The Evolution of Corporate Social Responsibility in the Kuwaiti Oil Sector
Introduction
Social components in the corporate world go way back to the early Roman Laws when traders used to donate and participate in building institutions like homes for orphans and the elderly, shelters, and hospices to give back to the community. The concept of organizations as a community enterprise has been there ever since the Middle Age, and the English Law carried it on. The English Crown saw organizations as a tool for community development, and it was carried on even in the sixteenth and the seventeenth century (Chafee, 2017). In recent years, organizations have adopted corporate social responsibility, and it has gained prominence in the academic literature.
Definitions of CSR
According to Carroll, CSR was known as social responsibility before the age of social responsibility started (Carroll, 1999). There are close to 37 definitions of corporate social responsibility, different scholars have given different definitions of CSR, but Bendell argues that there is no definite definition (Bendell, 2005). Howard Bowen is one of the earliest scholars to define CSR as "the obligations of businessmen to pursue those policies, to make those decisions, or to follow those lines of action which are desirable in terms of objectives and values of our society" (Sarkar & Searcy, 2016). In the 1960s, a few more authors came up with different definitions after Bowen's. In this research paper, the definitions are classified into two perceptions. The first is the stakeholder perspective, and according to Freeman, organizations have responsibilities to groups and people who have an impact or can be affected by the organization's operation (Freeman, 1984). According to Khoury and Rostami, CSR encompasses a relationship between an organization and its stakeholders. They argue that the primary responsibility of an organization is service to the community (Su & Jie, 2015). Davis and Blomstrom define CSR from a social perspective as actions taken by an organization to improve and protect corporates interests and social well-being (Guven, 2011).
According to Kotler, CSR means running the firm in a manner that positively influences social well-being (Galbreath, 2009).
Impacts of Corporate Social Responsibility on Corporate Performance
The connection between CSR and organization's accomplishments varies from one research to another and from one scholar to another. Researchers have studied the relationship between corporate financial performance (CFP) and CSR, and the results are diverse. According to Simpson and Kohers, the connection between CFP and CSR is positive (Simpson & Kohers, 2002). McWilliams and Siegel, however, argue that CSR exerts a neutral impact on an organization's financial performance (McWilliams & Siegel, 2000). After a deep analysis of Chinese firms, Chu-Yu, Wen and Fang argue that corporate social responsibility has a negative influence on corporate financial performance in the near future but a positive impact in the long run (Chu-yu et al., 2008). Jin’s argument is a little mixture of all of the above since they explain that the success of CSR in the past years results in a positive effect in the future years (Jin et al., 2006).
The relationship between CSR and consumer response has been looked into by some scholars, and according to Murray and Vogel, CSR has a positive impact on customer response. The study confirms that customers would be more willing to buy from companies that participate in social development (Murray & Vogel, 1997). Brown and Darcin’s research shows that CRS can indirectly influence customer’s valuation of services and goods offered by an organization by assessing the organization (Brown & Darvin, 1997). Morh and Webb agree with Murray and Vogel; they argue that people behave in a socially responsible manner. Thus, they consider a firm's social contribution before making a purchase, and other studies have shown that consumers like to reward companies that contribute to the growth of society.
Human Resource Management and Corporate Social Responsibility
Human resource management plays a significant role in every organization. It is a bridge between the employers and the employees. The term 'Human Resource' was created in 1954 by a scholar called Peter Drucker, and he focused on its use as a function in managing managers and operations and guiding people in their line of work. Pigor and Myers defined HRM as a way of increasing the potentials of workers for them to experience maximum satisfaction of their jobs and do their level best for the company (Pigor & Myers, 1952). According to Byars and Rue, HRM is defined as activities intended to provide for and manage the employees in a company (Cheruiyot, 2010). During the 20th century, human resource was a functional department in a company, and human resource managers used to manage and supervise the employees and ensure a smooth operation in the organization.
There is no definite definition for CSR and HRM, but the concepts have developed over time. Both HRM and CSR have boomed in the last few decades, the two terms have interacted over time, but they are described and analyzed from different perspectives. There has been an increase in research linking HRM and CSR over the past years. The common point of HRM and CSR in an organization is sustainability. The role of HRM in the sustainability of an organization is still underdeveloped. Gond and other scholars indicate how HR managers in organizations undermine CSR and sustainability issues to other employees (Gond et al., 2017). They analyze three configurations of how HRM and CSR interact, with different degrees of balance between them with respect to sustainability. HRM has a major part in determining how people understand CSR, how it's established and endorsed, equally, organizations' understanding of CSR affects how they treat their workers. In a HRM professional course, there is compulsory training in CSR (Ragmoun & Alwehabie, 2020). A revolution towards the study of internal stakeholders is seen in CSR literature, and CSR-HRM can now fully improve the concept of employees as stakeholders.
The link between CSR on HRM
Research has proved that there is an existing link between HRM and CSR. CSR influences HRM practices and vice versa. CSR influences the process of employees recruitment which is the major role of HRM. A socially responsible organization has to consider societal ethics as they hire people. They have to consider some factors like age since they can't hire children that are below the legal age since it is against society's ethics. They should also ensure responsible shares of recruitment, and they shouldn't discriminate against people from the minority group. Merging both HRM and CSR establishes a socially responsible HRM habit in a company, and it affects the workers in terms of human capital investment, safety, and health. In return, the organization attracts and retains qualified employees. According to some researchers, few studies link between HRM and CSR. These researches perceive corporate social responsibility as a tool to emphasize the social rationality of an organization, and this method helps to develop the organization's reputation and employee loyalty (Dupot et al., 2014).
According to Fraisse and Guerfel-Handa, HRM has the power to encourage the employees to implement green practices. In return, they help conserve the environment; they can also raise a CSR culture among its employees. They also argue that CSR impacts HRM strategies by bringing to light questions on diversity, equality, and employees' safety (Nair, 2015). Some authors argue that the link between HRM and CSR is on some particular topics like safety in the workplace, health and well-being of the workers, and fair treatment of the employees.
