, H., Chaffers, P.M. (eds.) eChallenges e-2011 Confer-
ence Proceedings, IIMC International Information Management
Corporation, pp. 1–8 (2011). Retrieved from http://www.urenio.
org/wp-content/uploads/2008/11/2011-eChallenges_ref_196-
Roadmap-for-Smart-Cities-Publised.pdf
17. Neirotti, P., De Marco, A., Cagliano, A.C.: Current trends in smart
city initiatives: some stylised facts. Elsevier 3(38), 25–36 (June
2014). Retrieved from https://doi.org/10.1016/j.cities.2013.12.010
18. Hall, R.E.: The vision of a smart city. In: 2nd International Life
Extension Technology Workshop, p. 1. Paris (Sept 2000).
Retrieved from https://digital.library.unt.edu/ark:/67531/
metadc717101/m2/1/high_res_d/773961.pdf
19. Harrison, C., Eckman, B., Hamilton, R., Hartswick, P., Kalagna-
nam, J., Paraszczak, J., Williams, P.: Foundations for smarter
cities. IBM J. Res. Dev. 54(4), 1–16 (July/Aug 2010). Retrieved
from http://fumblog.um.ac.ir/gallery/902/Foundations%20for%
20Smarter%20Cities.pdf
20. Angelidou, M.: Smart cities: a conjuncture of four forces. Sci.
Direct 47,95–106 (2015). Retrieved from http://www.
sciencedirect.com/science/journal/02642751/47?sdc=1
21. Ahvenniemi, H., Huovila, A., Pinto-Seppä, I., Airaksinen, M.:
What are the differences between sustainable and smart cities? In:
VTT Technical Research Centre of Finland, pp. 234–245 (2017).
Retrieved from http://www.dobramesta.cz/cms_soubory/aktuality/
121.pdf
22. Demetri, M.: What is a Smart City? An Intelligent, Digital and
Inclusive City. Here’s How to Recognize it (April 2016).
Retrieved from http://www.marcodemitri.it/smart-city-citta-
intelligenti/. Accessed at 20 Aug 2017
23. Road and Transportation Authority (RTA): RTA Strategic Plan
2014–2018, p. 14. Retrieved from https://www.file:///C:/Users/
Hatm/Desktop/RTA_Strategy_Plan.pdf. Accessed at 25 Aug
2017
24. Road and Transportation Authority (RTA), Retrieved from https://
www.rta.ae/wps/portal/rta/ae/home. Accessed at 29 Aug 2017
25. Road and Transportation Authority (RTA): Sustainability Report
2015, pp. 1–30 (2015). Retrieved from https://www.rta.ae/wps/
wcm/connect/rta/ca723973-88ee-407c-935c-MOD = AJPERES&
CACHEID = ca723973-88ee-407c-935c-43a2e7dd1d5. Accessed
at 2 Sept 2017
The Role of the Roads and Transport …411
26. Road and Transportation Authority (RTA): Almasar, the Official
Monthly magazine of Dubai’s RTA, vol. 99, p. 14 (September
2016). Retrieved from https://www.rta.ae/links/magazine/masar/
Al_Masar_99_Eng.pdf. Accessed at 9 Feb 2017
27. Road and Transportation Authority (RTA): Retrieved from
(=https://www.rta.ae/wps/portal/rta/ae/home. Accessed at
30 Aug 2017
28. Gulf News, Transport. Retrieved from http://gulfnews.com/news/
uae/transport/mohammad-opens-enterprise-command-and-control-
centre-1.2031307. Accessed at 14 Sept 2017
29. Road and Transportation Authority (RTA): Almasar, the Official
Monthly magazine of Dubai’s RTA, Op. Cit., p. 16. Retrieved
from https://www.rta.ae/links/magazine/masar/Al_Masar_99_Eng.
pdf. Accessed 15 Sept 2017
30. Road and Transportation Authority (RTA). Retrieved from http://
www.nol.ae/RtaPortal/Portal.portal?lang=ae&_nfls=false.Accessed
at 15 Sept 2017
31. Road and Transportation Authority (RTA): Sustainability Report
2015, Op. Cit., p. 26
32. Gulf News, Transport. Retrieved from http://gulfnews.com/news/
uae/transport/in-8-years-a-billion-riders-used-dubai-metro-1.2087
413. Accessed at 2 Sept 2017
33. Mail online, Science and Tech (9 Nov 2016). Retrieved from http://
www.dailymail.co.uk/sciencetech/article-3915822/Dubai-
Hyperloop-One-study-potential-Abu-Dhabi-line.html. Accessed at
14 Sept 2017
34. Gulf News, Transport. Retrieved from http://gulfnews.com/news/
uae/transport. Accessed at 16 Sept 2017
35. Dubai Statistics Center, National accounts. Retrieved from https://
www.dsc.gov.ae/ar-ae/Themes/Pages/National-Accounts.aspx?
Theme=24&year=2015#DSC_Tab1. Accessed at 5 Sept 2017
412 H. A. Adela
The Social Significance of Corporate Security
Dusko Tomic and Eldar Saljic
Abstract
An illness starts from the most vulnerable parts of the
body, can be caused by inheritance factors or unhealthy
behavior—the crisis hotspots in corporations manifests in
sectors, where bad management is taking place. The
incubation phase starts, when the pathogenic elements
multiply and it comes to neglecting of, so it seems,
unsolvable problems. If they reach a certain threshold, the
pathogenic elements defeat the defense system of the
body and make the patient start feeling sick—an escala-
tion of the crisis. An illness manifests and a fight for
recovery or survival can take place. A similar scenario
exists in corporations: even today, in the XXI century,
where the main concern is data protection, corporations
create possible points of vulnerability and thus make it
possible to be a victim of cyber-attacks (which are used as
a supporting business strategy in order to gain informa-
tional superiority towards corporations—being a step
ahead) by neglecting administrative or technical security
issues. The competition fights are still ongoing. Some
corporations suffer from deviations of the rational plan.
Modern corporations in the western societies are fairly
rational and scientific in their management approach.
Their rational system of thinking can be closed down to
risk calculations and prediction of possible ways of failure
by creating procedures for failure-detection of abnormal
patterns, which, to a large degree, leads to failures and
crisis. But, why is this happening? It’s impossible to
predict when a crisis would occur. The rational—
scientific approach, and within it the description of all
the possible risk markers, the prediction of ways to fail
and tying a quantified risk factor to each scenario leads to
a false sense of security. If there is already a crisis point
developing—the risk that seemed to be pretty small
becomes acceptable and is being neglected, because
people are more likely to forget that risks—no matter how
small they are—can occur. The normalization of risk
often leads to a very frequent acceptance: „this can’t
happen. Thus, when there is a crisis happening, everyone
seems to be surprised.
Keywords
Corporation Security Competition Risk
1 Introduction
Corporate security in the XXI century is a great challenge for
top-managers. For a modern corporation to be secure and to
conduct business under modern conditions it’s often not
enough that the threat is absent. What counts is its ability to
adapt to newly created conditions and function under pressure.
It’s not just possible to observe the functioning of a
corporation from an isolated standpoint—in a clear form,
because aside from new trends, globalization also brings
new threats and new risks—new challenges. Today, corpo-
rate security is considered the key factor to existence and
sustainable functions of a corporation’s system.
Corporate security is part of the security structure, which
is based on societal goals that coordinate business activities
of business entities and regulate their socially responsible
behavior in accordance to the law [1].
In feudal societies, the social community was obligated to
protect their citizens from criminals. During that time, crime
was solved with the gathering of informations from citizens
(witnesses), so that, in the end, the perpetrator would be
caught. The main problem in the middle ages was that such
systems favored the social status of the individual over
clearly present facts. Thus, we can conclude that in most
cases, solving a crime in the medieval time was unjust
(unprofessional), because the structures that were used to
D. Tomic (&)E. Saljic
College of Security and Global Studies,
American University in the Emirates, Dubai, UAE
e-mail: dusko.tomic@aue.ae
E. Saljic
e-mail: eldar.saljic@aue.ae
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_48
413
solve crimes were more pointed towards the status of an
individual within a community than true facts.
Until the end of the 13th century, the fundamentals of the
rule of law had been laid, and in the year 1215, the English
King John released the Manga Carta, which described the
judicial process towards an individual. In Serbia, we have
Tsar Dusan and the „Code of Dusan. The need for security—
personal and property protection—was being more and more
present in the higher circles of societies. They received this
protection from the King’s or Tsar’s military. Regardless of
whether we call them Knights or Samurais, their assignment
was the same—protect the most valuable.
In the 17th century, with the development of trading
companies in Western Europe and the Americas, the capital
grew and states expanded. The development and the
expansion of a state results in a population growth, and with
it also come higher crime and violence rates, something that
the police couldn’t handle quite well.
Such a negative situation was favorable for the devel-
opment of private security structures—a private police, with
the goal of protecting private property. Each change in
international relations impacts the security of corporations
directly. States come together because of their personal
interest—economic or strategic interests or security reasons.
When it comes to a change of these interest in foreign
relations, the security relations change immediately.
The beginning of the 20th century shows large steps
towards the development of a state and private security.
During the Cold War (strategic associations—a bipolar
world), the World was polarized into two opposing mili-
taristic and political blocks—the Warsaw pact (with Russia,
then the Soviet Union as the leader) and the Atlantic Pact—
NATO (with the USA being the leader).
This period alone proved secrecy to be of upmost
importance. Security (in the state and private sector) was
focused on protecting informations. The never stopping arms
race resulted in constant external security threats. Because
the needs of the weapon systems and other managements
during the Cold War have become more sophisticated, it
caused the level of personal and property protection to grow.
During that period, it was established that the information is
the key value of power, and the necessity for methods to
protect these informations in any field imaginable was pre-
sent in the security and corporate sectors. The safety of
corporations supporting the government’s defensive and
offensive needs expanded and developed rapidly with the
goal of protecting property or informations that were a part
of the national state apparatus as well (for example classified
contracts), something also known as industrial defense [2].
The political, economic and social changes at the end of
the 1970s largely motivated the increase of criminal doings,
which led to the expansion of private security. Security
controls in corporations was developed and perfected
because of a large need for reliable workforce. World War II
brought forward a large number of people with knowledge
about security, law enforcement, investigation experience,
and with it the possibility of their employment in the private
sector. Contract appendixes and corporation management
explicitly mentioned security control with the goal of
property protection. At that time, security control consisted
of searching employees in corporations in order to prevent
them from stealing tools or other small crimes.
When it comes to the security after the Cold War, we
must mention that up until 1999, Europe and Russia have led
mostly by neglecting policies, because geographically, these
2 regions have been far away from each other. There have
been threats to internal security in former socialistic republic
with so called national cracks (Bosnia, Ukraine), where
politics went as far as to practically be non-existent. Thus,
the NATO was always profiled as a security guarantor.
At the end of the 1990s, with the Cold War finished, it
was clear that the age of prosperity clearly was very far
away. The crime rate grew, and the crimes—conflicts
become more and more complex. A threat to corporation’s
security came with that exact globalization, well, not gen-
erally, but the increasing global competition and the need for
informations about the business of competing corporations
in order for one corporation to be one step ahead became an
epidemic.
Today, in the era of the third technological revolution,
apart from technological development, the number of
cyber-attacks towards corporations with the goal of stealing
informations of value or sabotaging certain activities
important for the companies are growing. This has led to the
development and the perfection of the corporate security
sector.
The corporate security sector is of crucial importance for
a corporation, since it’s protecting the corporation from
potential threats to vital structures inside the corporation and
establishes the basics for qualitative and quantitative man-
agement decisions. It also grants top management an access
to classified informations and guarantees their security
through processes and procedures which prevent them from
being leaked outside of a corporation [3].
2 The Relation Between Corporate
and Private Security
The survival and the sustainable development of a state as a
political union, which the governing class uses to maintain
its economic and political values is established through a
macro-security system that consists of several multi layered
systems of micro-security.
The modern states encounter diverse problems. With the
goal of protecting the vital national values and up keeping of
414 D. Tomic and E. Saljic
the inner peace (prevention of anarchy) on the one side and
defending the state from external threats to the other side, the
state develops a monopoly for using legitimate force [3].
Private security is one part of the system of national
security and its role, competence scope and duties is deter-
mined through legislative provisions. According to some
analysts, there have been 2 moments that have largely
affected the private security sector:
•Moment I is the trend of privatization, present in coun-
tries of West Europe and North America since the 1980s.
•Moment II is the surplus of military, intelligence and
police staff. This is a consequence caused by the end of
Cold War, where people from mentioned areas would
search work in private security sector, which at that time
gained more attraction.
There is a very important difference between private and
corporate security, because private security is a specific sub-
system in relation to the national security system of a state. We
can divide the private sector into the private security sector—
actions of personal private security, business security and
property protection (vital national infrastructures, facilities
and oil pipelines, protection of humanitarian workers and
convoy protections, detective works).
The private sector also contains the work of private
military companies and many others commercially under-
lined realized security actions [3]. These mercenaries are
soldiers rented by a foreign country or rebel movements in
order to contribute in armed conflicts, through direct or
indirect involvement in the conflict through trainings,
logistics, consulting or collection of data—they do this
outside the jurisdiction of armed forces and the state they
belong to—privatized punishment facilities.
Private security companies are clearly structured and have
corporate associations with clearly defined hierarchy. They
offer security services and compete with other similar compa-
nies for jobs on the market. Privatization of the military
industry, however, motivated by the revolutionary wave of
privatization of all spheres of life made it possible for private
companies to be potential providers of security and military
services. Under post-ColdWar conditions, weapon and military
equipment, as well as the surplus of military staff is being sold,
and together with the neoliberal privatization, corporations
quickly saw the chance in the possibilities that the government
provided with the privatization of certain state sectors.
During the privatization era, states wanted to reduce
military cost and let private companies take over certain
parts of that sector. The reason for this was that the world
leading forces—traditional actors in regional and
interregional conflicts during the Cold War—reduced their
engagement in conflict solutions. Private military companies
in that time quickly saw a big chance and filled that
vacuum—they automatically absorbed the excessive military
staff and equipment and started offering a wide spectrum of
military and security services to different interested parties.
After the Cold War ended, a second wave of growth for
private military and security companies started flourishing
after the military intervention in Afghanistan and Iraq.
The private sector in western countries occurred conse-
quently to demands towards state institutions to do their jobs
more effectively. However, in Serbia, this happened for a
very different reason. Because of the full collapsing of the
state in one moment and its inability to conduct its main
functions, between 1990 and 2000, Serbia experienced an
enormous increase of industrial production, a rapid decrease
of exports, chronic unemployment, while the grey economy
grew exponentially larger.
In addition, Serbia experienced a downfall of the rule of
law and the effectiveness of institutions to provide better
security for its citizens. During the 1990s, in 1993 to be
exact, it comes to the abolition of the State self-protection
law. This law dictated assignments and responsibilities of
corporate subjects within the security system. Companies,
which until then were conducting business within state
owned companies, however, continued to follow the rules of
this law by inertia. Problems occurred because with the
abolition of State self-protection, there was an empty void in
the security sector, which wasn’tfilled by state actors, and
therefore private capital came into play. Acting according to
market demands, and in absence of a judicial regulation, this
sector didn’t integrate in the security system of Serbia.
After the change of power on October 5th 2000, there
have been several attempts to perfect the security apparatus.
Most of the companies began to flourish with the entrance of
foreign companies on the Serbian market at the end of the
20th century, and the most important clients in Serbia
became foreign banks.
The growth of the private security sector since the
beginning of democratization illustrates through the surplus
of police and military staff finding employment inside pri-
vate security companies during the decreasing numbers of
military and police. The Serbian Military does not have
evidence about how many former employees was employed
in the private sector. Noticing big interests, the Military
established a retraining program for jobs inside private
security companies [4]. The most effort to perfect and
develop the private security sector was put in by the Society
for physical and technical security within the Economic
chamber of Serbia (PKS) in the year 2005.
The Social Significance of Corporate Security 415
3 The Content and Basic Features
of Corporate Security
Today, in the 21st century, corporate security is more
threatened than ever. corporate security in modern times
became a strategic function of corporate subjects. One of the
things is he drastic growth of many organizations—groups
and individuals who have the same interest in the threat of
the existence or sustainable development of a corporation or
are paid to do so from other corporation (danger subjects)
that sees the opposing corporation—in this case the victim
corporation as competition. Operations of destructive orga-
nizations or individuals can also have other reasons than the
desire for competitive advantages: religious, economic,
political and ideological.
These different kinds of threats or attacks can have an
internal or external character to it. They can occur suddenly
or after some time, and cause great damage to the functional
system of a corporation (reputation, business strategy leaks
and competition analysis leaks, which can further result in a
loss of morals and motivation of employees as well as
crumble their trust for the institution they work for). Threats
to the existence of a corporation can be due to drastically
unsuitable weather conditions. Direct security threat sources
for corporations can be:
•Technical—technological accidents;
•Natural disasters;
•Crimes with damages to the business subject (diversions,
sabotage, terrorism, destruction/damage to the production
line);
•Classic crimes;
•Corporate crimes—from employees in ties with business
partners (abuse of position and power, corruption, brib-
ery, fraud and money laundering, robbery, influencing or
business practices at the expense of the company);
•Crimes of general danger and crimes against human
health and the environment;
•Cybercrimes;
•Traffic accidents;
•Leaks of confidential data;
•Offenses (negligent businesses, violation of work disci-
pline, and the transgression and usurping of duties and
permissions);
•Social conflicts and other conflicts within the organiza-
tion [5].
The criteria for danger indicators to vital values of one
corporation are, on one side, all threatening actions a dan-
gerous subject takes in order to gain personal advantage or
cause harm through his negligence, and on the other side,
these danger sources can also be natural forces—natural
disasters. Dangerous subjects for the value system of a
corporation can also be of internal and external type.
The internal type understands: company members/
employees—individuals and organized groups, including
top management, which through their actions or lack of
action present a security threat; While the external type
differentiates between individuals/collectives from the
company’s surroundings, which in cooperation with
individuals/organized groups within the company affects its
security.
The motives for harming corporations can be infinite,
starting from conflicts within employees—rivalry, discrep-
ancies, misunderstandings or uneven financial and status
wishes; destructive behavior—alcohol or drug addiction;
Kleptomania; debt; illness; earlier attraction to criminal
behavior and actions etc. The relation of internal and
external forms of corporate threat is close to 80:20%, but the
amount of damage done to a corporation is reversed,
meaning that there is a higher amount of damage dealt when
employees are involved into causing them [5].
One of the most dangerous forms of corporate is the act
known as the result of making decisions from the top
members (managers, chief executive and other officers)
within the company. These influential structures, which are a
part of the corporate apparatus and have the task to make
lawful decisions, based on business rules with the goal of
making profit with the corporation can also pull entirely
opposite strings. We, of course, talk about high profile
employees who, with planned actions, directly or indirectly
commit unlawful activities in order to gain personal
advantage and wealth. Such profiled criminals often use their
status in order to avoid criminal responsibilities and sanc-
tions, sometimes unnoticed or even supported by subjects of
national security.
This type of crime often happens in countries where there
are cracks within the national security structures [5].
Human made or natural threats to the security of corpo-
rations is something that is present every day. But, when an
unpredicted crisis or extraordinary situation inside the space
of a corporation or in its surrounding occurs, it lifts the
vulnerability of corporations to potential hazards [6].
Raising awareness of employees, members and staff
about potential threats—factors of threatening actions;
appropriate training of those to take action during extraor-
dinary situations. This way, the sector of corporate security
can make itself be prepared for everything that might or
actually never will happen, while not strictly relying on the
rational—scientific principal of coping mechanisms. This is
why the European Union suggests an implementation of
integral security inside corporations.
Such security contains all kinds of security and safety
tasks. From good practical experience it is believed that
416 D. Tomic and E. Saljic
connecting these tasks by a unique security manager would
lead to a more productive organization, coordination and
control of given tasks and therefore a to a more rational and
improved way of doing business [3]. Based on all possible
potential dangers we talked about, we can conclude that the
job of a security manager inside a corporation is not easy.
His task consists of things such as gathering of information,
security and risk evaluations, IT-security, crisis manage-
ment, fire, explosion and accident protection, as well as
safety and health measures in the workplace.
4 Integral Security in Corporations
In their fight for survival on the market, the most successful
cooperation, banks and other financial organization (mainly
the large ones, even multinational) from the Western Bal-
kans understand that security is of vital importance for their
normal functioning. Because of that, they put their efforts
into early identifications and evaluations of threats to their
business, proactive and reactive actions and risk manage-
ment, as well as effective and broader implementation of
defense mechanisms.
They notice that corporate security is a crucial segment
for the normal functioning of a corporation. It is sure that
one aftermath of the economic crisis and recession is the
neglecting of corporate security sectors, which is why it is
present in the most countries in the Western Balkans [6].
Different factors show that the majority of top management:
employees in the corporate security sector and private
security companies still are former members of the military
or police, from that post-Cold War period. People of this
profile do not possess the wider knowledge and required
abilities needed today in order to adapt their work inside this
modern security environment to the principals and business
goals of a corporation.
Corporations are based on private equity. Today, this is
the most complex organizational business system. A corpo-
ration is a capital group that gained the necessary funds for
founding and business of such organizations by issuing
shares. Corporations are widely influenced by their working
environment, because they actually gain their resources from
exactly the environment they are operating in. The resources
are actives, humans, informations, machines, abilities, raw
materials and financial capital. The system of corporate
security in corporations, according to the guidelines of the
European Union can be defined as integral security. Such
security system contains many subsystems, which are a vital
character for the normal functioning of a corporation. In
order for a corporation to function normally, or optimally,
the security sectors need to be present in all corporate
functions [7].
Corporate security management is the managing activity
of certain members and the micro-security system of a cor-
poration. Through this (the managing activity), managers
protect the value system of a company from any form of
self-destruction and aggression within the real environment.
The role—the task of the security manager is to recognize,
discourage, prevent, fight and sanction each subject proven
to be dangerous and has been led to cause harmful changes
in the value system of a company.
The corporate security manager fulfils his tasks by
applying two mutually interlaced models of operative
treatment:
•Preventive—it discourages subjects from undertaking
harmful actions and prevents their realization;
•Repressive—sanctioning a harmful perpetrator in a lawful
way and recovery from the caused effects.
The raised awareness about security and potential hazards
has undoubtfully shown capital owners and top-managers
that development and perfection of security personnel within
a corporation is a basic requirement for optimal functioning.
Because corporate security is divided into micro-security
sectors, each one of them has the task to:
•Analyze actual risks;
•specify tasks and duties;
•strongly follow the organization and the correct functions
of physical—technical security of all objects within the
company;
•apply and support security measures for safety and
health, environment protection, fire and explosion
protection;
•use protection method to shield corporations from cor-
ruption, abuse of power, fraud, theft and money
laundering;
•specify protective measures for corporate and business
secrets;
•concretization of measures regarding movement and
housing controls of foreign citizens in objects on corpo-
rate compound;
•organization and functions of all information systems for
personal and property, as well as business protection of
the corporation, most certainly the protection of
informations;
•harmonization of normative acts in all security segments
with the national laws;
•evaluation of potential hazards for those who work on
protecting the vital values of a corporation [5].
The corporate security manager is a person who is trained
and authorized to plan, organize, execute strategies,
The Social Significance of Corporate Security 417
coordinate and control the work of a profit organization
(firm, company, corporation, trust, and bank). The security
manager has many assignments and has a large responsi-
bility towards a safer working manner in order to provide
better and optimally organized working businesses. He does
so by creating and implementing integrated security systems
inside every field.