Conclusion
Researches have proved a link between HRM and CSR, and the relationship between these two concepts goes way back. CSR influences HRM in decision making since a socially responsible company has to consider corporate social responsibility before making decisions such as recruiting employees and employees' working environment. On the other hand, HRM plays a significant role in ensuring that an organization adopts CSR programs. Both HRM and CSR are essential in understanding the relationship between the employer and the workers and the organization's performance.
References
Bendell, J. (2005). In whose name? The accountability of corporate social responsibility.
Development in Practice, 15(3-4), 362-374.
Carroll, A. B. (1999). Corporate social responsibility: Evolution of a definitional construct.
Business & society, 38(3), 268-295.
Chaffee, E. C. (2017). The origins of corporate social responsibility. U. Cin. L. Rev., 85, 353.
Cheruiyot, F. K. (2010). The relationship between corporate social responsibility and financial performance of companies listed at the Nairobi Stock Exchange (Doctoral dissertation, University of Nairobi, Kenya).
Chu-Yu, L., Fang, W., Er-Dong, W., Sheng-Wen, Q., Jian-Kui, H., Xiang-Yang, L., ... & Kui, Z. (2008). Impact on the magnetic compressor due to CSR. Chinese Physics C, 32(8), 665.
Dupont, C., Ferauge, P., & Giuliano, R. (2013). The impact of corporate social responsibility on human resource management: GDF SUEZ's case. International business research, 6(12), 145.
Freeman, R. E. (2010). Strategic management: A stakeholder approach. Cambridge university press.
Galbreath, J. (2009). Building corporate social responsibility into strategy. European business review.
Gond, J. P., El Akremi, A., Swaen, V., & Babu, N. (2017). The psychological microfoundations of corporate social responsibility: A person‐centric systematic review. Journal of Organizational Behavior, 38(2), 225-246.
Güven, B. A. (2011). Toplumsal sorunların çözümüne yönelik hazırlanan reklam kampanyaları: Anlatısal ve tematik ileti çözümleme örnekleri (Doctoral dissertation, İstanbul Kültür Üniversitesi/Sosyal Bilimler Enstitüsü/İletişim Tasarımı Anabilim Dalı).
Jia-Wen, X., You-Jin, Y., Yong, L., Jian-Cheng, Y., Hu-Shan, X., Guo-Qing, X., ... & Zheng-Guo, H. (2009). HIRFL-CSR commissioning in 2006 and 2007. Chinese Physics C, 33(S2), 12.
Murray, K. B., & Vogel, C. M. (1997). Using a hierarchy-of-effects approach to gauge the effectiveness of corporate social responsibility to generate goodwill toward the firm: Financial versus nonfinancial impacts. Journal of Business Research, 38(2), 141-159.
Nair, R. S. (2015). A review of the cause-effect relationship between CSR and HR. The International Journal of Business & Management, 3(12), 63.
Ragmoun, W., & Alwehabie, A. (2020). Sustainable human resource management (SHRM) and corporate social responsibility (CSR): An Integrated Mediated Moderation Model of dynamic capabilities (DC) on family business industry. Management Science Letters, 10(10), 2259-2268.
Sarkar, S., & Searcy, C. (2016). Zeitgeist or chameleon? A quantitative analysis of CSR definitions. Journal of Cleaner Production, 135, 1423-1435.
Simpson, W. G., & Kohers, T. (2002). The link between corporate social and financial performance: Evidence from the banking industry. Journal of business ethics, 35(2), 97-109.
Su, R. J., & Jie, X. W. (2015, January). Literature Review on Corporate Social Responsibility. In 2015 International Conference on Management Engineering and Management Innovation (icmemi-15) (pp. 11-16). Atlantis Press.
VIRTUAL LEARNING ENVIRONMENT
Abstract
The complex learning system's growth now relies on the increased use of VLE, technology applications. Most education and are urged to acquire as many as possible VLE technology to aid their lectures and studying system. Based on the thorough background information on the excellent delivery of theory services and the Technology Acceptance Model (TAM), a strategy concept is formed. This master-plan gives a comprehensive overview of the critical factors that bring the success that affects the lecturers' smooth use and benefits of VLE as well as the real use. These critical aspects are linked to the institutions, the extent of the technology, and the consumers. These include help, technical aid, information support, and motivation. Technical influence comprises of system features and knowledge worthiness. User effects comprise of lecturers' attitudes concerning VLE services, individual creativity, and the lecture method.
Table of Contents
1.0 Introduction............................................................................................................................... 4
2.0 Literature Review..................................................................................................................... 5
Aims and Objectives.................................................................................................................. 6
Aims of this project................................................................................................................ 6
Objectives............................................................................................................................... 7
Methods...................................................................................................................................... 7
Data collection and study sample.......................................................................................... 7
Results.................................................................................................................................... 7
Discussion............................................................................................................................... 9
5.0 Conclusion............................................................................................................................... 10
6.0 Reference................................................................................................................................. 11
Appendices..................................................................................................................................... 12
1.0 Introduction
Virtual education is defined as an instruction in a studying environment, where the tutor and the examined (student) are distinguished by time or distance, or both, where the teacher gives the course content with the aid of course administration applications, media assemblage items, the website and video zooms (Trafford and Shirota, 2011). A virtual learning environment (VLE) comprises software tools aiding the learning management, tutoring, and conducting pieces of research with the internet's help, specifically the World-Wide Website. As pieces of knowledge and communication are used more often through the internet, they have formed part of numerous tertiary learning institutions' necessary educational facilities. In the same way as e- mails the VLEs are spread across the institution from a central point, majorly to improve the current academic processes They are not meant to replace the existing tools and practices.
According to (Foss, 2009), the VLEs started as early as 1973 when students from Stanford University commenced pursuing computer-based studies. Over the next years that followed after that, programmers in software development came up with games connected with pieces of instructions, learning, testing, and drills and later the invention of the electronic whiteboard system. In the year 1989, Tim-Berners Lee, a British engineer who was still young, gave out a proposal of a document for sharing information through the internet dubbed as "web of notes with links". He named it the World Wide Web. This led to the development of various courseware delivery systems or the ‘Learning Management Systems” that sprouted in the 1990s. By the year 2010, nearly all the big institutions had incorporated the e-learning courseware. The development of social networking sites, enhanced the interaction of VLEs, making them more collaborative with an efficient conversation.
4
In the VLE, apart from the other web-based domains, identifying the user is generally straightforward. As a result, student log in using unique identification codes. Therefore, not just anybody can access these platforms. Anonymous logins are usually not possible to go through e- learning courses. Every user naturally possesses a unique ID. Therefore, visitors can be recorded in the log files are accessed appropriately.
According to (Limniou and Smith, 2010), the VLE allows students to benefit from the learning at their own pace and the chances to acquire new techniques without necessarily moving to the actual class environment while following their sessions. They also get the sense of a feeling that they gained knowledge through self-assessment, as there is always a scope that one can download at the end of the session and print it to give them their achievement record.
For tutors, the usefulness of the VLE is also vast. They can set the learning sessions and practical courses for all the students at the same time. This is possible no matter the distances between them, allowing the teacher to work from anywhere if there need be. A mixed learning approach can also help them maintain their students more concerned with the course, utilizing part of their time performing their practical studies and the theoretical part on what they were learning through the VLE.
2.0 Literature Review
The VLEs, as we have observed, have various benefits and therefore is crucial to look into which software choices are available for offering these services. If an institution decides to use the VLE, the next step will purchase the most appropriate software. This VLE software can be linked back to past decades where they were only used for seminal purposes like the one that was once developed by Engelbert in 1962, which made the computer a vital tool in offering solutions to various kinds of problems. From the rich history of evolution, today's current
5
software offers a wide array of choices, and it is not easy to give a detailed analysis of them. Therefore, it is essential to critically formulate the need to build a firm on the grounds of narrowing down preferred choices for selection (Sockalingam, 2013).
To assist in the delineation of the landscape, a considerable note may be taken that VLE software has usually been built to create the image of particular contexts, shown in two critical components of development. Some universities had developed some small systems as research projects to achieve specific learning requirements and have slowly developed into complex models with tools that can run through great functionalities. In numerous cases, these projects were initiated by a financial source from the grants or government funding and then hatched into a bigger academic society, with the software accessible at some nominal licensing fees. Moodle and Sakai are examples of such systems (Efiloğlu Kurt & Tingöy, 2017).
On the other hand, in line with commercial, more products have also been developed to meet the business world's demands, apart from education itself. However, on this software's success, the tertiary institutions commonly adopted them for academic purposes, intending to enhance the corporate solutions, for example, the Blackboard and t Desire2Learn.
Aims and Objectives
Aims of this project
To find the impact (Negative and positive impact) of VLE on educational institutions in the UK.
To find ways to improve virtual learning services.
To gain knowledge about the virtual learning environment.
6
Objectives
Conduct secondary and primary research and collect quantitative and qualitative data. Analyze the research outcomes.
Methods
Data collection and study samples
The required data for performing the research hypothesis were gathered using a questionnaire-based method. Based on the study of previously conducted research pieces, the acceptance of VLE was studied to help in the preparation of questionnaire samples for his research. When designing the questionnaire, the extent and reactions applied for describing the incorporation of the VLE were acquired from the UTAUT Model study. The questionnaire was developed in the English language, specifically. According to an article by (Efiloğlu Kurt & Tingöy, 2017), a study sample involved 522 undergraduate students from Leeds University in the Queen's land, United Kingdom, using the VLE. These questionnaires were finished by the students who were involved in the research evaluation. The research mentioned above material used Leeds as the case study is sole for two reasons. Similar technology has been applied there before at the undergraduate stage of studies. The second reason was the ease of data access during the collection. For this research, fifteen samples were sent to students with the institution to give their views if they are welcome this kind of learning.
Results
The responses from the questionnaires are tabulated below, along with the presentation in the bar graphs. The students' thoughts are depicted by these results given below.
Questions
Responses (Yes)
Responses (No)
Not Sure
Question 01
9
6
0
Question 02
8
7
0
7
Question 07
11
3
1
Question 08
8
2
5
The above responses to questions 1,2,7 and 8 were tabulated and presented using the compound bars for analysis. It is observed that many of the students are well pleased with the software that is used for university VLE.
Responses for Question 03 & 04
Questions
Strongly
Disagree
Not sure
Agree
Strongly
8
Disagree
Agree
Question 3
0
5
2
5
3
Question 4
0
3
3
8
1
From the above presentation, it is also evident that the students agree with implementing the VLE within the school. Nearly, more than half of the population is from the above two tabulated results.
Discussion
From the above results, VLE is most welcomed by the students in most higher institutions of learning. VLE has a lot of benefits compared to its drawbacks. Most students today prefer accessing their classroom at home to save them on the extra cost of leaving. It saves on the resources that would have used to set up actual lectures in lecture halls. It then allows the students to accomplish the sense of self-achievement of the knowledge they acquire. There is room for the student to build a comprehensive skill for knowledge acquisition. The professors also find it easy to handle many people who are staying apart in terms of distance and time.
9
5.0 Conclusion
The VLE is appropriate in tertiary institutions of learning; most students would prefer it in coursework that does not require most time for practical sessions as far as theory studies are concerned. The higher learning institutions should at least incorporate this in some of their programs. VLE is a technology thing, and we live in the era of technology, so this will also help embrace technology. The software has numerous advantages that outstrip the disadvantages margin, so it worth implementing the VLE.
6.0 Reference
Efiloğlu Kurt, Ö. and Tingöy, Ö. (2017). The acceptance and use of a virtual learning environment in higher education: an empirical study in Turkey, and the
UK. International Journal of Educational Technology in Higher Education, 14(1).
10
Foss, J. (2009). Lessons from learning in virtual environments. British Journal of Educational Technology, 40(3), pp.556–560.
Limniou, M., and Smith, M. (2010). Teachers' and students' perspectives on teaching and learning through virtual learning environments. European Journal of Engineering Education, 35(6), pp.645–653
Sockalingam, N. (2013). The Relation between Student Satisfaction and Student Performance in Blended Learning Curricula. The International Journal of Learning: Annual Review, 18(12), pp.121–134.