According to the guidelines of the European Union, the
following should be included in an integrated corporate
security system:
1. Organizing unit for corporate security:
•Head of the organizing unit;
•Intelligence security manager;
•Security business specialist;
•Personal protection specialist;
•Defense preparation specialist;
2. Organizing unit for work protection, fire protection,
environmental protection:
•Head of the organizing unit;
•work protection and fire protection specialist
•Environmental protection specialist [1].
5 Resource Protection of Critical
Infrastructure
The term critical infrastructure becomes more and more
interesting right after the attacks on the USA on September
11 2001. After such a scenario, the critical infrastructure
became an important part of national security in every state.
The USA define critical infrastructure and resources as
crucial elements for the daily functions of economic, social
and cultural systems of a state. Under the term critical
infrastructure, we consider all natural and material goods,
property, technical systems, communications, business
activities and vital services for the state. This further leads us
to the assumption that any damage, destruction or interrup-
tion of these resources automatically influences national
security, economy, vital state functions, health, population
and the strong state order. The margins of critical infras-
tructures are not defined the same way for all countries,
preferably due to different political situations and geographic
locations (Table 1).
In the last couple of years, it has come to a perfection of
strategies for critical infrastructure protection. These strate-
gies are focused on effective and preventive actions in case
of negative scenarios (terrorist attacks or great national
disasters). The Directives of the European Council
2008/114/ES clearly define sectors, which need to be defined
in order to get a critical infrastructure (Table 2).
Critical infrastructure is tied to different levels and a
“glitch”in one sector can cause problems to flow over to
other segments—in other words, it can cause a domino
effect. Critical infrastructures in a state are complex sub-
sidiary systems between which there is great mutual
dependency.
For example, there is a great connection and mutual
dependency in governments between intelligence and com-
munications elements and the elements of national infras-
tructures: transport, production and distribution of electric
energy and other energy sources, banking, public healthcare,
federal and local government, water supply, media, science,
education, upbringing, emergency services. This undoubt-
edly shows us that the intelligence and communications
sector has the central infrastructural position, and its systems
and processes are attractive targets of terrorist attacks. In a
case of a telecommunications system fallout, elements that
are closely tied to this sector need to be taken as priority,
because the target of the attacks may not always be the
targeted sector.
These systems today are almost certainly the target of
younger generations of terrorists. The reason for the drastic
increase of terroristic operational capabilities is the simple
and easily available sophisticated technology and tools.
These include high end computing and communication
equipment, resources and services for high quality message
encryptions, weapons for temporarily disabling and extort-
ing secret informations and data, machines and tools for
creating weapons, and servers and information systems for
different data sets, including satellite imaging easily avail-
able on the internet.
Because of these operational capabilities, resources of
critical infrastructures are under constant threat from hacker
attacks. Informations do not change their value, and today,
hackers can easily enter critical infrastructure’s servers,
cause great harm, and collect a large quantity of key infor-
mations. Sabotage of the internal intelligence systems has a
larger impact than planting an explosive inside a factory.
The key actors of these activities can be members of ter-
roristic organizations, a group of organized criminals or
members of a hacker network.
6 The European Law Regulation About
Critical Infrastructures
The European Council has asked the Commission to prepare
safety strategies for critical infrastructures. The Commission
has accepted a document on the October 20 2004, which
speaks about terrorism as the sole threat. It is the “Critical
infrastructure protection in the fight against terrorism”, and
it suggests what can be done to improve the European
418 D. Tomic and E. Saljic
prevention, preparedness and response to a terrorist attack
critical infrastructure.
The Council adopted the European program for of critical
infrastructure protection (EPZKI/EPCIP) and agreed about the
arrangements of the Commission for a Critical infrastructure
Warning information Network (IMUKI/CIWIN). In Novem-
ber of 2005, the Commission adopted a Green Paper about the
European Program for critical infrastructure protection. This
way, the EU defines the European critical infrastructure as an
infrastructure containing physical resources, services, devi-
ces, information technology, safety networks and infrastruc-
tures, as well as security, economic and social wealth.
The relationship of the Republic of Serbia with critical
infrastructure protection
The key infrastructure in Serbia are energy, waterworks,
postal services, telecommunication and railway companies,
healthcare institutions, airports, river havens, water systems,
schools, universities and bus station owners.
The Republic of Serbia makes important efforts towards
creating an integrated safety and rescue system, which would
be used in a case where crucial national resources would be
threatened. By passing the Emergency Situations Law in
2009, the state decided that the Ministry of the Interior should
be in charge of creating threat evaluations for natural and other
disasters. Article 46 of that law states that “by evaluating the
threats it would be possible to identify sources of possible
other hazards, predict consequences and measures—tasks in
order to secure and rescue mission in a similar situation”.
The threat evaluation contains especially:
1. The characteristics of a territory, critical facilities, critical
places and areas regarding threats of national disasters
and other hazards with eventual international effects of
impact;
2. vulnerabilities of territories from natural or other
disasters;
3. analysis of possible aftermaths from natural or other
disasters;
4. Needs and possibilities for the protection of people,
material goods and the environment from possible con-
sequences of natural or other disasters [2].
Table 1 Critical infrastructures of different countries [8]
Canada Great Britain USA Germany Norway Switzerland
Energy
(electrical and
nuclear power
objects, liquified
natural gas and
crude oil,
production and
transport
systems)
Energy Energy Energy (electrical,
crude oil and gas)
Energy and objects Objects and services
Communications Telecommunications Informations and
telecommunications
Telecommunications
and intelligence
infrastructure
Oil and gas delivery Telecommunications
Services
(finances, food
distribution,
public
healthcare)
Healthcare services Public healthcare Public healthcare
(including
distribution of
drinking water and
food)
Telecommunications Intelligence
distribution
Table 2 Critical infrastructures of different countries [8]
Sector Subsidiary sector Critical infrastructure
Energy 1. Electric energy Infrastructure and objects needed for production and distribution of electric energy
2. Oil Producing and refining oil
3. Gas Producing and refining gas
Transport 4. Road transport
5. Railway transport
6. Air transport
7. Transport on inland waterways
8. Oceanic and sea transport
The Social Significance of Corporate Security 419
With the passing of the “Development strategies for an
informational society in the Republic of Serbia until 2020”
bill, it’sdefined that it is necessary to develop and perfect
threat protection with the use of information technologies for
critical infrastructural systems.
The “National security strategies of the Republic of
Serbia”mention the term “critical infrastructure”indirectly,
but it points towards the problems of economic development
of the Republic of Serbia after a long period of sanctions and
destructions of vital economic organs and transportation
infrastructures. The mutual energetic dependency and the
vulnerabilities of the infrastructure for producing and
transporting energy sources, high technology crime and
hazards to informational and telecommunication systems [4].
The Government of the Republic of Serbia presented an
outline of the Physical-technical object protection Law in the
year of 2002. This law suggested that objects of strategic
importance for the Republic of Serbia or its citizens, or
objects that create great danger to the environment and
public health must have physical or technical security, where
the special security requiring objects are:
1. Production, refining, distribution and storage facilities for
crude oil, oil derivatives and gas;
2. Objects for producing, refining, distributing and storing
water;
3. Objects for producing and distributing electric energy;
4. Objects for producing, using and store radioactive or
other dangerous and hazardous matter;
5. Objects of great importance for transportations in all
means;
6. Objects with great importance for science, culture and art;
7. Gathering places for a large number of people and other
objects that the Government finds necessary to protect [8].
7 Conclusion
The existence and implementations of corporate security
systems protects a company from potentially dangerous
activities. With the use of modern methods, technologies and
principles, security managers have a better understanding of
the challenges they face. This way, they can develop effec-
tive strategies for preventive and repressive actions in crisis
and emergency situations. With the raising awareness about
security, capital owners and top-managers understand that
through development and perfections of corporate security,
they can secure themselves a way to meet their financial and
strategic goals.
Crisis and emergency situations are a part of every-day
life, and with social development, their sources and phe-
nomenal chances increase, while the inability to prepare
results in human losses and great material damage. Because
of the complexity and of crisis situations and emergencies,
states have created methods to recognize vulnerability indi-
cators of infrastructures, define measures for risk decrease,
create recovery plans from crisis and emergency situations,
support sensitivity from private and public operators towards
the problem of critical infrastructure protection and develop
methods that support international cooperation.
In order to prevent its critical infrastructure, the European
Union changed many directives, signed laws and created
strategies that make it possible to prevent and repress in
times of a crisis or an emergency situation and prevent the
creation in the first place. The Republic of Serbia should
adopt the Critical Infrastructure Law in its process of joining
the EU, which would be adapted to the Directives
2008/114/ES. This would regulate an important sector which
today is still not adequately regulated.
References
1. Tomic, D., Mijalkovski, M., Maric, P.: National Security system.
PI PRESS, Pirot (2012)
2. Slobodan, A., Marina, S.: Importance and Role of Private Security
Within the National Security System. Faculty of political sciences,
Belgrade (2012)
3. Trivan, D.: Corporate Security. Protekta, Belgrade (2014)
4. Stojanovic, S.: Private Security Companies in Serbia—Friend or
Foe?. Center for civil and military relations, Belgrade (2008)
5. Tomic, D., Mijalkovski, M.: Security Management. Faculty of
engineering management, Belgrade (2015)
6. Jakovljevic, V.: Gacic Jasmina: Critical Infrastructure Protection in
Crisis Situations. Faculty of Security, Belgrade (2013)
7. Skero, M., Ateljevic, V.: Critical Infrastructure Protection and Basic
Adaptation Elements with the European Council 2008/ 114/ ES.
Bureau of European Integrations, Belgrade (2014)
8. Skero, M.: Serbian Security-Intelligence Agency (BIA), Vladimir
Ateljevic, Government of the Republic of Serbia, Bureau of
European Integrations Critical infrastructure protection and basic
adaptation elements with the European Council 2008/ 114/ ES
(2008)
420 D. Tomic and E. Saljic
The Value of Intelligent Cybersecurity
Strategies for Dubai Smart City
Khulood Ali Jumah AlJarman AlZaabi
Abstract
Cities all over the world are becoming increasingly
smarter, including Dubai Smart City. The Smart Cities
vision is to automate critical public services, make
improvements for community interaction, and achieve
significant levels of efficiency in a connected and
technology-driven society, such as in traffic control.
However, this has positioned Smart Cities to be a target of
compromised Cyber Security, which can potentially
undermine the information systems of local departments,
general security, law enforcement, and transport systems.
Dubai is a dynamic and emerging economy that has the
potential to become a major economic center of the
Middle East and North Africa (MENA) region owing to
its strength in strategic information. The main purpose of
this paper is to explore, evaluate, and discuss components
of overall strategic security, innovation, management, and
the development of Dubai in terms of Cyber Security.
This study also showcases conducted survey results based
on the Smart City Cyber Security program. Furthermore,
it demonstrates the current and future challenges faced by
Smart Cities from cyber-threats, including the develop-
ment of strategic security plans to defend against
sophisticated cyberattacks, and encourages citizens to
take responsibility and implement awareness of how to
proactively counter cyberattacks on Smart Cities. How-
ever, it is imperative to evaluate the strategies that are
required to prepare Dubai’s Electronic Security Center to
align with Dubai Vision 2021 in order for Dubai to be one
of the securest Smart Cities in terms of Cyber Security
around the globe. This research aims to argue that to
develop Dubai’s Electronic Security Center, strategies
should be a top priority for Dubai to ensure the security of
the Smart City and to diminish cybercrime in Dubai.
Keywords
Smart city Dubai smart city Dubai cyber security
strategies
1 Smart Sustainable Cities:
Concept and Goals
Cities such as Dubai, Singapore, San Diego, Barcelona, and
New York are gradually becoming smart and intelligent.
Smart Cities are cities run by technology where connected
networks monitor utilities, traffic, and waste management,
such as in the case of Smart Bins, which notifies the relevant
authorities when the need for emptying arises [1]. In Smart
Cities, everything is monitored using cameras and sensors,
making it simple for individuals to live a healthy, secure, and
fulfilled life [2]. According to the Singaporean 2014 census,
the urban population is growing and accounts for 54% of its
citizens, which also implies that the senior citizen population
is also increasing [2]. However, with a Smart City in place,
management of these individuals will be unproblematic
because there will be smooth coordination between the
health care system, water and food resources, and transport
networking systems, which will make it simple for residents
to live in the city [2].
According to Baharash Architecture [3], a smart city may
define as the destination where soft and infrastructural
developments are smoothly securely integrated together with
technology. The primary objective is making the networks
and services more intelligence and efficient while achieving
collaboration between the private and public sector. There-
fore, the entire smart city vision is creating a digitally and
collaborative system that improves the economic, environ-
mental and social sustainability of the city thereby enhancing
the quality of life of the people as well as protecting the
regions environmental base [3]. Furthermore, IOActive Labs
defines a Smart City as “a city that uses technology to
automate and improve city services, making citizens’lives
K. A. J. A. AlZaabi (&)
American University in the Emirates, Dubai,
United Arab Emirates
e-mail: kalzaabi6@gmail.com
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_49
421
better”[4]. Currently, the cities’worldwide adoption of
newly advanced technological systems has as its goal the
collection, processing and utilization of the data of its resi-
dents and its infrastructures [5]. This has resulted in cities
becoming smarter, which has enhanced the efficiency of
their public services for their citizens, permitting them to
optimize resources and even reduce the financial expendi-
tures of their cities [4]. Moreover, diverse Smart Cities have
invested a sizable budget to become smart, such as Dubai’s
intention to switch 1000 government services to become
smart. Saudi Arabia is investing around US$70 billion into
intelligent cities, and nearly $7.4 billion was invested in
South Africa for smart projects [4].
However, this increased their likelihood of becoming a
target of cybercriminal activities, which discloses their
information systems concerning local departments, general
security, schools, power plants, law enforcement, transport
systems, and hospitals [5]. Therefore, to safeguard infor-
mation from any unintended access or loss, many Smart
Cities are working toward enhancing their Cyber Security.
IOActive Labs conducted research to respond to current and
future cyberattacks targeting Smart Cities, and showcased
cyberthreat activities toward traffic control systems. The
results showed that the security posture of the Smart Cities’
infrastructure was threatened. Furthermore, IOActive Labs
generated a report encompassing all possible security vul-
nerabilities and their corresponding offensive Cyber Security
techniques, and forwarded it to the Computer Emergency
Response Teams (CERTs) and all vendor-related Smart
Cities software developers with the purpose of enhancing the
interconnected technology levels of security [4]. In addition,
a study conducted by the consulting firm Frost & Sullivan
estimated that more than $1 trillion is spent annually on
Cyber Security in different Smart Cities across the world. By
the year 2020, many cities in the world aspire to be as fully
advanced as modern Smart Cities [6], as seen in Fig. 1.
“When we see that the data that feeds Smart City systems
is blindly trusted and can be easily manipulated that the
systems can be easily hacked and there are security problems
everywhere—that is when Smart Cities become dumb
cities,”Mr. Cerrudo said [6].
A Smart City installs numerous cameras and sensors that
aid the government in monitoring everything, including
crowd movement, traffic, and even the cleanliness of public
spaces [7]. Further, in addition to tackling issues such as
waste collection, traffic management, and street lighting,
Smart City technology unites medical facilities, universities,
and Research and Development centers (R&D) to work with
the government in a holistic manner. This is to achieve better
living conditions as well as greater business opportunities for
the residents living in a Smart City [8]. However, the ben-
efits of the concept of a Smart City are also loaded with
challenges that may negatively affect or even destroy the
development of a city.
The technology of a Smart City such as those in Dubai
and Singapore promises to change the concept of the
“Internet-of-Things (IoT)”into “Internet-of-Everything”[1].
However, we are all aware of how devices such as Fitbits
Fig. 1 Global smart cities.
Source Frost and Sullivan [69]
422 K. A. J. A. AlZaabi
and Smart Meters (products of the IoT) have resulted in
information security issues and limited access standards for
both data security and wireless networks [2]. Given a Smart
City that has public transportation, public water systems,
waste management, power grids, street lighting, and physical
security, we expect an alarming rise in Cyber Security issues
[8]. Figure 2shows diverse forms of Smart Cities Services
around the globe.
With this in mind, it is important to consider how the IoT,
Smart Cities, Cyber Security, and cyberspace issues may end
up affecting worldwide Smart Cities [9]. The scope of this
paper is to explore, evaluate, and discuss components of
technological strategic security innovations, management,
and the development of Smart Cities. Furthermore, the
study’s foundation for Smart Cities is Smart City Cyber
Security (SCCS) in terms of their functionality, safety,
democracy, and livability.
2 Smart Cities: How IoT Technologies Are
Changing Urban Life, Challenges,
and Solutions
There is a plethora of related works conducted by
researchers that assess the significance of involving IoT
technologies within Smart Cities. This has caused a sky-
rocketing trend into researching urban life, with both posi-
tive and negative impacts. This section aims to analyze the
SCCS program in the context of other studies, and examines
the existing body of knowledge relating to Smart Cities,
challenges, and solutions.
According to [10], a Smart City is a kind of city that
integrates diverse modern technologies for efficient service
provisions and the enhancement of citizens’lifestyles. It has
become evident that by the year 2030, over 60% of the
world’s population will be living in urban centers. Therefore,
population growth in urban areas calls for advanced man-
agement frameworks and approaches that rely on informa-
tion technology systems and techniques, thereby smartening
the delivery of city-related services [10]. However, [11]
highlight that modern cities are deprived of critical elements
such as socioeconomic development and quality of life that
can easily be delivered by Smart Cities. Therefore, tech-
nologies applied in Smart Cities can fill gaps and help make
a city more sustainable, efficient, and livable [11]. Smart
Cities achieve all this by integrating the functionality of
critical infrastructures such as tunnels, communication
channels, roads, waterways, and communication power
supplies. Through this, Smart Cities ensure the maintenance
of activities and help to optimize available resources while
ensuring security [12].
To achieve this goal, [13] suggested that blockchain
technologies can be used in securing Smart Cities. By using
blockchain technologies, it becomes easy to integrate social,
physical, and business infrastructures in providing better
services and ensuring efficiency in utilizing available
resources [13]. Therefore, the adoption of cloud computing,
the IoT, and interconnected networks has made it possible
for Smart Cities to bridge the socioeconomic and
quality-of-life gaps that modern cities are currently facing
[14]. However, there is a need for interaction between
governments and local communities to achieve the ultimate
Fig. 2 Smart cities services.
Source Smartcitiesworld.net [70]
The Value of Intelligent Cybersecurity …423
goals of the Smart Environment, Smart People, and Smart
Living. Regardless of this technological advancement, Smart
Cities are at risk of becoming victims of cybercriminals.
Nevertheless, [15] suggest that risks or threats from
cyberattacks may be neutralized by investing in forensic
investigation processes. These will help protect Smart Cities
against any future incidents of cyberattacks [15]. In a similar
perspective, [16] recommend that urban management should
pay more attention to issues relating to the security and pro-
tection of information being transmitted using network pro-
tocols. By doing this, managers will achieve better designs and
protect users from any form of criminal manipulation. Dubai
has emerged as a digital city with its Dubai Cyber Strategy
plan, which aims to smart wire the entire Dubai area by the
year 2020 [16]. For this reason, [18] argues that cities must
have strategic security measures to ensure their smart net-
works and infrastructures are kept secure. Finally, [17] notes
that with the emerging IoT technologies, better architectural
infrastructure must be utilized to host the advanced tech-
nologies [17]. Therefore, by using the IoT, gaps in the quality
of life and socioeconomic challenges experienced by modern
cities will be solved by Smart Cities [18].
This paper complements existing research papers in
addressing the necessity of interconnected technologies to
ensure the continuity of sustainable Smart Cites, and there-
fore, the development of urban life around the globe.
However, these technologies pose extreme risks to Smart
Cities’safety and security that have been witnessed by
previous researchers. This resulted in the development of
strategic plans and solutions to thwart cyberthreats against
ever-evolving global Smart Cities. However, most of the
previous works focused on a global Smart City and did not
highlight a comprehensive SCCS program, which demon-
strates Dubai Electronic Security Center’s strategic plans in
making Dubai the securest city in the MENA region. Fur-
thermore, this study presents Dubai’s initiatives through
implementing diverse technologies including nanotechnol-
ogy to secure its sustainable Smart City. Additionally, the
author showcases various cyberthreats against Smart Cities
and illustrates Dubai’s smart laws toward enhancing the
Smart City’s level of security. Last, this study suggests
recommendations and develops awareness among the citi-
zens of a Smart City, as well as the companies that devel-
oped the Smart Cities’technologies.
3 Dubai Vision 2021: Unveiling Dubai
Electronic Security Center’s Cyber Security
Strategies Toward Dubai Smart City
As highlighted initially, UAE is making strong strides
towards achieving its mission and vision of creating the
smartest cities in the world. The high-tech infrastructure and
execution of diverse, smart initiatives in Dubai have already
laid a foundation for Dubai to become the world recogniz-
able smart city. According to Navigant, a global research
firm, execution of smart initiatives in Dubai has made it
possible for the city to near its vision of becoming a smart
city. Looking it from an Internet of Things perceptive, UAE
is one of the world’s best-prepared nations as far as cyber
security is concerned. According to United Nations Inter-
national Telecommunication Union, UAE ranks 17 out 105
countries. That has been made possible by the active
involvement of the UAE government in ensuring safe and
secure cyberspace. For example, the Dubai government
launched the Cyber Security Strategic plan that focused on
enhancing the protection of all governmental services.
According to Andrew Calthorpe, the Chief Executive of
UAE Smart City consultancy firm Condo Protego, as a smart
city and government services digitalized; expanded utiliza-
tion of Internet of Things is critical increasing the national
infrastructural risks. For example, in the year 2016, about 23
billion devices are connected to the networks; however,
prospects predict that by 2020, over 50 billion devices will
be connected. That implies that issues related to
cyber-attacks will transition from being disruptive to
destructive for hybrid clouds, critical national infrastructure,
and mobile devices. Therefore, Condo Protego suggests that
there is a need for strong and advanced solutions in threat
detention and responses that will offer future-proof services
and reliable cyber security solutions with easy to use anal-
ysis, full visibility, and actions that prevent cyber-attacks in
real time [19].
Dubai Smart City project was anchored in the vision of
His Highness Sheikh Mohammed bin Rashid Al Maktoum,
the Vice President and Prime Minister of the United Arab
Emirates and the Ruler of Dubai in 2013, to make Dubai the
happiest city on earth. The motive has been backed with
various initiatives like Information Communication Tech-
nologies [ICT] and the Internet of Things [IoT] to back the
implementation of new efficient and intelligent infrastruc-
tures and services. The initiative will focus on remodeling
the city into one of the smartest destinations on earth. The
foundation of this strategy based on three Ps “Public, Pri-
vate, Partnerships,”that drives a common game plan
between the public and private sectors while embracing a
greener circular economy. It is essential to look back to
understand how Dubai is implementing the smart city
strategy. To achieve this, it is critical to assess why Dubai
focuses on becoming a smart city and what it means to
Dubai and the world at large [3].
In the last few years, Dubai has adopted visionary and
extraordinary transformation. Looking back in history,
Dubai has evolved from a 10,000 desert-dwelling population
in the 1900s to a modern cosmopolitan city with over 2.7
million people. As a fast-growing urban center affected by
424 K. A. J. A. AlZaabi
numerous climate change conditions, local agencies have
faced by multiple challenges on how they can effectively
improve the quality of life of their citizens while reducing
their artificial impact on the natural environment. For a few
years now, United Arabs Emirates has ranked as one region
with the highest annual carbon dioxide emissions index per
capita [3]. While considering this, Dubai becoming a smart
and sustainable city is no longer a choice, but a necessity for
local agencies. That confirms the primary reason why Dubai
has an ambitious plan of evolving into the most sustainable
and smartest city in the world.
Additionally, the United Arab Emirates is projecting to
welcome over 45 million people by 2021. Out of the 45
million people, 31 million will are expected to be inter-
national tourists. Therefore, these economic facts checks
have also contributed to the acceleration of plans and
developments aimed at generating smart projects that will
push innovative designs that effectively push boundaries
within the built Dubai’s economy. For example, other than
the Expo 2020, there are other plans such as a new
ultra-fast hyperloop train that move from Dubai to Abu
Dhabi in less than 12 min and with a capability of reaching
a top speed of over 750 mph and Oasis Eco Resort as
showninFig.3. This foundation will also lay down the
strategy of launching the world’s greenest eco-resort in the
region [3].
However, while because Dubai ranked 65th position in
the IESE Cities in Motion Index 2016, then, it appears that
Dubai as a city has much work to do to achieve smart city
recognition. Following this, the Dubai Smart City project
aimed at achieving this initiative as interlinked with the
World Expo themes. As per now, Dubai is preparing for the
Expo 2020 having obtained the bid in 2013 under the theme
of “connected minds-creating the future.”Looking deep into
this theme, Opportunity, Mobility and Sustainability appears
like some of the sub-themes that tied to the bid and which
will make Dubai become the first city in South Asia, North
Africa, and Middle East region to successfully host the
World Expo [34,37,38,40]. Therefore, with the vision for
2020 Expo approaching, then, Dubai as a city is involved in
an intense race of becoming the smartest city. Having
understood this, it is now essential to review what makes a
smart [3].
As per the year, 2016 IESE Cities in Motion Index, New
York City appeared as the smartest city in the world.
Therefore, while taking New York as a benchmark, below
diagram (Fig. 4) proves the journey and improvements that
Dubai must undertake to take up the position as the most
innovative and smart city.
The exploration proves that the success of New York as a
smart city is as a result of coordination, partnerships, and
commitment between various departments both from the
public and private entities. Additionally, the people-centered
approach and effective collaboration amplify the success
even higher. In this exposure, Dubai learns the need to
include government and private departments in finding sus-
tainable solutions to the 21st century challenges facing the
region. Therefore, government agencies must create an
environment where different stakeholders can explore new
opportunities and effectively deliver technologies and ser-
vices aimed at creating smart environments for smart people.
From the 2016 exposure, Dubai managed to create seven
strategies that will pave the way for becoming the smartest
and most innovative city in the region. These strategies
include Smart Living, Smart Governance, Smart People, and
Smart ICT infrastructure, Smart Economy, Smart Mobility
and Smart Environment. Achievement of these strategies
based on smart city initiatives that are underway in Dubai [3].
Dubai Smart City emerged as a leading partner not only
in technological innovation but also in the design and
development of infrastructure and strategic security [20].
The Cyber Security strategy for Dubai Smart City was
Fig. 3 Examples of dubai projects in 2020. Source [3]
The Value of Intelligent Cybersecurity …425
launched by the United Arab Emirates’Vice President and
P.M., Sheikh Mohammed bin Rashid Al Maktoum [21].
Dubai’s Smart City plan has four critical strategic pillars
that act as the guide for every smart initiative. The pillars
include; efficiency, seamless, safe and impactful. Efficiency
achieved through optimized utilization of city’s resources.
Seamless considers the provision of integrated day to day
services that are convenient and easy for everyone to use. On
safe, it focuses on applying carefully evaluated risk man-
agement with the focus on protecting information and the
people. The impactful pillar aims to provide effective solu-
tions that enrich the lives of residents, businesses, and vis-
itors. Therefore, these pillars create the foundation that will
help in guiding the smart city project. They confirm how
well the entire project well managed as they based on global
leading research and practices [22].
The Dubai Electronic Security Center (DESC) will deal
with any electronic security threats, forms of cybercrimes,
and potential cyberattacks. The center focuses on making
Dubai the safest digital city in the world. Additionally, the
center works with all government agencies to ensure that the
Emirates enjoy an upgraded level of electronic security [20].
Furthermore, it focuses on making sure that precautionary
measures are put in place and that information security
systems are created and maintained in line with international
standards [23]. Therefore, this paper will focus on exploring
how the Cyber Security strategy will maintain Dubai’s Smart
City and informational security. Additionally, through
societal awareness, Dubai Electronic Security Center ensures
that compliance with laws and regulations is applied to all
cyberspace missions to enhance the cybersecurity of the
entire region. All strategic plans include establishing initia-
tives to combat cyberattacks, cybercrime, and threats [21].
Preparations for Dubai Vision 2021 have involved
research with a focus on developing, modifying, and using
technology in enhancing electronic security. Furthermore, it
has created an infrastructure to protect government infor-
mation, information systems, and telecommunication net-
works in Dubai with a focus on achieving a fair and secure
environment by the year 2021. Finally, it has strategic plans
to create a safe cyberspace that ensures the secure exchange
of data and information through the use of electronic media.
In conclusion, Dubai Electronic Security Center hosts the
work of the Dubai Cyber Security Strategy and ensures that
every smart infrastructure in the region is protected, data
exchange is secure, and that hackers have no opportunity to
infiltrate the networks.
Sheikh Mohammed bin Rashid Al Maktoum launched the
Dubai Cyber Security Strategy with the aim of strengthening
the city’s infrastructure in innovation, security, and safety
[24]. It aims to offer protection under the integrated pro-
tection against all dangers related to cyberspace. Further-
more, it aims to support innovations in Dubai’s cyberspace
and lay a foundation for good economic growth and pros-
perity in the region. Rather than protecting cyberspace, the
strategy plans to bring together both the private and gov-
ernment sectors in ensuring that a secure cyberspace is
maintained within the Dubai digital world [25]. From a
managerial perspective, the plan incorporates different
stakeholders who ensure that low chances of cyberattacks
will be experienced in Dubai’s Smart City [12].
Dubai Electronic Security Center created a platform for
implementing the Dubai Cyber Security Strategy. This
foundation aims at creating a uniting factor for individuals,
private institutions, and governments in providing a secure
cyberspace. Through this collaboration, Dubai Electronic
Security Center lays an infrastructure for protecting Dubai
from Cyber-Security-related risks and improving the econ-
omy and innovations in the region [21].
The core components of the strategic plan are dedicated
to making Dubai the most secure city in the region and to
create a smart, integrated, and connected Smart City [26]. In
its implementation, the Dubai Cyber Security Strategy car-
ries with it five main domains. With these domains, Dubai
will stand as a leader in safety, security, and innovation, both
in infrastructure and technology (See Fig. 5).
•Cyber Smart Nation: In this domain, the strategy
focuses on raising public awareness of the importance of
having a secure cyberspace and an understanding of the
significance of Cyber Security within Dubai’s Smart City
[27]. Furthermore, it will involve the development of
capabilities and skills that will be required in managing
Fig. 4 IESE smart city dimensions. Source [3]
426 K. A. J. A. AlZaabi
risk among private institutions, governments, and indi-
viduals in Dubai [27,28]. It ensures a strong system is
built, and that society is made aware of all available
dangers of cybercrime and how they may protect them-
selves [18]. This includes the use of antiviruses in
phones, using strong passwords for their Wi-Fi connec-
tions, and proper configuration of devices such as baby
cameras, security systems, Smart TVs, or smartphones.
Mohammed Bin Rashid academy of scientists focused on
creating an expert scientific community of diverse sci-
entific disciplines. With the acquired knowledge, they
will easily explore the developmental needs of scientific
and technological fields for smart future of the United
Arabs Emirates. Therefore, availability of such programs
enhances the role of scientists in the UAE’s 50th
Development Process thereby paving the way for the
smooth transition into the smart city environments [29].
•Innovation: This domain focuses on increasing scientific
research in fields related to networks and the electronic
security field. It purposes to establish a free, fair, and
secure innovative cyberspace for all people in Dubai [4].
In a nutshell, it will create an innovative cyberspace for
all people in the UAE that is secure and free for all [30].
A cyberspace is defined as an environment where com-
munication occurs between computers over a network.
Financial institutions, corporations, governments, hospi-
tals, businesses, and military camps collect, process,
analyze, and store their confidential information on
computers that communicate through cyberspace, made
possible by computer networking [31]. Therefore, the
Smart Nation Program must pay more attention to Cyber
Security and cyberspace protection owing to increased
issues of sophisticated cyberattacks [8].
•Cyber Security: This domain focuses on protecting
individuals’confidentiality, availability, and credibility.
This will then be boosted by the privacy of personal data
[32]. As a result of this innovation, individual transac-
tions will be very secure, and fears of hacking, phishing,
or even data theft [33] will be eliminated when sharing
information online. Naturally, data compromised by
hackers, network outages, and computer malware and
viruses are some of the incidents that affect an individual
who has one or more online accounts, which include
email. In the current world of digital applications, mobile
use, data networks, and Smart Cities, issues of cyber
insecurity will continue to increase. Therefore, there is a
need for growth in the number of professionals working
toward protecting individuals online [2]. This is Cyber
Security. Cyber Security is security related to information
technology and focuses on securing each network and
safeguarding computers, data, and programs from unau-
thorized destruction, access, or alteration. From a Smart
Cites’point of view, Cyber Security is a vital issue that
must be considered by the Smart Nation Program.
•Cyber Resilience: Domain four is aimed at maintaining the
flexibility of Dubai’s cyberspace while ensuring the avail-
ability and ensuring the continuity and availability of inno-
vative information technology systems in case cyberattacks
are experienced [21]. Additionally, it will be involved in
exchanging information and supporting the management of
events related to Cyber Security. Finally, it will advance
mechanisms to combat any cyber-related threats [21].
Fig. 5 Dubai cyber security
strategy. Source [25]
The Value of Intelligent Cybersecurity …427
•National and International Collaboration: The core
purpose of this domain is to establish and nurture local
and internal partnerships that are aimed at consolidating
cooperation frameworks with diverse sectors at both the
local and global levels to confront the threats and risks
available in cyberspace [33]. Therefore, the strategic plan
is not only aimed at creating a safe cyberspace but also in
ensuring that users and international partners are
involved in ensuring the safety of the information and
infrastructures hosted in the Smart City [34].
4 A Look into Dubai’s Initiatives for a Secure
Sustainable Smart City
Even though Smart Cities offer significant conveniences for
their citizens, the interconnected technologies that enable
these cities might cause physical damage to the infrastruc-
ture and loss of human life [35].
Dubai Smart City is at the forefront of sustainability and
is considered a future city. As a Smart City, Dubai Smart
City falls under six broad categories: smart living, smart
governance, smart people, smart economy, smart mobility,
and smart environment [21], as shown in Fig. 6.
In making Dubai Smart City a future city, technologies
such as Smart Transport Roadmaps, the Dubai Now Plat-
form (the one-stop shop where citizens can access govern-
mental services), the Happiness Meter, and Clean Energy
Strategies 2050 ensure the development of the infrastructure
and the population as a whole [36]. See Fig. 7.
•Happiness Meter: One major focus of Dubai is
becoming the happiest city globally. This initiative
created by his Highness Sheikh Mohammed bin Rashid
Al Maktoum. The core strategy is implementing Happi-
ness Meters on all government applications, electronic
devices, and websites used in diverse government enti-
ties. The happiness meter focuses on measuring people’s
happiness on a daily basis. It will then evaluate how
satisfied people based on the services rendered by both
the private and governmental sectors. The primary focus
of this initiative is improving the happiness of all resi-
dents, employees, and visitors by both the environment
and services offered to them. About the year 2016, the
UAE was ranked 23rd globally as per the United
Nation’s World Happiness Report. Therefore, by the year
2020, Dubai focuses on becoming the happiness known
city on earth [3].
•The Smart District Guidelines: Dubai has generated the
Smart District guidelines that aimed to educate various
stakeholders such as developers and architects on how to
embrace the smart city initiatives within the designs to
ensure smooth flow of the entire project development. By
doing this, the guidelines ensure that ownership of pro-
posals granted to every district and which will have
unique districts needs and achievements [3].
•Smart Dubai Index: The collaboration of Dubai Statistic
Centre and the International Telecommunication Union
has enabled fast development of unique smarty city’s key
performance indicators (KPIs). The core aim of the per-
formance indicators is assessing and evaluating how
different facilities and services are doing. Also, the key
performance indicator will help the government in mea-
suring how their progress is pushing towards achieving
the smart city goals [3].
•Dubai Data: The collaboration between different stake-
holders is critical in achieving smart city objectives.
Fig. 6 Six strategic categories of
the dubai smart city. Source [47]
428 K. A. J. A. AlZaabi
Therefore, the Dubai Data initiative created with the aim
of enhancing information sharing between various gov-
ernmental agencies, city planners, business owners and
residents. With this platform, sharing data will be simple
between different stakeholders hence improving the
entire quality of life of residents. One reliable indicator of
this Dubai Data strategy is that once it launched, it
labeled as the global most comprehensive and ambitious
data initiative. With the similar determination of
achieving the smart goal objectives, then, the ability to
achieve the objectives are valid [3].
•Smart Dubai Platforms: The Smart Dubai Platform will
provide real-time analytics tools for the private sector,
tourists, private sectors and governmental entities. In this,
every individual will require and username and password
to access the platform. For the residents, it will tie to the
Emirates ID making it simple for residents to access
hundreds of smart city services from the platform. For
example, under this platform, it will be simple for resi-
dents to assess their energy consumption, waste man-
agement or waste usage. On the other hand, a tourist can
simply find the most efficient transport options to use.
Finally, a parent accesses merely the most cost-effective
information for their children. In this, the platform will
bring information closer to the people thereby improving
the quality of their life [3].
•Dubai Blockchain: Dubai’s Blockchain aimed at offer-
ing the smoothest, secure and safest information
exchange pathway. The entire service provision will
digitalize where over 100 million government documents
would be accessed online. According to experts, this
move will save over 144 metric tons of carbon dioxide
emissions annually. Furthermore, it will ensure a redis-
tribution of up to 25.1 million houses of the economic
productivity in the region thereby saving over 5.5 billion
of Dirhams annually [37].
The Dubai Blockchain strategy created the roadmap for
effective introduction of the Blockchain technologies for
Dubai and helped in the creation of an open platform that
enables easy sharing of technologies with different cities
across the globe. According to Smart Dubai reports, the
Blockchain strategy created on three pillars of governmental
efficiency, the industry creation and finally international
leadership. The first pillar which is government efficiency
focused on increasing governmental efficiency by trans-
forming service provision into paperless digital layers for all
city-based transaction as well as supporting the Smart Dubai
initiatives both in public and private sector. In this, it means
that required documentation such as license renewals, visa
applications and bill payments which account for over 100
million documents annually will do digitally. Experts
believe that the move will save up to 114 MTons Carbon
dioxide emissions from trip reductions and eventual redis-
tribution of over 25.1 million hours of UAE economic
productivity in the saved document processing time [37].
Industry creation holds position as the next important pillar
that will enable citizens and partners in creating new busi-
nesses using the provided technologies. That implies that the
Blockchain will provide a platform for the creation of thou-
sands of business opportunities within the private sector.
Some of the industries that will directly benefitfromthis
Fig. 7 Six dubai smart city
initiatives. Source [3]
The Value of Intelligent Cybersecurity …429
move include the banking sector, digital commerce, tourism,
FinTech, urban planning, transportation and smart energy.
The third pillar explores the International leadership pillar that
opens up the Blockchain for international counterparts to
effectively enhance the security, safety, and convenience for
the foreign visitors and travelers to Dubai. For example,
international travelers will enjoy faster entry with
pre-approved passport, easy mobility within the city and
enhanced security clearance and visas. Furthermore, they will
enjoy guaranteed wireless connectivity, pre-authenticated
temporary digital wallets, and payments. In so doing, better
Global Trust Network ties with partners from North America,
Europe, and Asia will be achieved [37].
It is crucial to pinpoint that the Dubai Blockchain strategy
executed by a partnership between the Dubai Future Foun-
dation under the leadership of his Highness Sheikh
Mohammed bin Rashid Al Maktoum. This foundation paves
the way for the much-needed collaboration between the
public [42 governmental entities] and private sectors in
creating the best working environment for application of
Blockchain technologies [37].
5 A Look into IoT, Machine Learning
and Artificial Intelligence
Next section introduces the IoT, Machine Learning and
Artificial Intelligence, Nanotechnology, and Open and Big
Data Analytics concepts that are associated with the global
Smart Cities’Cyber Security Program.
•Internet-of-Things: Currently, the IoT has scaled up a
notch, introducing us to Smart Cities. The IoT is described
as an era in which networking or the Internet touches
issues such as health facilities, energy grids, manufac-
turing, financial institutions, and educational establish-
ments such as universities, research and development
centers, and transportation facilities [1], as shown in
Fig. 8. The IoTs connect devices over the web, giving
them an opportunity to communicate with each other and
finally help humans to solve issues [9]. All citizens from
next-generation smart cities will have unlimited access to
affordable internet infrastructure wired and wireless net-
works. Additionally, any device that can transfer data
over the provider networks will label as an Internet of
Things component which will, directly and indirectly,
improve the lifestyle of Dubai residents. For example,
traffic lights, vehicles, bridges, parking structures and
entire transport system will embed with an intelligent
control system allowing secure communication and
coordination. In doing this, the transport system will
become smart, safer, secure and efficient. Smart Meters
are for energy conservation and remote power controls,
and Smart Fridges inform us when a certain item needs to
be replenished. The same will apply to energy, waste
management, and water supply [38]. In Dubai, the
Smart City will take this human-tech relationship to a
higher level.
In achieving this, Oasis Eco Resort will have to get
embedded with sensors that will offer real-time infor-
mation to users. Internet of Things will directly impact on
the sustainability of every infrastructure in the region.
For example, temperature and lighting will be controlled
automatically based on various variables. Some of the
variables to be considered include smoke, moisture
levels, room temperatures, noise or even presence of
Fig. 8 Overview on IoT
architecture including different
application areas. Source
Intechopen.com [72]
430 K. A. J. A. AlZaabi
smoke or fire. The sensors will detect any change from
the norm hence increasing operational safety, security
and efficiency. For example, building management may
update with real data on energy consumption, waste
collection, and water usage. By providing this informa-
tion, it will maximize the efficiency of services at the
right time. Therefore, adoption of Internet of Things will
work in reducing errors, increasing efficiency of services
as well as improving delivery of services in real-time.
However, despite all these benefits, the major problem
that is potentially available is using internet of things to
make cities resilient.
•Machine Learning and Artificial Intelligence:In
making Dubai Smart City a city of the future, the tech-
nologies of machine learning and artificial intelligence
are continuously being used. With machine learning, the
technological devices used in the city can effortlessly
inform the meaning of the data or what the documents
imply. For example, technologies can easily scan photos
or take photos, automatically read faces and eyes, and
reveal the identity of a specific person based on the
biodata that is hosted by governmental agencies [21].
Furthermore, Smart Cities will use robots at some points
to perform duties that humans cannot successfully
accomplish. For instance, robots will be used at the
one-stop government shop. This will ensure that no
human errors are experienced during transactions [39].
On the other hand, artificial intelligence will identify
situations where the population needs changes and will
assist in defining how the changes will be implemented.
For instance, it may bring about technological innova-
tions that utilize individual data to suggest services (en-
ergy, health, or financial) that a specific UAE citizen
requires to live a fulfilled life [28]. Figure 9showcases
how artificial intelligence intersects with a Smart City.
The smart Dubai city will have a well-crafted roadmap
for artificial intelligence. According to HE Dr. Aisha Bint
Butti Bin Bishr, the director of Smart Dubai office, arti-
ficial intelligence will boost Dubai to the smartest and
happiest city in the world as it will directly contribute in
creating artificial intelligence that is critical in acceler-
ating the region’s growth. The result of these technolo-
gies and artificial intelligence is making Dubai safe,
seamless and efficient and impactful in the lives and
experiences of the people [40].
•Nanotechnology: The role of Dubai Electronic Security
Center in implementing strategic Cyber Security is
focused on ensuring that all UAE citizens are secure and
safe [18]. First, the center ensures that cyberspace is
created where individuals can easily share information,
conduct business online, and perform their errands
without fear of loss or theft of information. On the other
hand, the center has promoted the adoption of tech-
nologies such as nanotechnology, which involves the
Fig. 9 Artificial intelligence intersects with smart cities. Source Frankdiana.net [73]
The Value of Intelligent Cybersecurity …431
utilization of science, engineering, and technology in
very small sizes of about one to a hundred nanometers
[41]. These technologies can detect fire accidents at the
early stages. Nanotechnology plates used in Dubai Smart
City infrastructures are automatically activated when
temperatures rise, and they then release gases that are
capable of extinguishing fires [20]. Therefore, on the
issue of protection, nanotechnologies have made it pos-
sible for Smart City users to have assured security [42].
•Open and Big Data Analytics: Open and Big Data ana-
lytics will make it simple for Dubai Smart City to emerge as
a sustainable and future model city. For instance, with
Radio-Frequency Identification (RFID) tags installed in
each car, innovative technologies will be able to measure
and regulate vehicle traffic. The RFID tags will then send
the geolocation of all cars and devices in traffic to the
central monitoring unit, where traffic is easily monitored
and controlled. Similarly, through the use of the IoT,
devices such as Smartphones, Smart Televisions, and
Smart Offices can easily understand the needs of every
region within the United Arab Emirates [21].
In a Dubai Smart City, effective garbage collection will
be accomplished courtesy of open and big data generated by
users. For instance, before putting the garbage into the bin,
every resident will be required to press a button on the bin.
This button tallies the number of users per day. With this,
city planners, surveyors, and architects can understand the
needs of each region and the sustainable systems that can be
installed to ensure environmental safety.
Additionally, children will be required to wear bracelets
that have sensors. This will help parents to track where their
young ones are at specific times. This will also work in
controlling the energy grid and consumption rates of each
family [43]. For instance, the areas that are scantly populated
may have some street lights switched off. By doing this,
more energy will be saved [20]. (See Fig. 10).
Analyzing the exact amount of resources and services
consumed in real-time is one capability that next generation
of smart cities should have to have a better understanding the
precise amount of energy, waste, and water consumed in the
city. With such information, it will be easy to manage the
efficiency and use of resources and services. Additionally, it
will provide a good environment for evaluating the amount
of resources and services required based on the trends that
the trends and demands of services by the populations.
Therefore, availability of these data ensures that the cities
transform into resilient cities [3].
Therefore, from smart cars, intelligent location applica-
tions and public Wi-Fi are some of the examples that the
United Arab Emirates is striving it abilities and boundaries
of technologies in achieving smart city. Focusing on tree
technologies, it is critical highlighting that ever since the
Bedouins days, date palm has remained a constant source of
nourishment and refuge in the emirates desert climate. With
the modern iteration of the traditional date palm,
phone-charging and Wi-Fi emitting has given forth to a
prospective Smart Palm. The impressive-looking artificial
trees stand six meters and using solar energy in providing
Wi-Fi hotspots and charging spots for phones and other
electronic gadgets. Additional information offered by the
technology tree includes weather. These innovations have
given room for Kite Beach and Smart Palms, and Zabeel
Park has provided more innovative spaces for everyone in
need [44].