Trafford, P., and Shirota, Y. (2011). An Introduction to Virtual Learning Environments. [online] Available at: https://www.gakushuin.ac.jp/univ/eco/gakkai/pdf_files/keizai_ronsyuu/ contents/contents2006/4803/4803paul/4803paul.pdf.
Information Science and Technology
↳ Modern Technology
Serverless Computing
Abstract
It is notable that serverless computing is an increasingly popular cloud computing model that allows developers to embark on their applications without concerns about server management and maintenance. This technology enables developers to deploy their applications without having to provision and manage servers, allowing them to focus on creating and deploying their code. Serverless computing has seen rapid adoption, as it presents a number of advantages over traditional computing models. It allows for rapid application development, scalability, improved security, reliability, as well as reduced costs. However, it also has some drawbacks, such as the lack of control over underlying infrastructure and the limited availability of certain services and tools. The survey helps illustrate these ideologies by incorporating diverse studies focusing on serverless computing.
Introduction
Serverless computing is a cloud computing model that allows developers to focus on their application code rather than the underlying infrastructure. It eliminates the need for infrastructure management, such as server provisioning, configuration, and maintenance, and enables developers to quickly deploy applications and services without worrying about the underlying infrastructure. As a result, serverless computing enables developers to focus on their core business logic, allowing them to build applications faster and more efficiently (Hassan et al., 2021). Additionally, serverless computing is idealized to reduce operational costs, as it eliminates the need for expensive infrastructure and allows customers to pay only for the resources they use instead of paying for idle servers. This paper provides a survey of various recent resources presenting diverse aspects associated with serverless computing to establish the rise, applications, importance, challenges, and opportunities.
The rise of serverless computing
Serverless computing is a new technology that is gaining traction in the corporate world due to its cost efficiency, scalability, and lack of maintenance. The article by Castro, Ishakian, Muthusamy, and Slominski examines the current state of serverless computing and its potential to change the way software is developed and deployed. As a foundation, it assesses the benefits and challenges associated with serverless computing, including its ability to reduce costs and complexity, but also its potential for vendor lock-in, security risks, and the need for expertise in this new technology (Castro et al., 2019). Additionally, the survey helps identify some of the existing serverless technologies such as Amazon Web Services Lambda, Google Cloud Functions, Microsoft Azure Functions, and IBM OpenWhisk.
Besides, there are comprehensive insights highlighting the implications of serverless computing for software development and deployment. Specifically, it is established that there is potential for increased collaboration, the need for new development and deployment models, and the importance of organizational culture in the successful adoption of serverless computing (Hassan et al., 2021). Given the extensive rise and development, it is assertive that the future of serverless computing affiliates to the potential for new business models, the need for more research, and the capability for serverless computing to revolutionize how software is developed and deployed.
Opportunities and application
As highlighted, serverless computing is a technology that has been rapidly gaining popularity among developers and businesses in recent years. This technology has the potential to reform how applications are built and deployed and has the potential to drastically reduce the cost of developing and deploying applications. This creates a purpose to survey and offer a detailed overview of serverless computing opportunities and their potential applications. The studies aid in identifying several opportunities associated with serverless computing, encompassing cost saving, scalability, and ease of deployment (Shafiei et al., 2022). Ideally, cost savings are achieved by reducing the need to maintain physical servers, while scalability allows businesses to quickly and easily scale their usage according to their needs. Furthermore, the ability to deploy applications quickly and easily without the necessity to facilitate additional servers is another crucial opportunity of serverless computing.
Furthermore, the growth of serverless computing contextualizes the relevance of the survey to determine the various applications. It is notable that individuals and organizations apply serverless computing to facilitate the functionality and efficiency of web and mobile applications, serverless databases, the Internet of Things (IoT), and machine learning applications. There are highlights on the featured advantages and disadvantages of the viable applications. Insightfully, web applications are well-suited to serverless computing, as they can benefit from cost savings, scalability, and easy deployment (Jangda et al., 2019). Mobile applications incorporate serverless computing to leverage the cloud provider’s services to provide better performance and scalability. On the other hand, IoT applications are suited to serverless computing due to their ability to quickly provide resources, while real-time streaming applications can benefit from the capacity to scale rapidly in response to changing usage patterns. Therefore, these practical demonstrations of serverless computing in real-world situations imply its potential to become a significant paradigm in cloud computing.
Challenges
A significant challenge affiliated with serverless computing is the lack of a unified platform that allows developers to easily switch between different cloud providers. Currently, there are multiple cloud providers offering serverless platforms, but each one has its own unique set of features, making it difficult for developers to move their applications from one provider to another. This lack of a unified platform makes it difficult to manage and track application performance across different cloud providers (Shafiei et al., 2022). Similarly, there is a lack of visibility into serverless applications. In traditional cloud computing, administrators have access to various performance metrics, such as latency and throughput, which can be used to identify and troubleshoot problems. Conversely, serverless computing lacks this type of visibility, making it complex to identify and address performance issues.
Besides, there are emerging issues regarding the security of serverless functions. Often, it is written in open-source languages, such as JavaScript or Python, which can be vulnerable to security threats. These functions are also typically hosted on public cloud infrastructure, making them susceptible to malicious actors (Jangda et al., 2019). Ultimately, serverless computing is still relatively immature, and its maturity depends on the availability of various tools, such as debugging and monitoring tools, to support development and operations. Without these tools, developers are unable to properly debug and monitor their applications, leading to performance issues and security vulnerabilities.
Conclusion
Overall, this survey provides an in-depth overview of serverless computing, its potential applications, and its associated opportunities and challenges. By assessing the current state, it is viable to analyze the technology based on its potential applications. Furthermore, it provides valuable insights into the positive implications of serverless computing for businesses and developers. Comparing serverless computing and traditional cloud computing illustrates the affiliated merits of reduced costs, scalability, and flexibility. As such, the survey is an invaluable resource in contextualizing serverless computing in modern and future technologies. Although serverless computing is a promising new paradigm for cloud computing, there are still several challenges that must be addressed before it can reach its full potential. Inevitably, addressing these issues will help make serverless computing a more robust and secure platform for developing and deploying cloud applications.
References
Castro, P., Ishakian, V., Muthusamy, V., & Slominski, A. (2019). The rise of serverless computing. Communications of the ACM, 62(12), 44-54.
Hassan, H. B., Barakat, S. A., & Sarhan, Q. I. (2021). Survey on serverless computing. Journal of Cloud Computing, 10(1), 1-29.
Jangda, A., Pinckney, D., Brun, Y., & Guha, A. (2019). Formal foundations of serverless computing. Proceedings of the ACM on Programming Languages, 3(OOPSLA), 1-26.
Shafiei, H., Khonsari, A., & Mousavi, P. (2022). Serverless computing: a survey of opportunities, challenges, and applications. ACM Computing Surveys, 54(11s), 1-32.
Information Science and Technology
↳ Modern Technology
Geographic Information System (GIS) Applications in Kuwait
Buffers are terminologies that are used to refers to regions of storage that are used in holding information or data temporarily while being moved from one location to another. One of the most significant features of buffers is the determination of method parameter in determining how buffers are created. Buffers can be constructed in two basic methods being Euclidean and geodesic, where Euclidean is used in measuring the distance in a double dimensional Cartesian plane. They work best during the analysis of the distance on projected coordinate system features. For the geodesic buffers, their functionality comes during accounting for the earths actual surface. The geodesic features are created when considering input features dispersed. They are also used when the preservation of properties such as area during spatial reference of input features are of distorting distances.
During buffer creation, there are two major formats that are offered. The parsed data stream that is normally from the parse process. Parsed data refers to a data string transformed to a different set type. For instance, when it is received in HTML format, the parser will be able to convert it into a more understandable and easily to read type. The data stream is composed of parsed XML document and the header. While parsing the XML document, it is read and an interface provided for the user to access the documents.
Briefly discuss what Model Builder is, including the following topics in your discussion:
Why Model Builder provides a graphic template
What models created in Model Builder allow users to do
What scripts are, and what they can be used for.
Geoprocessing workflows are built using programming languages that are known as Model builder. Spatial analysis is always documented and automated using geoprocessing models. It is used in creating and is modification of the models interpreted as a diagram linking process sequences together and geoprocessing tools, whilst utilizing one process' output as another process input. Some of the benefits of model builders include its ease of use in the creation and workflow Runnings. It also enables creation of tools that can be used in python scripting.
Graphic templates can be taken as features that have been created for particulate uses that are meant to save designers time and an able proper flexibility while editing. The graphic templates normally contain text colors and images that that are in most cases appealing to the eye (Esri, n.d). The graphic templates are used in illustration of tools and variable elements. Further more, the readability of the model is enhanced through the diagram properties, display properties and the pictures for the elements and label to document.
The models built by the model builder has many functions to the user. Some of the most specific functions include the following. They have the ability of selecting different layers by their attributes. Through the buffer, they can help create an area within 1500 feet distance around specified areas (Esri, n.d). They can also help the user erase the buffer area within the selected zones. Finally. They have the ability to intersect, in that they can help in overlaying the erase tool output with different layers hence ease in identification of areas meeting the needed criteria.
Script is a command lists that is executed by scripting engines on certain specific programs. Their major functions are in generation of web pages or process automation on local computers. A typical example is Dos script that maybe utilized in process running in windows computers (Christensson, 2006). Macintosh machines may make use of apple scripts. When describing script files, they can be termed as documents containing instructions that are written in a scripting language. With that the overall implication is that majority of the scripts can be edited or opened using basic text editors.
References
Christensson, P. (2006). Script Definition. Retrieved 2021, May 5, from https://techterms.com Esri, (n.d). Fundamentals of Model Builder. Retrieved from, https://proceedings.esri.com/library/userconf/cahinvrug09/papers/tech- workshops/arcgis_desktop_fundamentals_of_using_modelbuilder.pdf
Esri, (n.d). How Buffer (Analysis) works. Retrieved from, https://pro.arcgis.com/en/pro- app/latest/tool-reference/analysis/how-buffer-analysis-works.htm
Information Science and Technology
↳ Modern Technology
Blockchain Architecture in Modern Banking
Abstract
Blockchain technology is a public ledger with open entry to all users controlled by a central authority. Blockchain is a technology that enables organizations and individuals to collaborate with reliability and integrity. In this context, cryptocurrencies such as Bitcoin represent the primary application of the technology, with other blockchain advancements potential. Blockchain is undeniably the critical driver behind new modern technology foundations. Blockchain is an unchangeable ledger that permits decentralized transactions to occur. Blockchain-based applications are exploding in various fields, notably financial products, identity management, and the Internet of Things (IoT), among others. Nevertheless, blockchain technology always has several issues to address, such as scaling and safety threats. This article provides an in-depth look at blockchain technology. First, we explain the details of blockchain architecture and analyze some of the most common resolution techniques utilized in various blockchains. Scientific obstacles and subsequent advancements are also briefly mentioned. The digital ledger offers a variety of blockchain technology solutions, every with its own set of application areas. The lessons give users hands-on knowledge and applications, as well as theoretical insights.
Introduction
Several businesses recognize blockchain technology as a decentralized ledger that keeps the provenance of digital content intact and accessible via decentralization and cryptographic hashes. A helpful example for comprehending blockchain technology is a Google Doc. In this situation, decentralization happens whenever documentation is created and shared with a specific set of individuals, resulting in the document being distributed rather than copied or transferred. The complete user base is not immune to the effects of other entities' alterations; as a result, any modifications to the data are documented to keep all modifications visible. Several organizations have benefited from blockchain technology, particularly payment perks. Most reviewers have praised the use of blockchain technology in companies where some persons have incorporated the technology, whereas others maintain resistance. Notwithstanding the heightened expectations from enterprises, blockchain technology and Bitcoin are becoming increasingly prominent. However, people have little understanding of technology. Cryptography, for example, executes the majority of procedures that financial institutions and other monetary organizations undertake, ensuring the legality and security of financial resources.