Regardless of its cutting-edge technologies, Dubai is one
tricky city to navigate as many of the neighborhoods lack
the traditional stress address system. However, this year,
Fig. 10 Smarter cities: turning
big data into insight. Source
IBM.com [74]
432 K. A. J. A. AlZaabi
an innovative Makani Dubai system was introduced where
every building has a unique number that can use in locating
rough areas and locations in the city. The Makani system
works best with an integrated application that is supported by
GPS navigator, Garmin and which allows all users to locate
any location by foot, private care or public transport. Addi-
tionally, there are a number of applications for all users and
visitors to Dubai. For example, the Dubai Tourism applica-
tion provides a very comprehensive guide on different things
and locations in the city such as entertainment listing,
restaurants, and landmarks. Additionally, malls such as
Dubai Marina Mall, Dubai Mall and the Mall of the Emirates
have their apps that can help visitors to help their clients in
exploring shopping and product offerings available [44].
In relations to creating happiness of the citizens and their
visitors, transitioning into a sustainable transportation model
remains a critical pillar. According to the International
Energy Agency, transport sector accounts for about 23% of
the total global greenhouse gases emissions [38]. Therefore,
a sustainable transport system can contribute to the promo-
tion of the three pillars of sustainable development: eco-
nomic, environmental and social. Thus, the shift to smart
cities remains a perfect solution to overcoming all challenges
faced while the country is growing. That is because; it will
increase the efficiency and the safety of the public transport
networks. Furthermore, it will create environmental-friendly
vehicles that will help people in planning their trips and
consumption patterns through the Dubai open data platforms
[26]. Therefore, with the availability of this data, it will
become easy for individuals and governments to increase
their transport effectiveness. In Dubai, the Dubai Strategy for
Self-Driving Smart Transport strives to convert over 25% of
the total number of trips into driverless trips by the year
2030. The pilot project for smart vehicles that can carry up to
10 passengers is already underway. Through reliance on the
integrated platform, all stakeholders including developers,
investors and government will benefit from ample informa-
tion that is critical in improving the efficiency of the Dubai
smart city performance. When this transformation is hap-
pening, a report by Cisco highlights that adoption of Internet
of Things will provide a massive number of job opportuni-
ties in cities (valued at Dh 17.9 billion) by the year 2020. For
example, over 1 million coders and over $1 million offer
opportunities will create courtesy of Smart City Dubai [19].
About the Dubai Plan 2021, the city will be smart, integrated
and connected efficiently making it a preferred living,
working and visiting place for most people globally [26].
The Dubai International Financial Centre in collaboration
with a global consulting firm Accenture has created a new
FinTech accelerator program aimed at offering mentorship
programs for startup entrepreneurs in support of innovative
tech developments. One of the core aims of the program is
transforming Dubai International Financial Centre into a
globally recognized FinTech hub. As per now, it is home to
numerous applications such as mobile payment providers
such as Beam Wallet, Careem the Uber-like local app and
the online shopping application on Souq.com [45].
In similar scale, NEDAA, a Dubai-government owned
Telecommunication Company is also planning to utilize the
already laid internet of things ecosystem in getting a col-
laborative working partnership with Nokia. As stated by
Gaurav Dhar, the owner of Marshal Equipment and Trading,
“Dubai carries on the ability to remain the technological hub
for multiple levels needs and which makes it possible for it
to give Singapore, New York, and London a hard time when
it comes to tech innovation and competitiveness”[45].
As innovation advances, the Roads and Transport
Authority promises that Dubai motorists will not be waiting
for long at the signals as the authority will introduce smart
pedestrian signals that ensure safety while crossing roads.
These smart applications are in line with RTA’s vision for
safe and smooth transport for all in Dubai [45]. The smart
signals are already in use in Al Saada St and aimed at
reducing the waiting time at the pavements. In so doing, it
reduced the amount of time required for the vehicles to pass.
All the traffic signals are sensor-based smart systems that
controlled through an optical ground system and which work
in modifying the crossing paths and the traffic signals. By
doing this, it ensures safer road use by all individuals [22].
The United Arab Emirates generates one of the region’s
largest amounts of electronic water with each resident pro-
ducing about 17.2 kg of e-waste yearly. Following this, to
meet the ever-growing e-waste recycling demands, UAE
focuses on developing the smartest e-waste bib by the year
2020. The e-bin will be a smart mobile-based electronic
recycling technology that focuses on improving the effi-
ciency of e-waste recycling. The bin will have a
touch-screen technology making it simple for the recycling
company and the user to communicate with it effectively.
For example, the bin will be in a position of notifying the
user on whether it is full and the next possible empty e-bin in
the area. In the same way, it will notify the company to come
collect the already fetched waste. This technology will fully
rely on solar energy and which will make the entire project
an environmentally friendly approach to smartness [45].
As a city, Dubai seeks to uniquely distinguish itself as a
global leader in delivering smart living and smart economic
opportunities for all. For instance, from an economic
dimension, it provides the business community with smooth
access to both the East and West through a well innovative
infrastructure. Smart Logics exemplifies the economic
infrastructure within the Dubai Seaports, and the air was
thereby helping in driving the global competitiveness. On
the other hand, the international exposure to smart tourism
and MICE departments create impactful experiences for
Dubai destined visitors. That is all focused on achieving a
The Value of Intelligent Cybersecurity …433
developmental and smart infrastructure that can service the
over 50 million visitors by the year 2020 [45].
About smart living, Dubai strives to maintain exceptional
cultural, vibrant lifestyle and quality of life a safe and secure
environment. That has modeled on Mohammed bin Rashid’s
unique model of government that strives to bring smart
services to the users. For example, the launch of The Dubai
Government Excellence Program (DGEP) 20 years ago
creates the best customer service experience in the city. With
this, smart homes, connected neighborhoods will become a
norm in Dubai [45].
6 Current and Future Challenges Linked
with Smart Cities’Technologies
The Smart Nation Program will have double or triple the
advantages of having well-performing cities. Smart Cities
are now dependent on smart technologies for all of their
responsibilities, with everything integrated into the IoT and
ICT technologies for easy control and regulation [26].
A Smart City encompasses four main components: Smart
Vehicles, Smart Grids, unmanned aerial vehicles, and smart
service provision and automation systems [20] including
street lights and traffic control systems, public transport,
parking application systems, and water and energy man-
agement systems [46]. However, Smart Cities come with
their own security problems, which will make it challenging
to maintain and control the capabilities of the system.
According to [11], there is a need to look at all external
factors (social, management, legal, technology, sustainabil-
ity, and economic) that can influence Smart Cities and their
implementation. Therefore, while looking at this, the first
challenge that is currently affecting populations is linked to
information protection and safety during the exchange. This
is a result of increased incidences of hacking and phishing of
networks [47].
By adopting smart environments, smart transport sys-
tems, smart e-health, smart education, and smart service
provisions, the absence of human operators or intervention is
expected. However, owing to the high number of connec-
tions in the network, a small cascading error caused by
viruses or malware infiltrated into the systems by users may
result in a massive loss of data and information [10]. It is
important to highlight that owing to the high number of
connection networks, there are increased chances that one
virus from a smartphone may slowly get into other major
systems such as banking structures [21]. Therefore, con-
trolling the massive automated infrastructure becomes a
significant challenge.
In the current world, there is an increased growth in cyber
activists. Therefore, the Smart City platform provides them
with an enabling ground where they can quickly launch
attacks from simple infrastructures such as home cameras on
massive targets such as a Smart City’s energy grid, garbage
collection systems, or health provision systems [26]. In the
modern world, smart cities are suffering from simple mal-
ware and worms such as Ransomware, but in the future,
there are increased chances of backdoors that will infiltrate
the system and ultimately break down the network provision
channels [13]. If the data is altered, service providers will
never be the same again. Smart vehicles will begin having
unprecedented accidents, energy access will become a sig-
nificant challenge, accessing healthcare providers will be a
problem, and eventually, control of important capabilities
such as air conditioning systems will break down [45].
Therefore, manipulation of data through network jamming
will be a major concern and challenge in the future.
Additionally, one of the major security issues of Smart
Cites is that sensors in different equipment and devices
around the city may be hacked and fed with fake and
malicious data [7]. This could result in signal failures, data
theft, system shutdowns (governmental, healthcare, and
transport management), the contamination of the water
supply, and security breaches [48]. According to computer
security experts, the wireless sensors that are integrated with
Smart Cities might lead cybercriminals to fully control the
Smart Cities’infrastructure including traffic lights and water
management. Furthermore, Cesar Cerrudo, an Argentine
security researcher and chief technology officer at IOActive
Labs, [4] showcased how easy it is to hack 200,000 traffic
control sensors that are integrated within critical hubs such
as Washington, New York, New Jersey, San Francisco,
Seattle, Lyon, and Melbourne by intercepting these sensors
from 1500 feet away using drones [4]. He also exposed how
the companies’failure in implementing encryption within
this traffic had allowed the problem to occur. In addition, for
the past year, security researchers at the Black Hat Europe
Conference in Amsterdam showed the effortlessness of
manipulating smart meters and power line communication
technology through exploiting encryption issues, which
causes blackouts in parts of Smart Cites. In 2014, the
Department of Homeland Security reported that “a sophis-
ticated threat actor”had guessed the interconnected system’s
password, which caused damage to the control system net-
work at a public utility [6].
Furthermore, in 2014, hackers were reported to have
compromised over 100,000 Smart TVs, refrigerator units,
and many other household appliances. Another case was
witnessed with the Linux worm known as “Linux.Darlloz,”
which could hijack numerous home appliances such as
routers, set-top boxes, and security cameras [49]. Therefore,
many IoT devices, desktop computers, and mobile devices
are susceptible to being attacked by cybercriminals. There
have been many cases of hackers influencing the direction of
a vehicle, redirecting money to different accounts, and
434 K. A. J. A. AlZaabi
interfering with program proceedings over mass media. This
has also affected the functionality and stability of many
Smart Cities. The motivation behind conducting an SCCS is
1 to assess the knowledge level, including the attitudes of the
residents, on the recommended Smart City precautions in
terms of Cyber Security; 2. to evaluate the role of different
governmental agencies in ensuring SCCS; and 3. to analyze
the challenges associated with Smart Cities and how well the
involved parties can lower the risks of cyberattacks. It is
important to note that the smarter a city is, the higher the
number of computers and computer systems are used. More
computers require more network integration between sys-
tems, which creates a wider “open”space where data col-
lected by the systems can be accessed.
Smart Cities will have thousands of interconnected
tech-based devices. Now, cybercriminals can create and use
self-propagating malware, the alternatives of which have been
known to multiply across several connected networks. Crim-
inals can use these “worms”to easily acquire commodified
information while taking control of major systems. Thus,
countries are now responsible for making their cities smart; for
this, they should invest in their human resource development
with the intention of developing and improving their skills in
the complex nature of IT systems. The Cyber Security skill
sets related to Information Technology (IT) and Operational
Technology (OT) are highly crucial to be developed to secure
all smart-technology-based tools and systems [50]. Having
analyzed the benefits and risks of Smart Cities, this paper will
argue how people’s attitudes toward the new technology will
determine the security or insecurity of the people living in a
city. Many people are not concerned about Cyber Security and
are unaware of the dangers of living in a Smart City that
encompasses interconnected devices. This is one attitude that
gives cyber insecurity an opportunity to grow, while
camouflaging itself with technological innovations. Figure 11
showcases five challenges in building a Smart City.
In the future, billions of devices will be placed in the
network. Which means that the devices will be involved in
continuous communication and will listen to each other.
With this in mind, the issues of user privacy and trans-
parency come into play [15]. Additionally, all homeowners
will perceive the use of smart cities and devices as the norm;
therefore, they will not mind the control of security threats
[10]. Therefore, their personal information such as addres-
ses, credit card data, emails, or confidential information will
be fished from the networks and used by hackers to com-
promise their lives [51]. This means that as technological
innovation matures, the current challenges facing smart
cities will enlarge in scale and will eventually affect a large
number of infrastructure and automation systems upon
which the population depends [52].
The United Arab Emirates’government has ensured that
Dubai Smart City adopts the sustainability and future of
smart cities globally. Therefore, this section posits that
promoting a rapport between the government and the pop-
ulation will ensure the success of the Dubai Smart City. By
empowering the citizens with information, it will be simple
for the region to provide a safe, fair, and secure cyberspace.
This study argues that through the adoption of technologies
such as nanotechnology, the IoT, and the utilization of big
data, the region will enjoy the safest and most secure
cyberspace for smart living, smart transactions, smart envi-
ronment, and smart services.
Therefore, this section will craft questions that will
answer the study hypothesis (Argument), while looking at
how different sectors (social, political, and economic) work
together to achieve Cyber Security in Dubai’s Smart City.
The following are the key study questions:
•What are the new strategies of Dubai Electronic Security
Center that prepare the center to achieve Dubai Vision
2021 to be among the securest smart cities in terms of
Cyber Security around the globe?
•Are there any major political, social, economic, or mili-
tary issues that confront the global community and may
affect its acceptability of Cyber Security as an important
aspect of life?
•What are the challenges facing international security that
may eventually find a route into Smart Cities?
•What is the role of the military force and diplomacy to
ensure Cyber Security, as well as promoting peace and
stability?
•What is the importance of global collaboration in making
Smart Cities the city of the future?
•Is the IoT safe as far as Smart Cities are concerned? What
lessons should people (both locally and internationally)
draw from how the cities are planned and managed?
•What are the vulnerabilities posed by the Smart Cities’
infrastructure and residents? What are the corresponding
techniques and tools to proactively defend against SCCS
challenges?
Fig. 11 Five challenges in building smart city. Source Maximum-
governance.com [75]
The Value of Intelligent Cybersecurity …435
The study questions are aimed at evaluating all possible
facts and assumptions of “individual”attitudes from gov-
ernments, institutions, or individuals, which result in the
growth of Cyber Security issues, despite the positive benefits
associated with Smart Cities and IoT.
7 Smart City Cyber Security Program
This study focuses on three interconnected dimensions of
Smart City Cyber Security: strategic planning, technology,
and privacy. The researcher’s methodology relies on quali-
tative and quantitative methods to analyze and evaluate the
issue of Cyber Security in relation to Smart Cities. The
reason behind applying the qualitative method in this case is
to describe the security elements and issues associated with
Cyber Security both locally and internationally. This paper is
based on a survey that evaluates how well individuals are
aware of cyberattacks associated with Smart Cities’inter-
connected technologies worldwide, to implement an aware-
ness to guide them in protecting their lives and property
against sophisticated new Smart-City-based cyberthreats.
The data used in this study were collected from a survey
that was carried out in August 2017, and the study respon-
dents included 40 employees working for government and
the private sector in diverse job positions. There were 32
(84.21%) males and 06 (15.79%) females to achieve a
quantified conclusion to this study. The participants’role
was to answer the survey questions to enhance their
awareness toward Cyber-Security-related Smart City issues.
The researcher used a random sampling method, which was
the most effective method of accessing potential study par-
ticipants. The survey data was collected using tables because
they are the most effective way of obtaining data and offer an
easy platform for analysis. The research analyzed the mean
of the entire population, as well as separate gender means, to
evaluate their participation and their attitude toward Cyber
Security concerns. These are the survey questions:
•Are you aware of the Smart City Program coming up in
our city? Define the term “Smart City.”
•Do you know what Cyber Security is? Define the term
“Cyber Security.”
•Have you ever experienced a cyberattack?
•Can a Smart City cyberattack cause physical damage to
the infrastructure of a Smart City?
•Do you expect an occurrence of cyberthreats against
Smart Cites in the upcoming years?
•Do you think that cyberattacks on Smart Cities can
threaten the citizens and privacy of a Smart City?
•Do you agree with developing interconnected technolo-
gies based on a Smart City that is maintained by the
Internet-of-Things (IoT)?
•Do you agree with using big data analytics for Smart
Cities?
In the utilization of this study, I collected data from the
respondents, compared them with what I know already about
the Smart City in Dubai, and then confirmed the arguments
with documentation relating to the Dubai Smart City. By
doing this, the acquired information about the Cyber Secu-
rity Strategy and how it will increase the sustainability and
smartness of Dubai as the home of a Smart City is evident.
In addition to this survey, I used peer-reviewed articles and
books that dealt with Smart Cities and specifically Dubai
Smart City. The following section will demonstrate the
respondents’points of view toward the Smart City Cyber
Security survey.
The researcher gained the expected results by using the
proposed methodology, summarized the survey results, and
listed them in Table 1(see Fig. 12).
From the survey results, those who have never attended
school comprise 5% of the total, two years in college 5%,
graduated from college 42.50%, graduate school 2.50%, and
completed graduate school 42.50%. This means that over
90% of the individuals used in this study are educated,
which makes the quality of the data collected first-rate.
Table 1 Smart city cyber security
Characteristics Survey results (%)
1. Aware of the smart city program 55
2. Familiar with cyber security definition 87.18
3. Have you ever experienced a cyber-attack 47.5
4. Smart city cyberattacks might cause physical damage to smart city infrastructures 84.62
5. Expectations regarding the occurrence of the cyberthreats against smart city in upcoming years 94.74
6. Cyberattacks on smart city might threaten a smart city citizen’s life and his/her privacy 100
7. Agree with some interconnected technologies that are maintained by internet-of-things (IoT) 86.11
8. Agree with using big data analytics for smart cities 90
436 K. A. J. A. AlZaabi
The survey indicated that around 55% of all respondents
were aware of the upcoming Smart City Program that will be
implemented in their city. This high percentage assures their
ability to articulate a response to “What is a Smart City
Program?”Around 87.18% of the overall respondents were
familiar with the term “Cyber Security,”which confirms the
reliability, utility, and relevance of the applied data.
However, of the respondents that were familiar with this
term, only 47.5% previously experienced a cyberattack.
Moreover, only 84.62% from the total number of respon-
dents agree that a Smart City cyberattack might cause
physical damage to the Smart City’s infrastructure. In
addition, 94.74% of them expect to witness cyberthreats
against a Smart City in the year 2017. Additionally, 100% of
the participants believe that a loss of life and privacy of a
citizen can occur owing to cyberattacks on a Smart City.
Furthermore, 13.89% of the overall respondents disagree
with the development of interconnected technologies that are
maintained by the IoT of the Smart City, while 10% of them
disagreed with using big data analytics for Smart Cities.
8 Intelligent Cyber Security Strategies
for Dubai Smart City
As the global population increases and resources become
scarcer, the efficient and sustainable utilization of limited
resources has become a critical concern. Cities must learn
from diverse initiatives launched by better ranked smart
cities. Integrating multiple Information Communication
Technologies and the Internet of Things within the already
established environments should remain a key priority as it
will work in transforming Dubai into the smartest city.
With this, it will become simple to manage, increase effi-
ciency as well as access to services in real-time. Moreover,
access to education, e-government, community services,
healthcare, and education will be improved. However,
achievement of these will require a complete collaboration
between the government, citizens and the private sector. The
understanding between all the stakeholders will assure
achievement of the Dubai Smart City initiative where smart
people and smart services will thrive [3].
Smart Cities such as Dubai Smart City are a key factor in
the sustainable consumption of resources and natural mate-
rials. Dubai Smart City is built on open and big data, which
makes it the city of the future. However, without assured
safety, security, and protection, Smart Cities may become
dangerous infrastructures. Therefore, the ability of the UAE
government to launch a Cyber Security Strategy has made
the region more secure, smarter, and attractive for smart
people to live in [36].
The development of a Dubai Smart City and support from
a Cyber Security strategy ensures that the UAE will solve
environmental parking (traffic), economic, and health prob-
lems. Furthermore, it ensures that population needs are
controlled and achieved without affecting the interaction
with their specific units in society [53]. From the survey
question, it was evident that 45% of individuals had expe-
rience with cyberattacks. In addition, 84.62% of the
respondents believe that cyberattacks have the possibility of
damaging the infrastructure of the Smart City in Dubai, and
their response was, “Most definitely, and Digital Immunity is
the only way to protect the city.”Additionally, 94.74% of
the interviewees believe that Smart Cities will be exposed to
cyberthreats in the future, as Smart Cities have witnessed a
40% growth every year around the globe. Moreover, it was
clear that all 40 respondents (100%) believe that cyberat-
tacks on Smart Cities have the possibility of threatening the
privacy and citizens of a Smart City. The following are some
of the respondents’comments: “Citizens’data reside in a
city-wide Smart City Platform. Any security attack on the
platform will compromise the citizens’privacy,”and “Most
definitely, cyberattacks will pull the carpet from underneath
everyone.”
For that reason, 86.11% agree that the development of
interconnected technologies that are maintained by the
Internet-of-Things (IoT) would work in reducing the threats.
In relation to this workability and sustainability of Smart
Cities, 90% believed that use of big data analytics would
make it simple to deliver services. “City data is considered
big data, which is made of structured and unstructured data,
and without applying analytics there is no real value to
stakeholders (citizens, government, businesses),”reported
one of the survey respondents. Furthermore, they agreed that
big data analytic techniques were invented to help Smart
City planners. Given these results, it is now clear that
Fig. 12 Smart city cyber security
The Value of Intelligent Cybersecurity …437
the Cyber Security Strategy by Sheikh Mohammed bin
Rashid Al Maktoum will increase the sustainability of the
Smart City.
According to the collected data, less than 45% of the
overall respondents were not aware of the upcoming Smart
City program in their city. Two of the respondents define a
Smart City as a “connected city,”and “a smart city is a
holistic environment where human infrastructures are
gracefully integrated with physical infrastructure.”By con-
trast, 12.82% of the participants failed to define Cyber
Security terminology, and some of the responses were as
follows: “Protecting physical and digital networks, IT
components, applications and data from attacks.”“The
Internet, the mother of invention, creativity and innovation,
has created universal malware that covers the world. Cyber
Security is the medicine.”“Protecting cyberspace against
cyberthreats.”“Protecting corporate data from theft.”Fur-
thermore, 47.5% of them never experienced any cyberat-
tacks, either as an individual or as a business entity. One of
the respondents stated, “Ransomware is one of the evils.”
Sometimes, people might be targets of cybercrimes; how-
ever, owing to their levels of education or age, this could
hinder them from distinguishing between legal and illegal
activities, which could be the case for some of the partici-
pants in this survey.
Although the enterprise companies are familiar with
Cyber Security, they, however, do not have strategic security
planning to employ the term “Cyber Security,”nor do they
have a strategic plan for conducting a risk assessment on
their valuable assets. Moreover, most of the businesses failed
to enforce security policies or even sell interconnected
technologies that are maintained the IoT and Internet of
Everything without encryption or even authentication. This
can impact a Smart City’s Cyber Security and might cause
physical damage to the Smart City’s infrastructure or even
loss of a citizen’s life.
Furthermore, most people think that “Smart City”means
“safe”because everything will be smart, intelligent, and
under control. Therefore, they assume that nothing will
happen without detection, as there will be CCTV cameras
implemented in the Smart City’s surveillance, and so forth.