Percentage of work (PoW) consensus methods and relevant procedures are used in global blockchain architecture. Because it is open-source, a public blockchain does not require any authorization. Because this is an open-source project, you can specify new blocks with their current status. You can also check the network's transactions by downloading the blockchain's code. Transactions are now possible throughout the entire network. Transparent but anonymous or pseudonymous transactions are possible with public blockchain architecture. The blockchains of Bitcoin, Ethereum, and Litecoin are all open to the public. A private blockchain design restricts access to information to a small number of parties (organizations or individuals). Organizations create blockchain architectures to enhance general value or efficiency. The members' shared aims, as well as proof of stake (PoS) and Byzantine fault tolerance (BFT) consensus procedures, ensure its trustworthiness. The primary blockchain technology is decoupled from the cryptographic protocol level in a private blockchain design. You can create a programmable processing region known as a smart contract and international stores employing a private blockchain.
Literature review
According to Liu, Lu, Paik and Zhu (2021), Blockchain technology is a decentralized ledger that operates on several gadgets and maintains transactions throughout several computers linked so that the transactions cannot be changed without affecting subsequent blocks. The administrator authorizes transactions, verifies them, and ensures that they are not tampered with. Application areas, for example, include private stocks if it appears that taking a company public is prohibitively unaffordable. In this situation, a bank consortium underwrites the transactions to attract investors. From a unique security standpoint, blockchain is an open-source project focusing on side chains for segmentation avoidance. The non-financial application of blockchain technology confirms a statement's legitimacy, which eliminates the need for centralized authorization. The substance's certification comes in handy when proving ownership. The essay suggests adopting Dropbox for decentralized cloud file storage and Google Drive and One Drive for storing papers, images, and music records.
Despite their appeal, cloud file storage options present safety, confidentiality, and information control issues when a third party engages. In the music business, blockchain has brought about positive improvements in terms of internet expansion and the availability of numerous streaming services. The changes influence everyone involved in the music industry, including artists, labels, publishers, song authors, and streaming platform service providers. As a result, the blockchain has aided the development of a decentralized internet of things. As a result, the internet of things is gaining much traction in the consumer and enterprise tech worlds. The decentralization approach, in which the brokers and hub controls communicate with the devices, heavily relies on the internet of things platforms (Crosby et al., 2016).
Nevertheless, when data flow between devices is required and autonomous, the strategy appears to be unfeasible. The requirement's clarity has boosted efforts to decentralize the internet of things. In particular, blockchain technology necessitates the deployment of decentralized internet of things platforms, such as cured and reliable data exchanges and record keeping. In this regard, blockchain technology plays a critical part in architecture. It acts as a general ledger, storing trusted records of all messages sent and received between device devices in the internet of things' decentralized technology. According to Ahram et al. (2017), the digital world, specifically blockchain technology, has influenced efficiencies in creative products and enhanced customer interactions through the widespread use of the internet of things. In addition, social media, data analytics, and cloud technologies have all contributed to the advancement of innovative technology. Blockchain technology, which was recently established, is altering the digital world by providing a fresh viewpoint on computing system security, resilience, and efficiency.
Considering the initial popularity of blockchain technology due to Bitcoin, it appears that blockchain is more than just a cryptocurrency technology. The technology allows for the exchange of a variety of goods, services, and transactions. The increasing growth of industries is reliant on the trusted partnerships that blockchain technology provides. Increased regulation, cybercrime, and fraudulent activities, on the other hand, stifle the growth of blockchain technology. As a result, blockchain technology allows for more agile value chains, faster product creation, stronger customer relationships, rapid integration of the internet of things, and cloud technology to address the difficulties.
Furthermore, blockchain technology enables lower trade costs by establishing a trustworthy contract monitored without third-party parties likely to add direct value to the price. Smart contracts, intrinsic agreements, and engagements with defined cybersecurity elements are made possible by the technology. This essay aims to lay the groundwork for discussing and implementing blockchain technology in various industrial applications. For example, blockchain is used to develop a healthcare chain in the healthcare industry, formalized and built utilizing the IBM blockchain effort (Ahram et al., 2017). The themes in this perspective can be applied to a wide range of businesses, including finance, government, and manufacturing, which are all concerned with security, productivity, and adaptability.
The implementation of Blockchain technology in the medical industry is presented by Zhang et al. (2018). Blockchain technology reduces reliance on a distributed power to protect data integrity and ownership and facilitate transactions and trade of electronic information resources by enabling safe and pseudo-anonymous operations and legitimate interpretations among participating entities. Several characteristics of blockchain technology, such as its unmodified nature, decentralization, and transparency, have been utilized to resolve challenges in healthcare services (Duong et al., 2020). Insufficient recordkeeping for care and demanding access to clients' health information are examples of such issues.
Interoperability is required for a competent and effective healthcare services structure. It allows programming applications and technology phases to exchange data securely instead of faults, exchange details, and use the tradable information throughout other healthcare associations and application traders. Unfortunately, the lack of connectivity has resulted in siloed, and divided data delayed junctions and various work procedure instruments in the existing healthcare system (Chakraborty, Aich & Kim, 2019). In a secure and pseudo-anonymous manner, blockchain provides the opportunity to enable longitudinal, complete, and update critical clinical records that are stored in separate frameworks. The focus of the paper is on the materiality of Blockchain innovation in the medical field. It identifies possible Blockchain use cases in social insurance, presents a contextual analysis for Blockchain innovation, and evaluates strategic considerations for using this technology in medical care. Intelligent car communication networks are vulnerable to cyber threats, challenging to address with traditional integrated security measures. Blockchain is a distributed, permanent database that ensures data security cryptographically.
Blockchain has shown to be helpful in economic applications, maintaining close communication, and securing digital copyright of media content. The technology applies to all businesses, including secured internet of things devices and established frameworks, among other things (Zhang et al., 2018). The superior aspect of blockchain technology is decentralization. The method uses a persistent, auditable database to provide transaction security. The articles do an excellent job of addressing the nature of the intelligent vehicle communication system and concerns with plans for establishing a blockchain-based trust mechanism among intelligent vehicles. The authors highlight blockchain use cases in intelligent cars under investigation or developed by auto companies and academic institutions.
Other critics point out how several financial organizations have embraced blockchain technology because of the benefits it offers. Blockchain technology is intriguing for a complicated and engaging nature in both open and private segment figuring applications.
Blockchains provide a history of agreement with a cryptographic review trail that may be kept up and approved by multiple hubs as a way to organize exchanges in a circulated record (Khezr et al., 2019). The technology enables contracting parties to track resources and understandings using a standard convention, thereby smoothing out and even completely dismantling various internal and external check forms. Naturally, blockchain technology deals with blocks that are uniquely identifiable and associated with records of transactions in a chain. According to Treleaven, Brown, and Yang (2017), A blockchain is a constantly evolving system with suitably shared block files. The blocks are cryptographically secured by a hashing capacity that generates a unique computerized mark. Each square is "fastened" to the one before it by referencing its hash value. The blockchain-connected PCs or hubs verify lawful transactions by the logic governance rules, particularly the intelligent contract. The confirmation mechanism by which new data are added to the record distinguishes several blockchain stages.
For the banking and money-related administration sectors, blockchain foundations have several enticing features. These architectures are adaptable and can function as distributed networks without needing a central server or a single point of failure. Cryptocurrencies have accessibility and do not require an outsider to perform exchanges because they work with communicated open-source conventions (Ndayizigamiye & Dube, 2019). Open blockchain frameworks are also known for being simple because all changes are visible to all parties. Because exchanges cannot be changed—they cannot be turned around or re-sequenced—the blockchain's utility also allows applications and clients to function with a high level of assurance. In general, blockchain systems are amazingly capable of ensuring that all contracting parties have identical and indistinguishable records.
Blockchain technology is a decentralized database that keeps asset registrations and transactions on a shared PC network with cryptography to assure security. After some time, its record is divided into cryptographically linked and protected squares of data (Radanovi & Liki, 2018). Currently, examples of this innovation have been used for cryptographic currency methods, sophisticated contracts, budgeting, open information, and asset ownership. Future applications are likely to include medicine, science, teaching, licensed creativity, and the ability to chain leaders dynamically. Electronic health records, healthcare insurance, biological research, drug distribution, and procurement protocols, and clinical teaching are all possible uses in the realm of medicines. The use of blockchain is not without flaws. The technology is still in its infancy, requiring open or even master information, making it difficult to envision its true future potential. There are significant challenges with adaptability, the security of smart contracts, and client selection, with capital investments in blockchain innovation expected to increase year after year (Treleaven, Barnett, & Koshiyama, 2019). Blockchain innovation can alter human services organizations and clinical practice, which healthcare experts and leaders should know.
Tools Comparison
Background Information
The goal of Blockchain's inception was to create a decentralized billing mechanism. So, the universe initially encountered cryptocurrencies in 2009, and blockchain innovation has come a long way since then. The Blockchain currently resembles a massive, decentralized supercomputer that gives the ideal foundation for program designers worldwide to create their programs. As an outcome, there has been a significant increase in the need for the leading Blockchain technologies. The accompanying overview highlights some of the most popular blockchain tools to help users construct a blockchain with various features. Briefly consider the necessity for blockchain technology and its relevance before moving on to the description of blockchain tools.
According to Upwork's 2018 Abilities Rankings, Blockchain is among the extremely fast specialties regarding necessity. Moreover, according to a recent LinkedIn research, Blockchain will be one of the most in-demand tech skills in 2020. Blockchain technology is a rapidly emerging field with enormous potential for advancement. As a result, the long-term demand for blockchain professionals with knowledge of the best blockchain tools will skyrocket. In the Blockchain world, there are several job opportunities to consider. Nevertheless, you will need to learn about various blockchain development tools and the skills required to deploy them for diverse use scenarios. The third primary reason to underline the importance of blockchain tools is that they help to improve understanding and hands-on expertise with the technology. More importantly, knowing how to use the best tools for blockchain development can enhance your job prospects.
With the possibilities of blockchain technology and the variety of employment choices available, it's understandable to wonder if learning about blockchain tools is necessary. So, let us ponder the significance of blockchain tools for a moment. The primary purpose of blockchain tools is to handle the many requirements that arise during the design of a blockchain app at different phases. The role of blockchain tools is to make the process of designing blockchain software solutions easier. Blockchain specialists with in-depth knowledge and expertise of blockchain tools can help them stay relevant in the blockchain employment market. As a result, learning about the many blockchain tools that you may use to the fullest extent possible to improve your blockchain development experience is critical. Let's take a look at the list of the best blockchain tools.
Tools
Strengths/Weaknesses/Potential Improvements/Extensions of The Different Tools Geth
Geth is one of the foremost names that comes to mind when thinking about the most excellent blockchain tools accessible right now. It's essentially an Ethereum node written in the Go computing language. Geth comes with three different user integrations: "interactive console, JSON-RPC server, and command line." Geth can be used to construct blockchains on Linux, Windows, and Mac computers. It's an excellent tool for various Ethereum Blockchain tasks involving cryptographic protocol generation, token transactions, block record exploration, and ether currency mining. Consumers can subscribe to current blockchains or create their own after installing Geth. The benefits element in this scenario is Geth's ability to improve things by automatically connecting to the Ethereum leading network. It's an excellent tool for various Ethereum Blockchain activities involving cryptographic protocol generation, asset exchange, block history exploration, and ether token mining. Clients can connect to current blockchains or create their own after installing Geth. The advantage element in this scenario is Geth's capacity to simplify things by automatically clicking to the Ethereum leading network.