Cyber Security should have three pillars: people, procedure,
and technology. Most of the respondents think only about
smart technology, which might have configuration errors,
encryption and authentication that do not support these
technologies, crackable or even default passwords, and of
which can be maintained properly by people. In addition,
procedures that are implemented by people are the weakest
pillars in the Cyber Security triangle. Thus, if a malicious
user can penetrate and manipulate the interconnected traffic
signal system, he or she will be able to cause physical
damage, collisions between vehicles, and the loss of human
lives residing in a Smart City. The same applies to the
interconnected vehicle system. Moreover, if the attacker
exploits the interconnected devices’vulnerabilities given
that they store citizens’or even businesses’sensitive infor-
mation, then he or she will be able to disclose privacy items,
which is a cybercrime.
The survey’s participants are unfamiliar with critical
thinking or even best-practice security strategic plans, which
led the researcher to have only 94.74% of the overall
respondents expecting ever-rising cyberthreats against a
Smart City in the upcoming years. Unfortunately, the survey
indicates that most respondents agree with having inter-
connected technologies that are maintained by the IoT within
the Smart City. These are the same people who have poor
knowledge of Smart City cyber risks. Furthermore, the
conducted survey indicates that 90% of the survey’s par-
ticipants agree with using big data analytics for a Smart City
to store a significant amount of data related to the Smart
City’s interconnected devices. However, the same people are
not worried about how dangerous it is to implement this
technology, or even the risks of cloud computing, and how
difficult it is to trace any crimes related to the cloud (Cloud
Forensics).
Additionally, there was another issue among the partici-
pants: more males were aware of cyberattacks and Cyber
Security issues than their female counterparts. This confirms
the argument that personal attitudes toward a certain issue
determines its success or failure. In my study, males are
more concerned about Cyber Security issues in a Smart City
than females. This can explain why more females are vic-
timized by cyberattacks. Therefore, I can confirm my
hypothesis that individual attitudes determine personal
knowledge of cyber-related issues and concerns. The fewer
individuals that are concerned about Cyber Security, the
higher the opportunity for hackers to hit back [54]. There-
fore, in the case of a Smart City, the Smart Nation Program
must offer public teaching, disseminate awareness, and build
capacity with regard to using the interconnected system in a
safe manner [2]. This will help to seal the gap that hackers
would use to terrorize innocent citizens worldwide living in
Smart Cities.
Tripwire conducted a survey called the Tripwire 2016
Smart Cities Survey: Cyber Risks, and their findings com-
plement my survey results. Their survey assessed the chal-
lenges of the Cyber Security of a Smart City, and their
participants included 200 IT professionals who work in both
state and local government. Their study indicates that only
88% of the overall respondents were wary of cyberattack
impacts against the Smart City’s critical infrastructure,
which would cause a threat to public safety. In addition,
around the same percentage expected to witness a cyberat-
tack against the Smart City’s services in the year 2016 [35].
An example of a critical Smart City service is smart
energy grid technology, which ensures satisfactory energy
438 K. A. J. A. AlZaabi
consumption by users. It is believed that this technology
reduces costs and environmental impacts, and improves the
efficiency of energy consumption [1].
Every residential building is fitted with a smart meter and
sensor, which are then connected to the user’s IP address [7].
The connection makes it easy to determine user consumption
patterns, and it offers an opportunity for end-user control. By
doing this, government bodies and other relevant bodies in
the energy industry can offer advice to the consumer through
the same platform. However, this free information-sharing
platform has its own effects on the security of both the user’s
and government’s information. With this system in place,
hackers are free to hack into the system, change details, and
access users’personal information such as phone numbers
and bank details [48]. According to [55], many users are not
concerned about how the system works; they work with
functioning devices, which gives hackers a great opportunity
to access their personal details and data [55].
Furthermore, the Smart City offers real-time information,
which is made possible by Global Positioning Systems
(GPS), Wi-Fi, and RFID technologies. The systems offer
data analytics and prediction techniques that make it simple
for individuals to [56] enjoy both public and private travel.
For example, sensors actively collect information about city
traffic, then send it through GPS communication or wireless
networks to a centralized control system, which assists the
traffic departments in decision-making and the synchro-
nization of traffic light operations [57]. The Smart City
improves the common Electronic Patient Records stored in
healthcare centers. In addition, the connection of healthcare
systems with this technology will make it easy for the
population to access their health care clinicians and profes-
sionals [2]. According to the Association for Dubai Elec-
tronic Security Center (DESC), partners in creating the
Smart City must also collaborate in teaching the population
about Cyber Security and issues surrounding the entire
techno-novation in Dubai. This is because the growth in
technology results in increased security risks, which may
affect the entire population. A literature review indicates that
the population appreciates Smart City elements without
having an increased understanding of the risks associated
with sharing their information online [48].
Furthermore, almost three years since its establishment,
the Smart-City-state success story of Dubai is at the cutting
edge of an industrial revolution. At present, the IoT inter-
connects the cyber and physical systems of Dubai, such as
sensors and smart technology-based systems, with the digital
aspects that connect the entire society and overall critical
infrastructures, which include transportation, health, defense,
and finance. Investment in infrastructure is projected to grow
during the next four years. However, as Dubai as a Smart
City becomes more and more associated with cyberspace, so
does its risk of cyberthreats. During the last century, Dubai
has become a flourishing city, but Dubai as a Smart City will
have to develop and prepare a cyber-smart workforce, along
with advanced technology, strategies, and new and effective
cyber risk management solutions [58]. As Dubai is indeed a
city of strategic technology in the world, it is an emerging
economy that can become a major economic center of the
Middle East and North Africa (MENA) in the Asian region.
For Smart City, big data and analytics have a wider appli-
cation in six areas:
•Security/Policing: Through big data and analytics, Smart
Cities now seek to move toward developing a safer city
that enables police to control crime without requiring
them to put themselves at risk of physical harm [59].
•City Planning: Using modeling and data, Smart Cities
are mapping the infrastructural outcomes of space use
with a high degree of accuracy for civic planning of the
growing population and infrastructure needs [59].
•Transportation: Through analytics, Smart Cities have
created a flexible and effective public transport system
with increased efficiency and decreased number of
delays. Analytics and big data have enabled the Smart
Cities’transport system to predict upcoming events and
peak times, and monitor equipment with reliability. This
has also helped to decrease road accident ratios [60].
•Future Proofing: With predictive analytics and model-
ing, Smart City planners are now capable of foreseeing
potential growth areas and assess how large this increase
will be [60].
•Web Provision: Analytics has enabled Smart Cities to
direct bandwidth at optimal levels in financial and com-
mercial areas during weekdays, and this pace is shifted
toward residential areas on Saturdays and Sundays.
Analytics has the potential to optimize bandwidth as
needed in this Smart City Project [59].
•Effective Spending: Using analytics and data, the Smart
Cities also seek to target public spending in areas where
it is most required. This facilitates the effective assess-
ment of the most appropriate areas of public spending
and reaps its maximum output. This will also help the
Smart City to reduce waste and enhance infrastructure
[59].
•Analytic Measures in Smart Cities: To ensure the
effective utilization of analytics and big data in Smart
City Projects, it is imperative to develop an effective
Cyber Smart Workforce. Although there are improved
technical Cyber Security defenses, human beings need a
strong knowledge base and skills to be developed in
cyberspace. An effective and secure cyber infrastructure
The Value of Intelligent Cybersecurity …439
requires a skilled workforce, and such a workforce needs
to be trained in the best Cyber Security strategies, prac-
tices, and technology. It is essential for a Cyber-Smart
City workforce such as that in Dubai to comprehend
ways to ensure the tight security of converged Informa-
tion Technology (IT) and Operational Technology
(OT) [59].
This approach allows Smart Cities to exercise absolute
power and control over cyber episodes. Analytical and
investigative skills have also been developed and enhanced
by means of collaboration between different agencies oper-
ating at the government level [53]. San Diego is among the
most active city in enhancing Cyber Security in the world
today. San Diego is the headquarters of Qualcomm, the US
Navy, and the Marine Corps. It is deemed to have the largest
military concentration across the world [49]. Thus, the city
has a lethal potential of Cyber Security maintenance.
Through implementers and planners such as Dr. Sandra
Brown, the vice chancellor of research at The University of
California, San Diego, as well as David Graham, who acts as
the city’s deputy COO in charge of neighboring services, the
city has stepped up its efforts in combining elements of local
academia, individual talents, and entrepreneurship to make
the city smarter.
The program of MetroLab has also been implemented to
ensure that the Smart City’s measures and goals will be fully
set and achieved soon. Metrolab acts as a network connec-
tion that supports the city, university, and overall develop-
ment in San Diego. This has been achieved through the
contribution of Sandra Brown’s and David Graham’s
departments, which are geared toward the smart develop-
ment of San Diego. In addition, the GPS Connected Qual-
comm 3G network enhances data transfer across all sectors
of the city. San Diego has a couple of institutions and
departments in charge of Cyber Security. These include San
Diego State University’s Center for Commercialization of
Advanced Technology, the University of California, and the
Information System Security Association (ISSA). Although
most of the information systems are encrypted, these insti-
tutions and departments have developed different software
applications, which can be effective in the protection and
recovery of data in cases of cyberattacks in the future [49].
From a legal perspective, cyberattacks and hacking in
Dubai are punishable under the clauses given by the United
Arab Emirates (UAE) Cyber Security Federal Law No. 12 of
2016 concerning combating information technology crimes.
The act states that any individual who falsely accesses
unauthorized information by causing a computer to down-
load data either manually or by using a program is termed
guilty [61]. Dubai Smart City and its vulnerability to Cyber
Security fall under UAE Cyber Security Federal Law
No. 12 of 2016. It offers laws that guard and protect users
from technology against unauthorized disclosure of com-
puter access codes, obstruction of computer use, and unau-
thorized interception of computer networks with the aim of
modifying or stealing data. This subject truly shows the
importance of disseminating information among the popu-
lation against Cyber Security attacks, and plays a part in
supplementing the protection offered by the UAE Cyber
Security Federal Law No. 12 of 2016. The Smart City
technology in Dubai brings the interdependence and inter-
connectedness of services into a single dashboard controlled
by the government and stakeholders, who are responsible for
ensuring the development (adhering to the policies and
practices) of people living in Dubai.
It is believed that the Smart City system guarantees an
efficient and resilient governance, security, and on-time
delivery of services. While in San Diego, different informa-
tion system attacks committed by hackers are being reported
globally. According to S. Shrivastava, many attackers take
advantage of traffic on a network’ssystemtoholditfor
ransom and interfere with its functioning. Hackers can encrypt
data and prevent it from being viewed by those in charge [62].
N. Nigam et al. also came up with a process through which
attackers use wormhole attacks and ransomware in a bid to
control information systems [63]. Therefore, cyberattacks
have existed for many years, conducted by hackers and
cyberattackers. However, cyberattacks can be prevented by
using effective security to prevent access of data on the sys-
tems. Table 2showcases cyberattackers’activities against
Smart-City interconnected technologies.
The current and future challenges faced by Smart Cities
from cyberthreats include information theft, use of malware,
viruses, or hacking into the overall server or control rooms.
By doing this, hackers may interfere with control systems,
thus causing accidents, an oversupply of power, or even
reduced access to energy or medical services. Therefore,
despite the advantages associated with Smart Cities, more
danger than good may be experienced if everything is not
streamlined. For this reason, citizens must be taught how to
secure their information while using IOT devices that
transmit data. Therefore, while using devices such as
Smartphones, Smart Televisions, or even home security
cameras, the population must be educated on how to protect
their data from falling into the wrong hands. Thus, they will
achieve security, safety, and protection from hackers or any
other related vices.
Hence, owing to the increasing application of IoT devices
such as Smartphones, Smart Televisions, and Smart Home
appliances, the number of cyberattacks against these systems
is rising. Therefore, to ensure the safety and security of
information, there is a need to create laws that govern
manufacturing and updates to IoT devices.
440 K. A. J. A. AlZaabi
9 Safe Cities: Using Smart Guidance
to Secure Citizens’Privacy
In relation to domain one (a Cyber Smart Nation), the
government can inform its citizens of ways of protecting
their computers and IoT devices such as Smart TVs, Fringes,
or even security controls. Citizens may be informed of the
importance of installing antivirus programs and firewalls,
and updating their operating systems [15]. Information is the
power that the government will offer its citizens, which will
increase their knowledge of how different systems work and
how they can protect themselves.
According to crime opportunity theory, most offenders go
for rational choices and therefore target events that offer high
reward with little or no risk involved. Therefore, citizens
must be given information on how to lower any opportuni-
ties for criminals to access their networks. This decreases the
chances of criminals or hackers finding loopholes in the
systems or networks. In addition, the government may pro-
vide hotlines where citizens can make distress calls when
they feel their networks have been compromised. Early
intervention ensures that malware or viruses are wiped out of
the networks before they hit a large number of users [64].
Lastly, information departments and their affiliates must
ensure that citizens are updated on the need for passwords
when it comes to accessing sensitive information. This will
help to restrict access to sensitive data and information by
unauthorized personnel. Thus, citizens are knowledgeable
about the need for privacy and confidentiality of their
information. Citizens may be advised on critical facts such
as never sharing their credit card or personal information
with any website as it increases the chances of data com-
promise and theft. Furthermore, citizens must be given
information on how to encrypt their data as well as purchase
cyber insurance policies. All personal computers and infor-
mation stored on servers and databases should be encrypted.
This means that hackers have no option of accessing any
sensitive information hosted in the cloud. Moreover, there is
a need to purchase a solid cyber insurance policy that covers
all costs and losses that may occur in a cyberattack. There-
fore, because the government has all information that is
required by citizens to protect themselves, it is the state’s
responsibility to ensure that all individuals are informed.
This will lower the possibility of cyberattacks [65].
10 Today’s Plan Will not Work Tomorrow
A Smart City requires agility and forecasting. For Dubai
Smart City, this is the only way to lead the E-world into a
Smart City world. Therefore, leadership (government, poli-
cymakers, and regulators) must have tangible innovations
and ideas to implement Cyber Security preventive policies
and a safer E-environment for Dubai Smart City user.
According to [48], Cyber Security is more a culture and
attitude than compliance. Therefore, society must change its
attitude toward the perception of Cyber Security in order to
improve security and reduce the number of potential
cyberattack threats. This means that the complete protection
of Smart City citizens begins with the users: they need to
protect themselves, and they need to seal all available
loopholes that hackers may use to attack systems [48]. In
addition, the criticality of using big data to improve the
performance and sustainability of Smart Cities [20]will
reduce the conflict between individuals and the environment
in society [36]. Moreover, technology and innovation will
eventually ensure a sustainable use of resources regardless of
the growth of the population [21].
In summary, Cyber Security issues are harbored within
the personal attitudes of the users, which pose threats to
Smart City technology [66]. In addition, Dubai has the
potential to become a technologically leading city in the
MENA region despite the reality that cyberspace agencies
and the workforce require a skill set to combat cyberattacks.
For this, the government needs to develop tangible ideas to
Table 2 Cyberattackers’activities against smart city-interconnected technologies
Cyberattacks against smart city
1. Attackers can manipulate the traffic lights, as some of the devices used in traffic control systems are without any encryption
2. Wireless street lighting systems, which have encryption issues and therefore cause street blackouts
3. City management systems. attackers utilize system bugs and cause security breaches
4. Cloud and SaaS solutions. Cybercriminals or cyberterrorists target city servers and cloud infrastructure to launch distributed denial of service
(DDoS) attacks
5. Smart power and water grid. Attackers can devastate smart grid and water, resulting in losses of business and lives
6. Public transportation. manipulating the transportation information systems affects people’s behavior and might cause overcrowding
7. Surveillance cameras. Targeted by denial of service (DoS) attacks can make the city “blind”
8. Location-based services. As these services depend on location, by performing GPS spoofing, an attacker can manipulate the location
information
The Value of Intelligent Cybersecurity …441
obtain tangible and innovative results. For this very reason,
Dubai needs to develop a workforce that is highly skilled,
well versed, and has the ability to protect the city by making
highly strategic plans, as this will play a pivotal role in
making Dubai a Smart City in the world.
11 Smart Laws for Dubai Smart
Sustainable City
To continue their success, Smart Cities need to develop
effective Cyber Smart policies and regulations. These poli-
cies should be developed in such a manner that will assist in
enhancing the level of Cyber Security of highly critical
technology infrastructures of smart buildings or institutions.
Typically, Smart Cities depend strongly on interconnected
infrastructures to boost the overall economy. An extraordi-
nary amount of data is the fuel for Smart Cities, and such
data is currently at greater risk owing to increased cyberat-
tacks. Nevertheless, smart and effective policies will protect
big data because smart policies and practices have the
potential to restrain industrial espionage while strengthening
the protection of intellectual property. To make this possible,
increased foreign direct investment is the best approach
because organizations operating internationally will gradu-
ally move to and expand in countries that provide absolute
protection of their intellectual property. This will promote
inventiveness and attempts to find new approaches to over-
come cyberthreats.
The government of the United Arab Emirates must ensure
that strict laws are made for controlling how IoT devices
(such as Smartphones, home security networks, and home
devices including televisions and refrigerators) are manu-
factured. This will lower instances of insecurity or data theft
within the Smart City networks. Furthermore, Smart Cities
worldwide should employ the following recommendations:
•Public-private partners should unite to bring leverage in
improving Smart City Cyber Security. This would
address both current and emerging technological threats.
•Regulators and policy makers should attempt to address
economic barriers of different infrastructures to achieve a
secure cyberspace.
•Politicians (members of Parliament) should always pri-
oritize research and development toward improving
Smart City Cyber Security.
•Global supply chains (social, economic, and political)
can only be secured by adopting practices and other
global standards.
12 Sustainability of Dubai Smart City
as a City of the Future
The core question throughout the study was the ability of
Cyber Security strategies to ensure the sustainability and
growth of Dubai Smart City as a city of the future. However,
the survey results and literature analyzed proved that the five
domains of the Cyber Security strategy (innovation, Cyber
Smart nation, national and international collaboration, cyber
resilience, and cyber security) can ensure that the UAE
cyberspace will be safe, secure, and free for all. Furthermore,
it is evident that Smart Cities create huge and complex attack
surfaces where hackers can easily access users’information.
The longer the computer integration network, the wider the
gaps that hackers can use to access this unauthorized
information [67]. A cross-examination of participants in the
Smart City Cyber Security survey tested negative in terms of
their knowledge and understanding of the Cyber-Security-
related Smart City. This is an indication that individuals are
not concerned about Cyber Security issues. The increased
dispersion of personal information in public spaces can
eventually result in cyberattacks against their Smart City.
The overall outcome of the study is that over 80% of
individuals in the region are aware of cyberattacks and
cyber-related issues. However, they still fear that their Smart
City is vulnerable to cybercrimes and attacks. For that rea-
son, Dubai Smart Offices must launch campaigns to educate
society on how to ensure their safety while using IoT devices
such as Smart Televisions, computers, laptops, Smartphones,
and other home appliances such as music systems and
security locks. Nevertheless, there is an assurance that the
Cyber Security strategy will be effective in ensuring the
security and protection of Dubai Smart City users.
The military has a role to play to ensure the security of
their land by collaborating with international-community
military forces to ensure peace and stability. The president of
Dubai showcased the importance of having an intelligent
Cyber Security strategy, which can be used in fighting future
criminal and terrorism activities that might occur through the
technology in Dubai’s Smart City [68]. In addition, military
personnel may be used for teaching people how to handle
technological devices and how to detect that a system has
been hacked or fed malicious data. In so doing, peace and
stability will be achieved within Smart Cities. Additionally,
future work should focus on how individual data may be
protected from leaking from Smart City technologies into
hackers’hands. It is necessary to showcase the most effec-
tive way of teaching the grassroots population about Cyber
Security.
442 K. A. J. A. AlZaabi
Increasing the number of devices into a network courtesy
of the IoT increases the chances of hackers infiltrating the
networks and attacking unsuspecting Smart City users. For
that reason, future research should focus on controls that
should be placed to ensure that individuals using IoT devices
such as Smartphones are not exposed to hacking or data
phishing.
In conclusion, the leadership of His Highness Sheikh
Mohammed bin Rashid Al Maktoum will not only help
Dubai to become a smart city but also work in creating a
massive number of technological experts through the train-
ing programs launched by the Smart Dubai office. Addi-
tionally, access to services will become effective and
affordable to both visitors and residents in Dubai. Therefore,
the smart city development project is a sustainable project
that will transform the quality of life of people in the UAE
region.
References
1. Curry, D., Cate, L., Donal, P., Kristina, H.: Are Happier Citizens
Making Singapore a Smart City Leader?. Readwrite, SmartNation
Singapore. http://readwrite.com/2016/09/12/pragmatism-keeps-
singapore-global-smart-city-leader-cl4/.6. Accessed 14 Sept 2017
(2016)
2. Smart Nation Singapore—Forbes. http://www.smartnation-forbes.
com/. Accessed 14 Sept 2017
3. Baharash Architecture: How Dubai is Becoming a Smart City.
Baharash Architecture. Retrieved 11 Nov 2017, from http://www.
baharash.com/dubai-smart-city/
4. Cerrudo, C.: An Emerging US (and World) Threat: Cities Wide
Open to Cyber Attacks. IOActive Labs, 2015. http://www.ioactive.
com/labs/resources-white-papers.html. Accessed 14 Sept 2017
5. ICUD: Smart Cities Cyber Security (SCCS). ICUD Laboratory for
Contemporary Urban Design. http://lcud.tau.ac.il/project/2016smart-
cities-cyber-security-sccs/. Accessed 14 Sept 2017 (2016)
6. Perlroth, N.: Smart City Technology may be Vulnerable to
Hackers. Bits (blog). 21 Apr 2015. http://bits.blogs.nytimes.com/
2015/04/21/smart-city-technology-may-be-vulnerable-to-hackers/?
_r=1. Accessed 14 Sep 2017
7. Venkataramanan, M.: 2016. Smart Cities will be Necessary For
Our Survival. Wired UK. http://www.wired.co.uk/article/smart-
city-planning-permission. Accessed 14 Sept 2017
8. Innovation Enterprise: 2016. Smart Cities Innovation Summit,
Singapore. The Innovation Enterprise. https://theinnovationenterprise.
com/summits/smart-cities-singapore-2017. Accessed 14 Sept 2017
9. Konomi, S., Roussos, G.: Enriching Urban Spaces with Ambient
Computing, the Internet of Things, and Smart City Design.
Engineering Science Reference, Hershey (2016)
10. AlDairi, A., Lo’ai, T.: Cyber security attacks on smart cities and
associated mobile technologies. Procedia Comput. Sci. 109, 1086–
1091 (2017)
11. Joshi, S., Saxena, S., Godbole, T., Shreya: Developing smart
cities: an integrated framework. Procedia Comput. Sci. 93, 902–
909 (2016)
12. Repko, J., DeBroux, S.: Smart Cities Literature Review and
Analysis. Last modified 2012. https://www.researchgate.net/
publication/236685572_Smart_Cities_Literature_Review_and_
Analysis. Accessed 30 Oct 2017
13. Biswas, K., Muthukkumarasamy, V.: Securing smart cities using
blockchain technology. In: 2016 IEEE 18th International Confer-
ence on High Performance Computing and Communications; IEEE
14th International Conference on Smart City; IEEE 2nd Interna-
tional Conference on Data Science and Systems (HPCC/
SmartCity/DSS) (2016)
14. Gil-Garcia, J.R., et al. (eds.): Smarter as the New Urban Agenda a
Comprehensive View of the 21st Century City. Public Adminis-
tration and Information Technology 11. https://doi.org/10.1007/
978-3-319-17620-8_2
15. Baig, Z.A., Szewczyk, P., Valli, C., Rabadia, P., Hannay, P.,
Chernyshev, M., Johnstone, M., et al.: Future challenges for smart
cities: cyber-security and digital forensics. Digit. Invest. 22,3–13
(2017)
16. Popescul, D., Radu, D.L.: Data security in smart cities: challenges
and solutions. Informatica Economica 20(1), 29–38 (2016)
17. Gaurav, S.: Developing smart cities using internet of things: an
empirical study. In: IEEE Conference Publication, Ieeexplore.Ieee.
org, last modified 2016. http://ieeexplore.ieee.org/document/
7724278/authors. Accessed 30 Oct 2017
18. Efthymiopoulos, M.P.: Cyber-security in smart cities: the case of
Dubai. J. Innov. Entrep. 5, 11 (2016). https://doi.org/10.1186/
s13731-016-0036-x
19. Khaleejtimes: Dubai Tops Middle East’s Smart City List. Khalee-
jtimes.com. Retrieved 11 Nov 2017, from https://www.khaleejtimes.
com/technology/dubai-tops-middle-easts-smart-city-list
20. Vinod Kumar, T.M.: E-Governance for Smart Cities. Springer,
Singapore (2015)
21. Zaatari, S.: Dubai Smart City Achieving Targets. Gulfnews. http://
gulfnews.com/news/uae/government/dubai-smart-city-achieving-
targets-1.1975240. Accessed 14 Sept 2017
22. Psemagazine: Building the Smart City. Public Sector Excellence
Magazine- UAE. Psemagazine.com. Retrieved 11 Nov 2017, from
http://psemagazine.com/building-the-smart-city/
23. UAE Government: Smart City Dubai. Government Portal. https://
government.ae/en/about-the-uae/the-uae-government/smart-uae/
smart-dubai. Accessed 14 Sept 2017
24. Bernd, D.: A Smart City For Happy Citizens. Khaleejtimes.Com,
last modified 2017. https://www.khaleejtimes.com/news/uae-
health/a-smart-city-for-happy-citizens. Accessed 30 Oct 2017
25. Government: Dubai Cyber Security Strategy. Dubai.Ae. Last
modified 2017. http://www.dubai.ae/en/Pages/DCSS.aspx. Accessed
30 Oct 2017
26. Al Tayer, M.: Sustainable Transportation and Smart Cities, the
Dubai Model. Gulfnews. Last modified 2016. http://gulfnews.com/
opinion/thinkers/sustainable-transportation-and-smart-cities-the-
dubai-model-1.1911556. Accessed 30 Oct 2017
27. Arabian Business: Dubai Launches New Cyber Security Strategy as
Threats Rise. Arabianbusiness.Com. http://www.arabianbusiness.
com/dubai-launches-new-cyber-security-strategy-as-threats-rise-
676338.html. Accessed 14 Sept 2017
28. Kwang, T.W.: A Look into Dubai’s Smart City Initiatives.
Enterprise Innovation. Asia’s Premier Business and Technology
Publication. https://www.enterpriseinnovation.net/article/look-
dubais-smart-city-initiatives-1141254266. Accessed 14 Sept 2017
29. Emirates Scientists Council: MBRAS—Mohammed Bin Rashid
Academy of Scientists. Sc.gov.ae. Retrieved 11 Nov 2017, from
http://www.sc.gov.ae/mbras-en
30. DT News: Dubai Cyber Security Strategy. News of Bahrain. http://
www.newsofbahrain.com/viewNews.php?ppId=34720&TYPE=
Posts&pid=21&MNU=2&SUB=50. Accessed 14 Sept 2017
31. Jaffe, E.: What Smart Cities Can Learn From Singapore’S Smart
Nation—Sidewalk Talk. Medium. https://medium.com/sidewalk-
talk/what-smart-cities-can-learn-from-singapore-s-smart-nation-
e19a7efefa3a#.p05f1u4x4. Accessed 14 Sept 2017
The Value of Intelligent Cybersecurity …443
32. Middle East Insurance Review: UAE: Dubai Launches Cyber
Security Strategy. Middle East Insurance Review. http://www.
meinsurancereview.com/News/View-NewsLetter-Article?id=39334
&Type=MiddleEast. Accessed 14 Sept 2017
33. Al-Awsat, A.: Dubai Launches Cyber Security Strategy—
ASHARQ AL-AWSAT English. ASHARQ AL-AWSAT English.
https://english.aawsat.com/theaawsat/news-middle-east/dubai-
launches-cyber-security-strategy. Accessed 14 Sept 2017
34. Smart Dubai, (c).: Smart Dubai. Smartdubai.Ae. Last modified
2017. http://www.smartdubai.ae/foundation_dimensions.php.
Accessed 30 Oct 2017
35. Tripwire: Tripwire 2016 Smart Cities Survey—Cyber Risks.
Tripwire. Last modified 2016. http://www.tripwire.com/company/
research/tripwire-2016-smart-cities-survey-cyber-risks/. Accessed
14 Sept 2017
36. Ministry of Infrastructure Development: Dubai at the Forefront of
Smart City Technology Adoption. Smartcitiesdubai.Com. http://
www.smartcitiesdubai.com/news-detail:a293efdb-ff61-75dd-a80b-
59267fdb72ca.html. Accessed 14 Sept 2017
37. Smart Dubai: Smart Dubai- Dubai Blockchain Strategy. Smart-
dubai.ae. Retrieved 11 Nov 2017, from http://www.smartdubai.ae/
dubai_blockchain.php
38. Smart Dubai: Smart Dubai- Dubai Seeks to Distinguish Itself as
the Global Leader Delivering Smart Economy and Smart Living
opportunities for all. Smartdubai.ae. Retrieved 11 Nov 2017, from
http://www.smartdubai.ae/foundation_dimensions.php
39. Kumar, N., Kumbhat, S.: Essentials in Nanoscience and Nan-
otechnology. Wiley, Hoboken, New Jersey (2016)
40. Smart Dubai. Smart Dubai- Smart Dubai Launches its Development
Roadmap for Artificial Intelligence. Smartdubai.ae. Retrieved 11
Nov 2017, from http://www.smartdubai.ae/story0328.php
41. Slingerland, J.: Nanotechnology. Essential Library, an imprint of
Abdo Publishing, Minneapolis, Minnesota (2016)
42. Berger, M. Nanotechnology: the future is Tiny. Cambridge, Royal
Society of Chemistry
43. Expotrade: Dubai Smart City Initiatives. Smartcitiesdubai.Com.
http://www.smartcitiesdubai.com/dubai-smart-city-initiative.html.
Accessed 14 Sept 2017
44. Visitdubai: Smart City—Dubai into a Smart Future. Visitdubai.-
com. Retrieved 11 Nov 2017, from https://www.visitdubai.com/
en/articles/smart-city
45. Ramachandran, R.: Evolution of a Wholesome Smart City: “Dubai
2.0”. Linkedin.com. Retrieved 11 Nov 2017, from https://www.
linkedin.com/pulse/evolution-wholesome-smart-city-dubai-20-
radhika-ramachandran/
46. Cerrudo, C., Hasbini, A., Russell, B.: Cyber Security Guidelines
for Smart City Technology Adoption. Cloud Security Alliance
47. Gsma: Smart Cities Overview Resources. Internet of Things,
Internet of Things, last modified 2017. https://www.gsma.com/iot/
smart-cities-overview-resources/. Accessed 30 Oct 2017
48. Man, J.: Cybersecurity is About Attitude, Culture—not Strictly
Compliance. Wired. https://www.wired.com/insights/2014/04/
cybersecurity-attitude-culture-strictly-compliance/. Accessed 14
Sept 2017
49. Song, H., Zhang, D., Jara, A., Wan, J., Boussetta, K.: IEEE Access
Special Section Editorial: Smart Cities. IEEE Access 4
50. Mylrea, M.: CO15214 Singapore’s Smart City: Securing it from
Emerging Cyber Threats. RSIS. Last modified. https://www.rsis.
edu.sg/rsis-publication/rsis/co15214-singapores-smart-city-securing-
it-from-emerging-cyber-threats/#.V_qr4KO9pjo. Accessed 14
Sept 2017
51. Popescul, D., Radu, LD.: Data security in smart cities: challenges
and solutions. Informatica Economica 20(1), 29–38 (2016)
52. VisitDubai: Smart City—Dubai into a Smart Future. Visitdubai.
Com, last modified 2017. https://www.visitdubai.com/en/articles/
smart-city. Accessed 30 Oct 2017
53. Obaidat, M.S., Nicopolitidis, P.: Smart Cities and Homes: Key
Enabling Technologies. Morgan Kaufmann is an imprint of
Elsevier, Cambridge, MA (2016)
54. Purnell, J.: Singapore is Taking the ‘Smart City’to a Whole New
Level. WSJ. http://www.wsj.com/articles/singapore-is-taking-the-
smart-city-to-a-whole-new-level-1461550026. Accessed 14 Sept
2017
55. Tan, A., Van, A.: Singapore Smart Guide. APA Publications,
Singapore (2013)
56. IEEE International Symposium on Broadband Multimedia Sys-
tems and Broadcasting: Broadband multimedia systems and
broadcasting (BMSB). In: 2015 IEEE International Symposium
on 17–19 June 2015
57. Calder, K.E.: Singapore: Smart City, Smart State. Brookings
Institution Press, Washington, D.C. (2016)
58. Flick, T., Morehouse, J.: Securing the Smart Grid: Next Gener-
ation Power Grid Security. Elsevier (2010)
59. Strohbach, M., Ziekow, H., Gazis, V., Akiva, N.: Towards a big
data analytics framework for IoT and smart city applications. In:
Modeling and Processing for Next-Generation Big-Data Tech-
nologies, pp. 257–282. Springer International Publishing
60. Wang, L., Shiyan, H., Betis, G., Ranjan, R.: A computing
perspective on smart city [guest editorial]. IEEE Trans. Comput.
65(5), 1337–1338 (2016)
61. UNODC: Computer Misuse and Cybersecurity Act. Unodc.Org.
https://www.unodc.org/res/cld/document/computer-misuse-and-
cybersecurity_act_html/2014_COMPUTER_MISUSE_AND_
CYBERSECURITY_ACT.pdf. Accessed 14 Sept 2017
62. Shrivastava, S.: Rushing attack and its prevention techniques. Int.
J. Appl. Innov. Eng. Manage. 2(4), 453–456
63. Nigam, N., Sharma, V.: A comprehension on wormhole attack
prevention technique using THREADS in MANET. Int. Inventy:
Int. J. Eng. Sci. 2(10), 14–17 (2013)
64. UrbanTide: Overview of the Smart Cities Maturity Model. Urban
Tide. Last modified 2017. https://static1.squarespace.com/
static/5527ba84e4b09a3d0e89e14d/t/55aebffce4b0f8960472ef49/
1437515772651/UT_Smart_Model_FINAL.pdf. Accessed 30 Oct
2017
65. Manville, C., et al.: Mapping Smart Cities in the EU. Last modified
2014. http://www.europarl.europa.eu/RegData/etudes/etudes/join/
2014/507480/IPOL-ITRE_ET(2014)507480_EN.pdf. Accessed
30 Oct 2017
66. Purnell, J.: Singapore is Taking the ‘Smart City’to a Whole new
Level. WSJ. 14 Accessed Sept 2017
67. Peters, S.: Smart Cities’4 Biggest Security Challenges. Dark
Reading. http://www.darkreading.com/vulnerabilities—threats/
smart-cities-4-biggest-security-challenges/d/d-id/1321121. Accessed
14 Sept 2017
68. Huiwen, N.G.: Cybercrime Threat a Big Challenge for Singapore:
President Tony Tan. The Straits Times. http://www.straitstimes.
com/singapore/courts-crime/cybercrime-threat-a-big-challenge-for-
singapore-president-tony-tan. Accessed 14 Sept. 2017
69. Frost and Sullivan.: Global Smart City Market –A $1.5 Trillion
Market Opportunity by 2020. Retrieved September 14, 2017, from
https://www.slideshare.net/FrostandSullivan/global-smart-city-
market-a-15-trillion-market-opportunity-by-2020. (2013)
70. SmartCitiesWorld news team.: Smart cities services worth $225bn
by 2026. Retrieved September 14, 2017, from https://www.
smartcitiesworld.net/news/news/smart-cities-services-worth-225bn-
by-2026-1618. (2017)
444 K. A. J. A. AlZaabi
71. Baharash Architecture.: How Dubai is becoming a smart city.
Baharash Architecture. Retrieved 11 November 2017, from
http://www.baharash.com/dubai-smart-city/. (2017)
72. Haidine A, El Hassani S, Aqqal A and El Hannani A (n.d.). doi:
https://doi.org/10.5772/64611 Chapter 4 The Role of Communi-
cation Technologies in Building Future Smart Cities
73. Diana F.: Artificial Intelligence Intersects with Mobile and Cloud.
Retrieved September 14, 2017, from https://frankdiana.net/2016/
08/10/artificial-intelligence-intersects-with-mobile-and-cloud/. (2016)
74. IBM.: Infographic - Smarter Cities: Turning Big Data into Insight.
Retrieved September 14, 2017, from https://www-03.ibm.com/
press/us/en/photo/42063.wss. (2013)
75. Aggarwal A.: Five challenges to overcome for Smart Cities to
happen. Retrieved September 14, 2017, from http://maximum
governance.com/perspectives/five-challenges-to-overcome-for-
smart-cities-to-happen/. (2016)
The Value of Intelligent Cybersecurity …445
User and Item Preference Learning
for Hybrid Recommendation Systems
Kaavya Prakash , Fayiz Asad , and Siddhaling Urolagin
Abstract
With the abundance of items, features, services and
products available on the web, it becomes quite tedious to
sort through and find what is desired. A recommendation
system, therefore, provides a solution for this by only
retrieving desired information from relevant data sets.
A similarity metric is applied on the retrieved data and
recommendations are made based on the predicted
similarity. Typically, there are three major recommenda-
tion methods—collaborative, content-based and hybrid.
Collaborative (user-based) works on the premise that
similar users are bound to like the same items. Whereas,
content-based (item-based) filtering tries to recommend
items that are similar to the ones the user has liked
previously. While functioning independently, the above
two methods have certain flaws. Content-based systems
cannot make predictions outside of the user’s content
profile and collaborative systems cannot make recom-
mendations for cold start problems. To alleviate these
issues, we seek to combine these two methods into a
hybrid recommender system. Hybrid recommender, as the
name suggests, is a segmented approach to recommen-
dation where each segment consists of either the collab-
orative or content-based model. In this paper, we propose
meta-level cum switching hybrid model that incorporates
the dual hybridization techniques into the above men-
tioned hybrid model. The type of hybridization method
applied depends on the ability of each individual model to
generate results. I.e. In situations where both the individ-
ual segments can generate results, the meta-level
hybridization is used. Whereas, in a situation where any
of the individual methods are unable to provide a result,
the switching hybridization is enabled to shift to the
method that is able to function in that scenario.
Keywords
Recommender systems Collaborative filtering
Content-based filtering Hybrid recommender
Pearson’s coefficient Meta-level hybridization
Switching hybridization Cosine similarity
1 Introduction
Since the number of items in any online database is large, the
process of finding items we like may prove to be tedious.
A recommendation system assists the user to find items
he/she may like by monitoring the user’s preferences and
makes valuable suggestions. This system has been incor-
porated in most devices and platforms and is designed to
optimize a consumer’s choice. Most recommender algo-
rithms follow a two-step procedure. The first step is to gather
data on various users and items (information retrieval [1])
and the second is to interpret the data so as to make valuable
recommendations (data mining [2]). There are three main
types of recommendation approaches—collaborative,
contentbased and hybrid. Collaborative filtering [3] is based
on the collective intelligence of the entire user base, focusing
on ‘who’rather than ‘what’. Predictions are made by taking
into account the user’s choices in the past and by its
resemblance to other users. A similarity metric is calculated
between each user pair. The users with the highest similarity
metric to the given user will make up his/her neighborhood
[4] and the recommendations will reflect on their collective
preferences. Content-based [5] focuses on the user prefer-
ence [6] of items and recommends similar items based on
user-item similarity. It focuses on the understanding of the
K. Prakash (&)F. Asad S. Urolagin
Department of Computer Science, Birla Institute of Technology
and Science, Pilani, Dubai, UAE
e-mail: kaavyapraksh@gmail.com
F. Asad
e-mail: fayizasad@gmail.com
S. Urolagin
e-mail: siddhaling@dubai.bits-pilani.ac.in
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_50
447
product itself instead of collective user preferences. An
important element in making predictions is learning the user
model. The user model contains information about the user,
such as purchase history, product reviews etc., and a user
profile [7] is generated using this information. An item
profile [8], like a user profile consists of item information
such as color, type, category etc. A similarity function cal-
culates the extent of similarity between a user and item
profile. If the similarity is high, it makes for a good rec-
ommendation. Hybrid recommender, as the name suggests,
is a segmented approach to recommendation where each
segment consists of either the collaborative or content-based
model. These individual segments can be combined using
any of the following techniques—weighted [9], switching
[10], mixed [11], feature combination [12], feature aug-
mentation [13], cascade [14] and meta-level [15]. Such
systems have been introduced to alleviate some of the
specific problems of single recommendation paradigm
approach. For instance, a purely collaborative system suffers
from the cold start problem for new users. Similarly, items
outside a user’s content profile will not be recommended in a
content-based system. Hence, a hybrid system, which has the
potential to provide synergies, is utilized to produce efficient
results.
Therefore, we propose a novel idea for a meta-level cum
switching hybrid recommender model that incorporates both
collaborative and content-based abilities into a single sys-
tem. The collaborative model contributes ratings (both actual
and predicted) and the content-based model makes the rec-
ommendations. Meta level hybridization lets us use the
model generated by the collaborative filtering as input for the
content-based system. When the recommender is unable to
function due to the shortcomings of one model, the
switching method is implemented. In this situation, the
segment unable to perform is ignored and the other segment
is executed. For instance, if the collaborative system is
unable to make a single prediction, that segment is ignored
and the hybrid model switches to a purely content-based
system. To optimize the proposed model further, the nor-
malized user ratings [16] is calculated prior to run time.
Similarly, the Pearson’s coefficient [17] (used during col-
laborative filtering) for every user or item pair can be
computed as new users are added into the system. The
proposed hybrid model aims to optimize the working and
make more accurate recommendations. In this paper, we
discuss the method of similarity computation in Sect. 2and
collaborative and content-based models are discussed in
Sects. 3and 4. The proposed approach for our novel method
is explained in Sects. 5. In Sect. 6, experimental results are
given and Sect. 7covers the conclusion.
2 Calculating Similarity
Personalized recommendations rely heavily on finding a
preference model of a given user. The similarity metric [18]
can be used to capture the intuition on how similar or
dissimilar the users are to one another. While there are
various approaches to calculating similarity such as Jac-
card’s similarity [19], Cosine similarity [20] etc. (e.g. [5,7,
8,19,20]), we here briefly review the Centered Cosine
similarity approach or Pearson’s correlation as given in (1),
which will be extended towards the remainder of this paper.
qX;Y¼cov X;YðÞ
rXrY
ð1Þ
When Pearson’s correlation coefficient is applied to a
population it is commonly represented by qand thus
it is known as population correlation coefficient. The
population correlation coefficient uses rxand ryas the
population standard deviations and cov X;YðÞas the popu-
lation covariance. Pearson’s correlation coefficient can also
be applied to datasets. For instance, consider one dataset {x
1
,
…,x
n
} containing nvalues and another dataset {y
1
,…,y
n
}
containing nvalues, then Pearson’s correlation coefficient
(denoted by r) is given in (2).
r¼rxy ¼nRxiyiRxiRyi
ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
nRx2
iRxi
ðÞ
2
q ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
nRy2
iRyi
ðÞ
2
qð2Þ
3 Collaborative Filtering
The idea behind collaborative filtering is using the collabo-
rative preferences of a group to make recommendations to
any other user. This group may consist of either users or
items. The key aspect in collaborative filtering is to find a set
of users similar to another user needing recommendations.
Assume that the user needing recommendation is X. The
similarities between users are calculated after comparing
their individual rating vectors, i.e. for a movie recommender,
the group of similar users would ideally be the ones who like
and dislike the same movies as user X. This group is referred
to as the neighborhood Nof X. The recommendations made
to user Xis based on the preferences of X’s neighborhood.
Collaborative filtering method is purely based on past
behavior, not the context and hence it does not require any
additional information. Thus this method can be used any-
where from e-commerce to retail outlets [4]. There are two
types of collaborative filtering algorithms: User-User [21]
448 K. Prakash et al.
and Item-Item [4]. The user-user collaborative filtering
approach makes rating predictions based on user pair simi-
larity i.e. it makes recommendations based on what the
user’s neighborhood have collectively liked in the past.
Whereas, item-item recommendation depends on how sim-
ilar the item is to the users’past preferences.
A user-item matrix (3) is created based on the user’s
purchased items, reviews and ratings as shown in Fig. 1.
Since no user could have rated all the items, rating prediction
becomes necessary to make future recommendations. The
rating that user Xwould give item Iis solely based on the k
Nearest Neighbors (kNN) [4]ofX−I. The neighborhood
model (Fig. 1) comprises of the kNN of user Xand every
item. The most preferred items from the neighborhood
model is recommended to User X.
R¼
R1;1 R1;n
.
.
.
.
.
.
.
.
.
Rm;1 Rm;n
2
6
43
7
5ð3Þ
4 Content-Based Filtering
Content-based recommender system suggests items to a
customer that are similar to previous items rated highly by
the same customer. Rather than user-user similarity, it
focuses on user-item similarity to make recommendations.
For each item, an item profile is created as shown in Fig. 2,
which is later used to build user profiles. The item profile
comprises of a set of features about the item such as title,
author, actor, director for movies, metadata and tags for
video and images etc. Each item profile can be envisioned as
a boolean or real valued vector. In the case of movies the
item profile is a boolean vector consisting of 0, 1 for each
actor, director etc. depending on whether that actor or
director participated in that movie. Once the item profiles are
created the next task is to create a user profile. For instance,
take a user who has rated items i
1
through i
n
, where r
1
through r
n
are the rating vectors, the simplest way to con-
struct a user profile from a set of item profiles is to average
the weighted item profiles [17].
Uxi ¼RiGxð4Þ
In the above formula (4), the User profile for user iand
feature xis given by the dot product of the rating vector of
user igiven by Riand the feature vector of xdenoted by Gx.
A variant of this is to normalize the rating as well as the
feature matrix. Normalizing ratings helps to capture the idea
that some ratings are actually negative and some are posi-
tive. But the baseline is that users are very different from
each other. Some users are generous in their ratings while
others are very critical. So for one user a 4/5 might be a
widely positive rating whereas for another user it may be an
average rating. In order to accommodate this, it is required to
baseline each user’s rating by their average rating and then
subtract the average rating from each of the individual rat-
ings. Once this normalization has been done, the profile
weights can be computed. Recommendations rely on both
user and item profiles. Each user profile is compared to
individual item profiles to calculate their similarity. Both the
user and item profile are vectors in a high dimensional space
and a good similarity metric between the pair of vectors is
the angle between them. The angle can be estimated using
the cosine similarity (5). This distance, U, is the cosine
similarity between the user Xand the item I. As the angle
decreases, Xand Iare more and more similar to each other
and it’s more likely that Xwill give a higher rating to item
I. Predictions can now be made by selecting the items with
the highest cosine similarity. These items are recommended
to the user.
Fig. 1 Collaborative filtering model
User and Item Preference Learning …449
Ux;iðÞ¼cosh¼xi
x
jj
i
jj ð5Þ
5 Proposed Hybrid Recommendation Model
In this paper we propose a novel hybrid recommender model
that incorporates both collaborative and content-based abil-
ities into a single system. In addition to combining the two
recommendation methods, our system also optimizes the
results by incorporating dual hybridization techniques. The
two techniques we are incorporating are—meta-level and
switching. The meta-level technique seeks to input the result
obtained by collaborative filtering into the content-based
system to get a more refined recommendation set. If it so
happens that either collaborative or content-based models
cannot generate recommendation scores, the meta-level
technique is abandoned and the hybrid model follows the
switching technique (Fig. 3). The switching technique
decides between the usages of either collaborative or
content-based system based on a certain condition. This
decision is made on the basis of data availability i.e. during a
cold start, it functions as a content-based recommender and
during item profile unavailability, collaborative recom-
mender is utilized. Our novel hybrid design (Fig. 3) follows
a 2 step procedure where collaborative filtering is first used
to predict the unknown ratings of a user, which (along with
his actual ratings) are sent as input into the content-based
system. The content-based system utilizes this input to
construct a stronger user profile and make better recom-
mendations. The ratings are calculated for one user at a time
and only his/her ratings (both actual and predicted) are sent
into the content-based system. Since we are using user-user
collaborative filtering, all user-pair similarities are calculated
using Pearson’s coefficient (2). The normalized rating
matrix, used for calculating Pearson’s coefficient, is obtained
using (6).
Rij ¼Rij Pn
j¼0Rij
ti
"# ð6Þ
R
ij
denotes the rating given by user ifor movie j, m and
nare the number of users and movies respectively and t
i
is
the number of rated movies by user i. Pearson’s coefficient
values for each user-pair ranges between −1 and 1, where
negative Pearson’s value denotes dissimilarity and positive
Pearson’s value denotes similarity. The magnitude of the
Pearson’s coefficient is used to quantify the extent of simi-
larity or dissimilarity. The resulting similarity metric is used
to find the neighborhood Nof User X-Item I. Each user-item
pair has a neighborhood of users who have rated that item
and whose likes and dislikes are a close match to that user.
The collaborative preferences of these users are used to
predict the ratings of user X. The neighborhood can consist
of any number of users and only depends the size of the data
set. After calculating the neighborhood of X, we can begin to
predict the ratings of X. Rating prediction is necessary since
no user would have rated all movies. The rating matrix will
therefore have many empty spaces. Predicting the rating of
user Xfor item Iis possible if and only if all the users is X’s
neighborhood have rated that item. Predicted similarity
X−Iis equal to the dot product of all the ratings for Iin
X−I’sneighborhood with their respective Pearson’s coef-
ficient divided by the summation of all Pearson’s coefficient
of the entire neighborhood.
Rx¼Pn
i¼1uiri
Pn
i¼1ri
ð7Þ
Fig. 2 Content-based filtering model
450 K. Prakash et al.
In the above Eq. (7), nis the number of users in the
neighborhood, u
i
is the rating of user iand r
i
is the Pearson’s
coefficient for user i. Using this, almost all missing ratings of
user Xcan be predicted as long as his/her neighborhood has
rated that item. The collaborative filtering algorithm requires
the calculation of similarity metric of each user-pair, which
is time consuming and inefficient if done and run time. Thus
to increase the efficiency of our program, we pre calculate
the average rating of each user as the ratings are entered.
This ensures that not all calculations are done at runtime.
The results from the collaborative filtering algorithm is
passed into the content-based recommender which utilizes
the ratings of user Xto calculate his/her user profile. The dot
product of the user profile with each item profile gives the
percentile preference. The similarity of user profile and item
profile is also calculated using cosine similarity. Content-
based filtering requires the creation of item profiles. For our
movie recommender system, each movie is classified into
different genres. Movies may belong to more than one genre,
and item profiles are generated for each movie based on the
genres they belong to. The item-genre matrix is simply a
boolean matrix where 1 denotes the presence of that genre in
the movie and 0 denotes its absence. Item profiles are created
on normalized data which is obtained after dividing each
entry by the square root of the total number of attributes in
that row (8).
Iij ¼item profile entry for item iand attribute j
ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
total number of attributes of item iðÞ
pð8Þ
The user profiles are calculated only for the user needing
recommendations. This ensures that unwanted computations
don’t take place. Just like item profiles, the user profiles are
calculated for different genres. To generate the user profile
for user X, we take the dot product of that user’s ratings with
each individual genre column. The user profile includes the
profile of all item attributes, i.e. all genres. Following the
creation of user and item profiles we compare each user
profile to individual item profiles and calculate their simi-
larity using cosine similarity. If a user profile and item
profile have a high similarity, we can infer that it would be a
good recommendation. The similarity is calculated for every
user-item pair. The items with the highest similarity metric
make up the recommendation list. This implies that the
smaller the distance between the two profiles, the larger their
similarity. Calculation of similarity for User Xand mitem
profiles is shown in (9).
cos h¼X
m
j¼1
UxIj
Ux
jj
Ij
ð9Þ
The value of similarity is calculated as cosh. As the angle
hdecreases, Xand Iare more and more similar to one other.
This implies that similarity is directly proportional to cosh.
The similarity of all the other user-item combinations are
calculated. The recommendations reflect the ones with the
highest similarity metric. The recommendations should only
include the items the user has not yet rated or purchased. We
need to thus verify that our list of recommendations doesn’t
have any redundant data. The recommended list is therefore
compared with the original rating matrix. If it so happens
that the user has already rated or purchased one of the items
in the recommended list, that item is replaced with the item
having the next highest similarity metric. This is done until
all the recommendations in the set are verified.
Fig. 3 Meta-level cum switching hybrid recommendation model
User and Item Preference Learning …451
6 Experimental Results
MovieLens [22] is an online database that provides datasets.
It has been collected by the GroupLens Research Project at
the University of Minnesota. It consists of 100,000 ratings
(1–5) from 943 users on 1682 movies and each user has
rated at least 20 movies. The ml-latest-small dataset contains
attributes of these 1682 movies. There are 17 genres and for
each genre, a value of 1 denotes that the movie belongs to
that genre and 0 otherwise. In this section the efficacy of our
proposed hybrid model is shown on a subset of MovieLens
dataset consisting of 7 users and 6 movies. Given below in
Table 1is the rating matrix computed from the dataset.
Since user preference is an emotional and psychological
aspect, it may so happen that each rating given by a user
could have a slightly more or less significance when com-
pared to another user’s ratings. In such cases, it becomes
customary to normalize the data (Table 2) before proceeding
forward. This helps remove the demographic of lenient and
strict raters.
In the above matrix, 0 corresponds to neither liking nor
disliking a movie whereas anything positive implies like and
anything negative implies dislike. The magnitude of the
ratings signifies how much a user likes or dislikes a movie.
If, at this stage, the rating prediction is not possible due to
the sparsity of the matrix, the system applies the switching
technique. When the switching technique is applied at this
step, the system ignores the collaborative approach and
continues to the content-based recommender. The content-
based recommender can work with a sparse matrix, thereby
making this an efficient solution. Else, if even one rating can
be predicted, the system continues using the meta-level
technique. Since rating prediction is possible for all
unknown ratings of user 1 in this dataset, our system con-
tinues using meta-level hybridization.
The above Table 3displays the Pearson’s coefficients of
users 2 through 7 when calculated with user 1. Pearson’s
coefficient is 0 for certain users. It suggests that their ratings
have been constant irrespective of the type of movie or
genre. Thus, these users’inputs become invalid. The next
step is to construct a neighborhood of users for every movie
not rated by user 1 using the kNN algorithm. For our dataset,
we will consider the 2 nearest neighbors. Therefore, the
neighborhood of each unrated movie would consist of two
users most similar to user 1 (who have a positive Pearson’s
coefficient when calculated with user 1) who have rated that
movie. Using the Pearson’s coefficient from Table 3, the
unknown ratings for user 1 can be predicted as shown in the
first row of Table 7. For any movie m, this is done by taking
the dot product of the ratings and the Pearson’s coefficients
of the 2 nearest neighbors of that movie and dividing it by
the summation of the Pearson’s coefficient of the two users
in that neighborhood. Ratings are left unpredicted or mapped
to 0 if the user-movie pair has a neighborhood less than 2
users. The predicted ratings, along with the actual ratings of
user 1 are sent as input into the content-based system.
The item profile matrix/item attribute matrix (Table 4)is
a boolean matrix where every entry corresponds to either a 1
Table 1 Rating matrix Users/movies M1 M2 M3 M4 M5 M6
U1 4 2 1
U2 3425 2
U3 5 1 4
U4 32 414
U5 5 1 5
U6 1 2 2
U7 235
Table 2 Normalized rating
matrix Users/movies M1 M2 M3 M4 M5 M6
U1 1.666666 0 −0.33333 0 −1.33333 0
U2 −0.2 0.8 −1.2 0 0 −1.2
U3 0 1.666666 0 −2.33333 0.666666 0
U4 0.2 0 0 1.2 −1.8 1.2
U5 0 0 1.333333 −2.66666 0 1.333333
U6 −0.66666 0 0.333333 0 0.333333 0
U7 0 −1.33333 0 −0.33333 0 1.666666
452 K. Prakash et al.
or 0 depending on weather the movie belongs to that genre
or not. We are considering 6 genres namely Adventure, Action,
Romance, Drama, Mythical, Sci-Fi and each move belongs to
at least one of them. As discussed above, normalized values
ensures a much more accurate prediction, the following
Table 5shows the normalized item-profile matrix obtained by
diving each non-zero value by the square root of the row sum.
Table 5shows the normalized matrix. Each row signifies
the item-profile for the corresponding movie. User profile for
user 1 is generated for each genre by taking the dot product
of his/her ratings for movies M1 through M6 with the
individual genre columns. To get purely content-based
results, only the actual ratings of user 1 are considered for
calculation and not the predicted ratings. This would be
applied in situations where no predictions can be made using
collaborative filtering and the system changes to the
switching technique. The purely content-based system
results is tabulated in the second row of Table 7. As for the
hybrid system, we combine both the actual and predicted
ratings to get a more thorough user profile (Table 6).
The user profile generated above in Table 6is a vector of
user 1’s preferences. Using cosine similarity on both user 1’s
profile and all the other movie profiles one at a time, we
calculate his/her predictions. The final results, as shown in
the third row of Table 7, are the predictions using our
Hybrid Recommendation Model which incorporated both
collaborative and content-based methods using meta-level
hybridization.
Table 3 Pearson’s coefficient
when compared with user 1 User id U2 U3 U4 U5 U6 U7
Pearson’s coefficient when
calculated with user 1
0.017758 −0.13977 0.514270 −0.06299 −0.94491 0
Table 4 Item-attribute table Movie/genre Adventure Action Science fiction Drama Romance Mythical
M1 1 1 0 0 0 1
M2 1 1 0 0 0 0
M3 0 1 0 0 0 0
M4 1 1 1 0 0 0
M5 0 0 0 1 1 1
M6 1 0 1 0 0 0
Table 5 Normalized item profile
matrix Movie/genre Adventure Action Science fiction Drama Romance Mythical
M1 0.577350 0.577350 0 0 0 0.577350
M2 0.707106 0.707106 0 0 0 0
M3 0 1 0 0 0 0
M4 0.577350 0.577350 0.577350 0 0 0
M5 0 0 0 0.577350 0.577350 0.577350
M6 0.707106 0 0.707106 0 0 0
Table 6 User profile for hybrid
system Genre Adventure Action Science fiction Drama Romance Mythical
U1 1.102745 −0.083148 1.915928 −0.879090 −0.879090 −0.603481
Table 7 Predicted similarity for
user 1 through collaborative,
content-based and hybrid
recommender
Predicted similarity for
user 1
M1 M2 M3 M4 M5 M6
Collaborative system 4 2.066757 2 4.033378 1 3.933243
Content-based system 0.645668 0.705455 0.394332 0.576002 −0.48767 0.42662
Hybrid recommender 0.253563 0.414456 −0.01066 0.656559 −0.54561 0.811655
User and Item Preference Learning …453
According to the third row of Table 7, the top 3 movie
recommendations for user 1 would be M6, M4, M2. Since
the similarity metric for M6 is high, we can say that the
distance between profile of user 1 and M6 is small. It may so
happen that some of the recommended movies might have
already been watched and rated by the user, therefore these
recommendations become futile. Hence, we need to modify
the recommendation list to only include movies the user has
not yet seen. From the rating matrix (Table 1) we can
observe that user 1 has not watched any of the movies in the
recommended list, hence we can display these recommen-
dations. Comparing the predicted values of collaborative,
content-based and hybrid from Tables 4,7and 8respec-
tively, certain observations can be made. The collaborative
prediction for M2 is 2.066757, which suggests that it is not a
very good recommendation but its content-based score is
rather high at 0.705455. Since both recommendation sys-
tems give varying predictions, it becomes very hard to
decide which result to display. To alleviate this problem, we
use our proposed meta-level hybrid model. Our novel hybrid
model shows that the similarity metric of M2 is rather
average at 0.414456. This therefore lets us recommend better
movies than M2 to the user. Similarly, the collaborative
score for M6 is quite high whereas its content-based pre-
diction is average. When the resulting hybrid model is
observed, M6 has a very high similarity metric. This
emphasizes the fact that the neighborhood of user 1 is much
more versatile than the item profile information. Hence, a
purely content-based system would not have been able to
predict this movie correctly. This way the Hybrid Recom-
mender discovers beyond the narrow view of the
content-based model.
The above Fig. 4is constructed based on Tables 7and 8.
It diagrammatically shows the predicted similarity metric of
all users 1 through 7. Each color represents different users
and their similarities for movies 1 through 6. Similarity
metrics greater than zero denote a positive preference and
ones lesser than zero denotes negative preference. For
instance, it is observed that users 1, 2, 4 and 6 have a
positive preference to M4 whereas the rest have a negative
preference to it. It can also be observed that users 1 and 2
like the movie slightly better than user 4 and substantially
better than user 6. Similarly, if we consider user 1’s pref-
erences, it can be noted that he/she likes movies 1, 2, 4 and 6
and dislikes the rest. The magnitude of like and dislike can
also be assessed through Fig. 4. Hence, a good recommen-
dation set for user 1 would be movies 6 and 4 since they
have high similarity. Furthermore, as observed in Fig. 4,no
movie recommendations can be made for user 5 through
meta-level hybrid model (since user 5 has negative prefer-
ence to all movies), hence, we display the recommendations
using the switching technique. Since we already have the
predicted ratings obtained during collaborative filtering, we
can make recommendations based on those predictions. The
two highest rating predictions for user 5 are movies 2 and 5
as observed in the first row of Table 7and therefore they
would make good recommendations.
7 Conclusion
With the ever increasing number of services and products on
the web, a recommender system is a solution much in
demand that can optimize the options available and push
forward the choices one is looking for from the rest. By
methods of content-based and collaborative filtering we can
have recommendations based on either a user’s lone pref-
erence for similar items or based on the preferences of other
Table 8 Predicted similarity
through hybrid recommender
system for all users
Users/movies M1 M2 M3 M4 M5 M6
U2 0.497846 0.464373 −0.00147 0.439517 0.703833 0.539335
U3 −0.43975 −0.3841574 −0.18637 −0.77806 0.182883 −0.82114
U4 0.091868 0.3660328 0.094159 0.64425 −0.67274 0.722462
U5 −0.50576 −0.5774956 −0.17255 −0.89765 −0.10271 −0.97738
U6 −0.45548 −0.3072973 −0.69508 0.074837 −0.26302 0.583155
U7 −0.77766 −0.851328 −0.45691 −0.45579 0.082552 −0.23515
-1
0
1
M1 M2 M3 M4 M5 M6
SIMILARITY
MOVIE ID
User 1 User 2 User 3 User 4 User 5 User 6 User 7
Fig. 4 Similarity metric representation for all users
454 K. Prakash et al.
similar users, collectively called a neighborhood. While
functioning independently, the above two methods have
certain flaws. Content-based systems cannot make predic-
tions outside of the user’s content profile and collaborative
systems cannot make recommendations for cold start prob-
lems. To alleviate these issues, these two methods are
combined to make a hybrid recommender system.
We proposed a novel idea of a hybrid model that incor-
porates the advantages of both the above algorithms into a
single system. The proposed system is classified as both
meta-level and switching since it alternates between the two
techniques to achieve an optimal functioning model. As
defined in a meta-level system, the collaborative model con-
tributes predictions (if any) which are used by the
content-based model to generate recommendations. If no
input is available, it alternates to the switching model. The
proposed hybrid recommendation system can be used on any
e-commerce website to recommend items to the users. Since it
combines both collaborative and content-based filtering to
provide a single result, it eliminates the need for two indi-
vidual and separate recommenders that many websites cur-
rently use. A single set of refined recommendations will be
more efficient than providing many lists for the user the sort
through and choose from. In addition, since our hybrid system
uses both switching and meta-level techniques, it can cater to
the needs of new stores even though they only have a small
user base. An extension of the same system can to be used in
websites that don’t have a user database, which would
rely only on the screen time and click ratio rather than user
ratings.
8 Recommendations
The proposed hybrid recommendation system can be used
on any e-commerce website to recommend items to the
users. Since it combines both collaborative and content
based filtering to provide a single result, it eliminates the
need for two individual and separate recommenders that
many websites currently use. A single set of refined rec-
ommendations will be more efficient than many unrelated
lists for the user the sort through and choose from. In
addition, since our hybrid system uses both switching and
mixing of techniques, it can cater to the needs of new stores
even though they only have a small user base. An extension
of the same system can to be used in websites that don’t have
a user database, which would rely only on the screen time
and click ratio rather than user ratings. The applications of
such a system can be witnessed not only online but also in
retail stores that measure the user model based on previous
user purchases and make recommendations through any
form of electronic media.
References
1. Yang, X., Steck, H., Liu, Y.: Circle-based recommendation in
online social networks. In: Proceedings of the 18th ACM SIGKDD
International Conference on Knowledge Discovery and Data
Mining—KDD ’12 (2012)
2. Qian, X., Feng, H., Zhao, G., Mei, T.: Personalized recommen-
dation combining user interest and social circle. IEEE Trans.
Knowl. Data Eng. 26, 1763–1777 (2014)
3. Ekstrand, M.: Collaborative filtering recommender systems.
Found. Trends® Hum. Comput. Inter. 4,81–173 (2011)
4. Herlocker, J., Konstan, J., Borchers, A., Riedl, J.: An algorithmic
framework for performing collaborative filtering. ACM SIGIR
Forum. 51, 227–234 (2017)
5. Li, H., Cai, F., Liao, Z.: Content-based filtering recommendation
algorithm using HMM. In: 2012 Fourth International Conference
on Computational and Information Sciences (2012)
6. Rashid, A., Karypis, G., Riedl, J.: Learning preferences of new
users in recommender systems. ACM SIGKDD Explor. Newsl 10,
90 (2008)
7. Amato, G., Straccia, U.: User profile modeling and applications to
digital libraries. In: Research and Advanced Technology for
Digital Libraries, pp. 184–197 (1999)
8. Choi, K., Suh, Y.: A new similarity function for selecting
neighbors for each target item in collaborative filtering. Knowl.
Based Syst. 37, 146–153 (2013)
9. Avadhut, D.M.: Novel weighted hybrid approach in recommen-
dation method. Int. J. Eng. Comput. Sci. (2017)
10. Sattar, A., Ghazanfar, M., Iqbal, M.: Building accurate and
practical recommender system algorithms using machine learning
classifier and collaborative filtering. Arab. J. Sci. Eng. 42, 3229–
3247 (2017)
11. Lekakos, G., Caravelas, P.: A hybrid approach for movie
recommendation. Multimed. Tools Appl. 36,55–70 (2006)
12. Zanker, M., Jessenitschnig, M.: Case-studies on exploiting explicit
customer requirements in recommender systems. User Model.
User-Adap. Inter. 19, 133–166 (2008)
13. Cremonesi, P., Turrin, R., Airoldi, F.: Hybrid algorithms for
recommending new items. In: Proceedings of the 2nd International
Workshop on Information Heterogeneity and Fusion in Recom-
mender Systems—HetRec ’11 (2011)
14. Lampropoulos, A., Lampropoulou, P., Tsihrintzis, G.: A
cascade-hybrid music recommender system for mobile services
based on musical genre classification and personality diagnosis.
Multimed. Tools Appl. 59, 241–258 (2011)
15. Zanker, M.: A collaborative constraint-based meta-level recom-
mender. In: Proceedings of the 2008 ACM Conference on
Recommender systems—RecSys ’08 (2008)
16. Wang, Y., Chin, K.: Technical importance ratings in fuzzy QFD
by integrating fuzzy normalization and fuzzy weighted average.
Comput. Math Appl. 62, 4207–4221 (2011)
17. Benesty, J., Chen, J., Huang, Y., Cohen, I.: Pearson correlation
coefficient. In: Noise Reduction in Speech Processing, pp. 1–4 (2009)
18. Pirró, G.: A semantic similarity metric combining features and
intrinsic information content. Data Knowl. Eng. 68, 1289–1308
(2009)
19. Chahal, M.: Information retrieval using Jaccard similarity coeffi-
cient. Int. J. Comput. Trends Technol. 36, 140–143 (2016)
20. Ye, J.: Cosine similarity measures for intuitionistic fuzzy sets and
their applications. Math. Comput. Model. 53,91–97 (2011)
21. Linden, G., Smith, B., York, J.: Amazon.com recommendations:
item-to-item collaborative filtering. IEEE Internet Comput. 7,76–
80 (2003)
22. Harper, F., Konstan, J.: The Movielens datasets. ACM Trans
Interact. Intell. Syst. 5,1–19 (2015)
User and Item Preference Learning …455
Using a Simulation Game to Teach
the Concept of ERP
Jennifer Nightingale
Abstract
For decades, research has shown how the use of
simulations can make a positive impact on student
learning. Simulations have the potential to engage
students in a higher level of learning that allows
understanding of concepts as opposed to rote learning
where students “delete”concepts from their brains as
soon as they have completed related assessment activ-
ities. Simulations are among the most often used
pedagogies in industry and government. While the
simulations that are used in industry can be much more
complex than those integrated into the curriculum,
simulations can be extended to student instruction with
careful curriculum development. Because undergraduate
students have little to no business experience, it can be
difficult to understand the concept of Enterprise
Resource Planning (ERP) systems. Additionally,
post-secondary environments may not have the funding
needed to support an ERP for curricular reasons.
A simulation game, such as Lemonade Tycoon, can
engage students in learning about different modules
included in ERP systems along with the concepts of
CRM. This simulation or strategy game allows students
to manage their own lemonade stand and are respon-
sible for paying rent, hiring staff, purchasing assets and
ingredients, manufacturing the product, and collecting
customer feedback. These tasks dovetail with several
modules included within an ERP such as Manufactur-
ing, Financials, Human Resources, and Sales and
Marketing. The use of a simulation in the classroom
validates the importance of how information systems
are critical to everyone within an organization, not just
the IT staff, while involving the students in their own
learning.
Keywords
ERP Simulation Active learning CRM
Experiential learning
1 Introduction
For decades, instructors have gradually incorporated a
variety of instructional technologies into the classroom as a
form of experiential learning, one of which is the use of
simulations. The Millennials, a generation that has always
been immersed in technology, have learning expectations,
styles, and needs different from previous generations [1–3]
and, because they embrace multiple means of self-
expression, experiential learning is important.
The 21st century students have spent their lives in a
technology-rich environment. These students, a new gener-
ation of technology-savvy individuals, possess exceptional
levels of skill with information technology. They think about
and use technology very differently from earlier student
cohorts and are characterized as preferring teamwork,
experiential activities, and the use of technology [4]. To
keep today’s students’attention in the classroom,
“faculty must toss aside the dying notion that a lecture and
successive reading assignment are enough to teach the
lesson”[2].
Simulations are one way in which high school, under-
graduate, and MBA students can benefit from a hands-on
experience of running a company and how making deci-
sions can directly affect performance. While the most
common use of simulations is in the corporate environment,
simulation games are being used in academic settings to
teach students about decision making and problem solving
in business. Additionally, students are not only able to
acquire an overall understanding of the business world, but
will also gain awareness of the skills that are essential to
succeed.
J. Nightingale (&)
Slippery Rock University of Pennsylvania, Pennsylvania, USA
e-mail: jennifer.nightingale@sru.edu
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_51
457
2 Business Model-Type Simulations
From manufacturing to government, regardless of what
industry or sector, simulations are used in a variety of ways
to train employees on specific skills or processes. For
example, factory workers in an organization’s supply chain
can learn how to use an expensive or dangerous piece of
machinery prior to operating it. Military personnel can learn
to fly via the use of simulations before they even leave the
ground. The use of simulations allows the organization to
protect the safety of its employees while maintaining the
value of its assets.
2.1 Simulation Categories
Hall [5] classifies these types of simulations into six cate-
gories. Each category addresses different training require-
ments and outlines different design and usage issues.
Moreover, simulations can be classified based on the type of
interaction in which learners participate: interaction between
groups of learners and whether the trainer or the learners use
them.
•Total Enterprise Simulations. Give a general overview
of a company and give experience of making executive
management decisions. Hall [5] places these simulations
into four subgroups: strategic management, business
appreciation, tactical management and totality
simulations.
•Functional Simulations. Focus on each of the functional
areas of business while ensuring that financial aspects are
addressed within each business function.
•Concept Simulations. Short simulations ranging from
two to four hours and include three to four decisions.
While this type focuses on specific business issues and
concepts, they are used to reinforce a topic, test partici-
pants’understanding of an issue or concept and offer a
change of pace to participants.
•Planning Simulations. Focus on “what-if”analysis.
These simulations are best if used where managers need
to recognize the business implications of a topic.
•Process Simulations. Based on mathematical models and
used in such tasks such as forecasting, inventory plan-
ning and market share analysis. These simulations stress
that using a quantitative technique or analysis method is
only part of the objective. The facts and details must be
considered when interpreting the results. Additionally,
there needs to be a balance between the quantitative and
qualitative issues.
•Other Simulations. These include simulations such as
“role-playing activities such as sales negotiation, where a
planning simulation is linked to a total enterprise simu-
lation or a functional simulation or where the simulation
has a defined branching structure”[5].
2.2 Simulations in a Business Environment
Using simulated environments in business is not a new
concept. Organizations implement simulations in business to
minimize risk and make better decisions. It allows employ-
ees to manipulate a variety of parameters, such as quantity
and expenses, to determine how these variables will affect
the bottom line. Duggan [6] explains that simulation models
can give employees “a graphical display of information that
can be edited and animated, showing [them] what might
happen if [they] take certain actions.”Once employees have
acquired the desired knowledge, they can apply the results to
their business, helping them with risk management and
decision making.
Situations in which simulations are used in business
include training, process improvement, predictive modeling
and managing risk. The use of business simulations creates a
more practical experience where concepts can be applied to
real-world decision making. These simulations engage the
user via a competitive environment [7].
Training allows users to engage in complex processes vis-
à-vis a realistic environment. The United States Department
of Agriculture (USDA) developed an e-learning simulation
to help 400–500 human resources managers across the U.S.
learn how to use PeopleSoft’s human resources management
system, giving users step-by-step directions for entering
new employee data [8]. Gannage [7] explains that “learning
by doing in a virtual environment greatly improves knowl-
edge retention and stimulates one’s desire to learn and
grow.”
By using simulations to help evaluate business processes,
analysts have the ability to assess the effectiveness of the
process and improve them as needed. Generally, a simula-
tion model will focus on a functional area such as manu-
facturing or marketing. In manufacturing, for example,
analysts can identify bottlenecks and simulate incremental
changes to see the effect the modification has on the pro-
duction line [6]. Once the optimal solution has been dis-
covered through trial and error within the simulation,
management can implement the change within the
organization.
Predictive modeling is a process that uses data mining
and probability to forecast various outcomes. Once data is
collected, a statistical model ranging from a simple linear
equation to a complex neural network mapped out by
sophisticated software [9]. Predictive modeling has been
used not only in weather prediction, but also in Bayesian
458 J. Nightingale
spam filters and target marketing. Walmart discovered that
U.S. consumers like to purchase Pop-Tarts just before a
hurricane hits. Not just any flavor of Pop-Tarts however, as
American consumers prefer strawberry Pop-Tarts. Wal-
mart’s analysis found that stores would sell seven times
more strawberry Pop-Tarts before a hurricane hits than at
any other time [10].
3 The Experiential Learning Theory
There is no question that ERP has had a substantial effect on
organizations from business to government to academia. In
1955, the RAND Corporation developed the first modern
business simulation—Monopologs—that required its par-
ticipants to perform as inventory managers in a simulation of
the U.S. Air Force logistics system [11]. In 1956, the
American Marketing Association (AMA) developed the first
widely known business game, Top Management Decision
Simulation, for use in management seminars administered
by the AMA. Shortly thereafter, the Top Management
Decision Game was created by Schreiber. This was the first
business simulation game known to have been used in a
business policy class at the University of Washington in
1957 [12].
Since the onset of simulation game development and
usage, the number of games has grown exponentially and
many studies have reported on business simulation usage in
the postsecondary education environment. Researchers
concluded that the use of simulations is one of the best ways
to teach millennials as recent business graduates are expec-
ted to have developed a “process orientation”and an “inte-
grated view”of business [13]. Faria states that simulations
have been used in business schools for six decades and in
1962, a survey of AACSB member schools reported that
over 71% of these schools were using simulations in at least
one of its courses [12].
Many refer to simulations as a method of experiential
learning where interaction is required for learning to occur.
Kolb [14]defines experiential learning as the “process
whereby knowledge is created through the transformation of
experience.”This definition embodies six basic conventions:
•Learning is a process, not an outcome.
•Learning derives from experience.
•Learning requires an individual to resolve dialectically
opposite demands of grasping and transmitting
experience.
•Learning is holistic and integrative.
•Learning requires interaction between person and the
involvement.
•Learning results in knowledge creation [14–16].
Additionally, Kolb’s ELT suggests that people primarily
learn in four ways: affectively, perceptually, symbolically,
and behaviorally [14,15].
The four methods within the ELT, its associated abilities
and the skill development that accompanies each method are
outlined by Kumar and Bhandarker in Table 1. The learning
process begins with a concrete experience, which becomes
the foundation for observations and reflections. The obser-
vations and reflections are then combined to reach a concept
or theory, then the concepts or theories can be further tested
and serve as the guides for creating new experiences, where
the entire cycle begins again with another concrete experi-
ence [17].
The experiential learning theory continues to be one of
the most influential theories of management learning today.
Although many have scrutinized the ELT, it continues to
exercise significant impact in management learning and
education despite dogged criticism from various research
scholars [16]. Some of the Association of Business Simu-
lations and Experiential Learning (ABSEL) researchers
believe that experiential learning “is a bit simplistic to
consider that the student is motivated by the exercise alone;
one needs to also consider the context in which the exercise
is introduced and administered, and the instructor doing
that”[18]. Additionally, they argue that “the process of
‘experiential teaching’may in fact facilitate learning, by first
influencing the instructor to make more enthusiastic class
Table 1 Methods associated
with experiential learning Method Expected participant behavior Innate abilities required Skill
development
Concrete
experience
Immerse oneself in the
environment
Intuitive and affective
responses to the situation
Affective
(sensing/feeling)
Reflection
observation
Tentative and impartial
perspective toward the
learning situation
Willingness to patiently
consider many possible
alternatives
Perceptual
(observing)
Abstract
conceptualization
Remain focused and avoid
distractions
Logical thinking and
rational evaluation
Symbolic
(thinking)
Active
experimentation
Receptive to experiment and
think beyond the obvious
Action orientation and
risk-taking behavior
Behavioral
(acting)
Using a Simulation Game to Teach …459
presentations”[18]. Regardless of which perspective the
focus is placed, it is evident that the experience creates an
environment that is conducive to building a level of
knowledge transfer.
4 Using a Simulation to Introduce ERP
As many organizations have been successful in using sim-
ulations as a training method, experiential learning has been
proven successful in implementations with leading organi-
zations around the world, including GlaxoSmithKline,
Hewlett-Packard, IBM, Delta Airlines, United States Postal
Service, FedEx, T-Mobile and John Deere [19]. Companies
use simulation tools to develop employee skills and capa-
bilities at all levels within the organization. In academia, the
proficiencies formed through using business simulations
ultimately improve both theoretical and applied knowledge,
which then easily translates into the business world [9].
4.1 Today’s College Students
American college students include game play in their college
experience just like studying and partying. The Pew Internet
Research found that “70% of college students play video
games at least ‘once in a while’” and suggested that almost
half skip studying to play video games [20].
Because of today’s college students’vast desire to play
video games, business simulations can appeal to them. First, it
generates a risk-free learning environment where not only the
acceptance of failure exists, it gives the ability for participants
to learn from their mistakes. Second, business simulations
create an environment where students have the ability to
interact with other players in either a collaborative or com-
petitive manner. Third, because of a simulation’s capability to
be more engaging, students can receive real-time feedback on
the decisions they make while playing. Next, in business
management games, students can fully immerse themselves
by “becoming the protagonists of their company’s story, and
determining its faith through decisions made in a volatile
environment. Not only does this give students a greater sense
of purpose, but they will be much more like ly to think carefully
about their actions when they don’t only exist in theory”[21].
Finally, students are able to earn rewards, such as badges and
rankings, which can serve as the students’own indicator of
how he or she is progressing through the simulation [22].
4.2 Experiential Learning and ERP
Much has been written about how ‘learning by doing’
increases the level of retention and there is no question that
experiential learning is popular within business schools.
Several studies have focused on using simulations to teach
the concept of ERP and researchers have had positive
results. Seethamraju [13] found that “the ERP simulation
game helped students appreciate the significance of pro-
cesses and their management, in addition to making it easy
and fun to acquire much sought-after software skills that
could potentially enhance their employability.”Shen [23]
results indicated that student knowledge of ERP’s role in
supporting business processes increased significantly after
participating in simulation activities. Chen, Keys, and Gaber
learned the following by integrating ERPsim into the
classroom.
…the antecedent effects of two important IS constructs
(enjoyment and cognitive appraisal) on learning behavior
and learning outcomes during students’involvement with
ERPsim. The study provides empirical evidence that some
major IS constructs (i.e., enjoyment and cognitive appraisal
of using information systems) play important roles in
shaping the effectiveness of using simulation game software
to learn business processes and ERP software [24].
Finally, [25] results indicate that the use of an ERP
simulation game enhanced student learning and influenced
student attitudes toward ERP.
4.3 Using Lemonade Tycoon as a Method
to Teach ERP
Using a strategy game to facilitate ERP is a more
cost-effective method than having to spend thousands of
dollars to participate in academic programs established by
SAP or Oracle. Lemonade Tycoon is one of many strategy
games that can be used to teach business concepts and is
available online with either a one-hour trial, $6.99 unlimited
use or for $4.95 per month with an “Unlimited Shockwave”
10-day free trial [26].
Once the instructor introduced students to the simulation,
students worked individually to become acclimated to the
game. Students then worked in teams to see how success-
fully they could manage the business. Once the teams
operated the business for a virtual week, they were asked to
compile data based on their performance. Data analysis was
based on each team’s performance and teams were asked to
respond to specific questions for data analysis. Team rank-
ings were posted for the class to review. Finally, students
were given another opportunity to manage their business and
improve their performance. Upon completion, teams dis-
cussed the changes that they made along with whether it
aided in positive or negative results. When lesson com-
menced, students were asked to submit feedback based on
both their experience and knowledge of ERP and complete
the following:
460 J. Nightingale
Assignment 1. You have become a business owner—
congratulations! Your investors want you to report how
you’re progressing, so they know they made the right
decision with investing in you.
What to do:
•Download Lemonade Tycoon. You have a free 60 min
trial, so be sure you’re ready to get started when you run
the program.
•Run your business for 1 week.
–You will need to purchase inventory.
–Consider hiring employees and purchasing upgrades.
–Pay attention to your daily results. Think about how
you can improve your sales and minimize costs.
Make adjustments as needed.
Answer the following questions in a Word document
•What did you learn about running your own business?
•What adjustments did you make to increase sales or
minimize costs?
•How do different functional areas (i.e., accounting,
HR) need data from other areas to operate efficiently?
•Insert your screenshots (Charts, Profit and Loss, and
Balance Sheet) and explain what each one is telling you
about your business.
To reinforce the learning experience, students were then
asked to select another strategy game, such as Monopoly
Tycoon, RollerCoaster Tycoon, or My Fantastic Park, and
asked to complete the following:
Assignment 2. You were so successful with your
Lemonade Stand that you have decided to branch out.
What to do:
•Download the selected strategy game. You have a free
60 min trial, so be sure you’re ready to get started when
you run the program.
•Run your business for 1 week.
–Purchase inventory as needed.
–Hire employees and purchase upgrades as needed.
–Improve your sales and minimize costs as needed.
Answer the following questions in a Word document
•Why did you select this game? How is it similar
to/different from Lemonade Tycoon?
•Discuss how this game relates to an ERP?
•Does it have a CRM component? If yes, explain.
•What did you learn about running your own business?
•What adjustments did you make to increase sales or
minimize costs?
•How do different functional areas (i.e., accounting,
HR) need data from other areas to operate efficiently?
•Insert screenshots and explain what each one is telling
you about your business.
The methodology and evaluation strategy used in this
lesson informally aligned with Kirkpatrick’s Framework
[27] and Bloom’s Taxonomy. Although Kirkpatrick’s
Framework is generally used when evaluating corporate
training programs, Schumann, Anderson, Scott, and Lawton
adapted the framework to the college setting and assessed
the effectiveness of simulation exercises [28]. The frame-
work consists of four levels of evaluation that include
measuring the reactions of the students, the level of learning
that took place, the behavior of the learners and whether the
learners are using what they learned, and the extent to which
results are improved [27,28].
Level 1. Kirkpatrick’sfirst level of evaluation—reaction
—measures how the participants feel about the experience
[27]. This data was not only useful for the instructor to
assess the success of the learning experience, but addition-
ally to gain suggestions for future improvements. The
anecdotal feedback was positive. Not only did this instruc-
tional instrument result in a more affordable method to
facilitate business and ERP concepts, students found this
easier to comprehend versus the instructor’s previous
chalk-and-talk methodology as it was more “relatable.”
Students felt that simulation created an interactive experi-
ence that visually enhanced the concepts being taught and
thought it was a “cool”way to teach a concept that initially
seemed to be extremely confusing.
Level 2. The second level of the framework is learning.
Kirkpatrick [27] outlines learning as the degree in which
participants change attitudes, improve knowledge, or
increase skill because of the simulation. Upon completion,
students were asked how different functional areas (i.e.,
accounting, marketing, human resources) need data from
other areas to operate efficiently. They quickly learned that
for every action there was a reaction, meaning that if they
raised the price of the product, it would affect sales, which
would affect other functional areas such as accounting.
Level 3. Kirkpatrick’s third level of evaluation is
behavior. In a corporate environment, behavior could pertain
to whether the trainees are applying what they learned in the
training program to tasks within their own job responsibili-
ties. Simulations may be an effective technique to support
the transfer of learning from the simulation to other settings.
Students were asked what they learned about running their
own business and to explain the adjustments they made to
increase sales or minimize costs. They were given the initial
guidance to purchase inventory, consider hiring employees
and purchasing upgrades, and to pay attention to the daily
Using a Simulation Game to Teach …461
results. From doing so, they were asked to make adjustments
as needed.
Level 4. The fourth level in Kirkpatrick’s Framework is
results. Results denote the degree to which the output of the
participant’s workgroup or organization has improved
because of the experience [27]. Schumann, Anderson, Scott,
and Lawton express that there is a “void in the literature that
reports the effect of simulation exercises on results either
from the student’s or from the employer’s perspectives”and
that the “direction of research would need to determine the
degree to which the simulation experience accounts for
different results”[28]. This can pose challenges in both
measurement and research design.
5 Future Research
A more formalized methodology needs to be developed that
includes both Kirkpatrick’s Framework and Bloom’s Tax-
onomy—specifically higher order thinking skills such as
synthesis and application. Additionally, more data needs to
be collected to assess whether a simulation game meets the
sufficiently fulfills the objectives set forth in the course
description. Anecdotal feedback served as an adequate
starting point to determine that Lemonade Tycoon had the
potential to educate students about business concepts such as
ERP. However, as recommended by Schumann, Anderson,
Scott, and Lawton, if the results for the four levels of
Kirkpatrick’s Framework are “combined into one holistic
assessment, researchers may be able to draw inferences and
make tentative conclusions”[28]. By combining research
across the range of the framework, a sufficient pool of evi-
dence could aid in interpreting the value of simulations in
post-secondary curricula.
6 Conclusion
Methods that allow students to draw their own conclusions
based upon personal experiences appear to facilitate learn-
ing. A simulation game, such as Lemonade Tycoon, can
engage students in learning about different modules included
in ERP systems along with the concepts of CRM. This
simulation or strategy game enables students to manage their
own lemonade stand. Furthermore, students are responsible
for paying rent, hiring staff, purchasing assets and ingredi-
ents, manufacturing the product, and collecting customer
feedback. These tasks dovetail with several modules inclu-
ded within an ERP such as Manufacturing, Financials,
Human Resources, and Sales and Marketing. The use of a
simulation in the classroom validates the importance of how
information systems are critical to everyone within an
organization, not just the IT staff, while involving the stu-
dents in their own learning.
References
1. Murphy, B., Smark, C.: Convergence of learning experiences for
first year tertiary commerce students: are personal response systems
the meeting point? J. Am. Acad. Bus. 10(1), 186–191 (2006)
2. Oblinger, D.G., Oblinger, J.L.: Educating Net Gener. EDU-
CAUSE, Boulder, CO (2005)
3. Skiba, D.J., and Barton, A.J.: Adapting your teaching to accom-
modate the net generation of learners [electronic version].
Online J. Issues Nurs. 11(2) (2006). Retrieved 25 May 2017,
from ProQuest Nursing and Allied Health Source database
4. Kvavik, R.B.: Convenience, communications, and control: how
students use technology. In: Oblinger, D.G., Oblinger, J.L. (eds.)
Educating the Net Generation. Educause, Boulder, CO (2005)
5. Hall, J.J.S.B.: Types of Simulation [V0.0 25/01/11]. Chapter 1:
Types of Simulation, pp. 1–16 (2011)
6. Duggan, T.: Application of Simulation in Business. http://
smallbusiness.chron.com/application-simulation-business-73684.
html. Last accessed 28 July 2017
7. Gannage, G.: The Use of Simulations in Business. http://
onlinelearningtips.com/2013/05/the-use-of-simulations-in-
business. Last accessed 31 July 2017
8. Hoffman, T.: Sidebar: The USDA’s e-Learning Simulation,
ComputerWorld, 2003/08/04. http://www.computerworld.com/
article/2571111/it-skills-training/sidebar–the-usda-s-e-learning-
simulation.html. Last accessed 31 July 2017
9. TechTarget Network: website. http://searchdatamanagement.
techtarget.com/definition/predictive-modeling. Last accessed 1
Aug 2017
10. Girard, J.P.: Diapers, Pop-Tarts, and Dog Food, Prairie Business
Magazine. http://www.johngirard.net/diapers-pop-tarts-and-dog-
food. Last accessed 1 Aug 2017
11. Jackson, J.R.: Learning from experience in business decision
games. Calif. Manag. Rev. 1(1), 23–29 (1959)
12. Faria, A.J.: Business simulation games: current usage levels—an
update. Simul. Gaming 29(3), 295 (1998)
13. Seethamraju, R.: Enhancing student learning of enterprise integra-
tion and business process orientation through an ERP business
simulation game. J. Inf. Syst. Educ. 22(1), 19–29 (2011)
14. Kolb, D.A.: Experiential learning: experience as the source of
learning and development. Prentice-Hall, Englewood Cliffs, NJ
(1984)
15. Kolb, A., Kolb, D.A.: Learning styles and learning spaces:
enhancing experiential learning in higher education. Acad. Man-
age. Learn. Educ. 4(2), 193–212 (2005)
16. Kayes, D.C.: Experiential learning and its critics: preserving the
role of experience in management learning and education. Acad.
Manage. Learn. Educ. 1(2), 137–149 (2002)
17. Kumar, S., Bhandarker, A.: Experiential learning and its relevance
in business school curriculum. Dev. Bus. Simul. Experiential
Learn. 44, 244–251 (2017)
18. Gentry, J.W., McGinnis, L.P.: Experiential teaching may lead to
experiential learning. Dev.Simul. Experiential Learn. 34,1–3 (2007)
19. Innovative Learning Solutions: website. https://www.ilsworld.
com/corporations.php. Last accessed 2 Aug 2017
462 J. Nightingale
20. Games on NBC News: website. http://www.nbcnews.com/id/
3078424/ns/technology_and_science-games/t/college-students-are-
avid-gamers/#.WYPUM8J4fIV. Last accessed 3 Aug 2017
21. Cesim: website. https://www.cesim.com/blog/bid/101791/5-rea
sons-why-business-simulations-are-great-learning-tools-and-why-
your-students-will-love-them. Last accessed 1 Aug 2017
22. Barker, J.: The Fearless Classroom: A Practical Guide to
Experiential Learning Environments. Taylor & Francis, Abingdon,
Routledge (2014)
23. Shen, Y., Nicholson, J., Nicholson, D.: Using a group role-play
exercise to engage students in learning business processes and
ERP. J. Inf. Syst. Educ. 26(4), 265–280 (2015)
24. Chen, L., Keys, A., Gaber, D.: How does ERPsim influence
students’perceived learning outcomes in an information systems
course? An empirical study. J. Inf. Syst. Educ. 26(2), 135–146
(2015)
25. Cronan, T.P., Douglas, D.E.: Assessing ERP learning (manage-
ment, business process, and skills) and attitudes. J. Organ. End
User Comput. 25(2), 59–74 (2013)
26. Shockwave: website. http://www.shockwave.com/gamelanding/
lemonade.jsp. Last accessed 10 Aug 2017
27. Kirkpatrick, D.L.: Evaluating Training Programs: The Four
Levels, 2nd edn. Berrett-Koehler, San Francisco, CA (1998)
28. Schumann, P.L., Anderson, P.H., Scott, T.W., Lawton, L.: A
framework for evaluating simulations as educational tools. Dev.
Bus. Simul. Experiential Learn. 28, 215–220 (2001)
Using a Simulation Game to Teach …463