Solc
Solidity is the second more often used blockchain tool in 2020. For blockchain programmers, it is the most widely employed language. Python, JavaScript, and C++ influence solidity's basic foundation. The Ethereum Virtual Machine was the primary focus of Solidity's development (EVM). Solidity features dynamically coded and library support, as well as complicated user-defined types and hierarchies. Solidity is the most excellent solution for innovative scripting agreements since it is consistent with the OOP paradigm. Solidity allows blockchain programmers to build apps that include self-enforcing enterprise logic and smart contracts. As an outcome, blockchain engineers may assure that the optimizer transaction history is immutable and authoritative. Solidity's uses are most visible in business situations like "blind auctions, voting, multi-signature wallets, and crowdsourcing." Solc is a fantastic tool for compiling Solidity tools and developing Solidity-based applications. In practice, Ethereum nodes may include sold. However, because the solc package is a standalone component, anyone can utilize this tool even when you're not connected to the internet.
IDE Remix
One of the most well-known names among the top blockchain tools for 2020 is Remix IDE. It is a browser-based blockchain application that aids in the development and deployment of smart contracts. Because Remix IDE is based on JavaScript, it can be accessed from any modern browser. The remix may additionally assist with the tasks of building smart agreements in Solidity, as well as evaluating, troubleshooting, and distributing applications. Remix can either be used directly or on the internet, according to the participant's option. Equally importantly, by employing Metamask, Remix offers thorough and clear guidelines for supporting smooth connectivity to the Ethereum network.
Mist
If you search the market for Ethereum wallets, you are sure to come across Mist as one of the best options. Mist's most notable feature, which places it among the top blockchain tools, is its Ethereum affiliation. Users should have a specified area for storing Ether tokens and executing intelligent contracts before using Mist. Mist is compatible with both 32-bit and 64-bit versions of Windows and 32-bit and 64-bit Linux and Mac software platforms. Mist is currently the best option for deploying smart protocols and is also a full node wallet. As a result, customers would need to acquire the entire Ethereum blockchain, over 1TB in size. Moreover, users must constantly recall their Mist password since it can be changed.
Truffle
Truffle is one of the most well-known rivals amongst the top blockchain tools. It's an Ethereum blockchain framework designed to help developers create Ethereum-based solutions by providing a developer platform. Truffle also comes with an extensive library of custom deployments that aid in making additional crypto and the resolution of blockchain development issues. Truffle is also well-suited to the creation of complicated Ethereum independent programs. Automated contractual verification is another critical feature of Truffle as a blockchain tool. For "automated contract testing, Truffle can use Mocha and Chai." Moreover, Truffle can assist in constructing smart contracts and their linkage, compilation, and deployment. Equally importantly, Truffle provides a flexible build process to ensure that bespoke build methods are followed.
Testnet for Blockchain
Blockchain Testnet is the latest entry to the collection of the top blockchain tools accessible right now. It's among the essential tools for blockchain builders, and it helps test decentralized apps before they go live. Every blockchain solution has its own Blockchain Testnet, customized to provide superior functionality with the blockchain solution in question.
The public, private, and Ganache CLI are three different Blockchain Testnet that clients can utilize. Testnet is an excellent tool for checking decentralized programs for flaws and bugs without spending much money. Gorli Testnet is currently one of the most popular amongst programmers.
Ganache
Ganache is a Truffle Suite Blockchain tool that allows programmers to construct their own Ethereum blockchain for testing apps, viewing state, and executing instructions while maintaining complete control over the chain's functioning. The most crucial feature of Ganache is that it allows users to conduct all of the tasks that are available on the significant chain without having to spend anything. Ganache is a popular Blockchain tool among developers since it comes with a built-in block explorer and robust mining controls, among other features. During the construction of smart contracts, blockchain engineers utilize Ganache to test them.
Embark
Embark is a developer platform for Ethereum dapps that allows programmers to create and operate dapps quickly and effortlessly. It also enables users to develop and launch a decentralized serverless HTML5 application. Smart contracts can also be created with Embark and made accessible in the JS code. If the contract is changed, embark will change it as well as the corresponding dapp. In many agreements, smart contract migration, reactivation, and updates are simple to execute. To interface with Embark, you can employ any specific digital programming language as well as any deployment workflow. Embark allows programmers to construct contracts with Javascript on a test-driven basis, handling their agreements across many blockchains.
Figure 1: Comparison between the related tools: (Newell, Mamun & Islam, 2021)
Conclusion
Because of its importance in many fields, decentralized architecture has gained widespread recognition in recent years. The technology has the potential to generate major ecosystem advances, including classic and new technologies. Presently, the blockchain consumes content from large-scale entertainment networks such as YouTube. As a result, with the centralization and decentralization of models, the technology might be used in bigger ecosystems. In addition, the collection of currencies and crypto currencies is likely to rise. Most crucially, for accurate humanitarian impact, blockchain technology need the rule of law. For example, the ejected party may exercise their rights and obtain the encroachments promptly after a farmer records a plot of land in the shared ledger. In the west, blockchain technology is also beneficial.
References
Ahram, T., Sargolzaei, A., Sargolzaei, S., Daniels, J., & Amaba, B. (2017, June). Blockchain technology innovations. In 2017 IEEE Technology & Engineering Management Conference (TEMSCON) (pp. 137-141). IEEE.
Chakraborty, S., Aich, S., & Kim, H. C. (2019, February). A Secure Healthcare System Design Framework using Blockchain Technology. In 2019 21st International Conference on Advanced Communication Technology (ICACT) (pp. 260-264). IEEE.
Crosby, M., Pattanayak, P., Verma, S., & Kalyanaraman, V. (2016). Blockchain technology: Beyond bitcoin. Applied Innovation, 2(6-10), 71.
Duong-Trung, N., Son, H. X., Le, H. T., & Phan, T. T. (2020, January). Smart Care: Integrating Blockchain Technology into the Design of Patient-centered Healthcare Systems. In Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy (pp. 105-109).
Flood, L. (2020, November). Using Blockchain and Smart Contracts for Marine Seismic Data Integrity and Contract Control. In First EAGE Digitalization Conference and Exhibition (Vol. 2020, No. 1, pp. 1-5). European Association of Geoscientists & Engineers.
Khezr, S., Moniruzzaman, M., Yassine, A., & Benlamri, R. (2019). Blockchain technology in healthcare: A comprehensive review and directions for future research. Applied Sciences, 9(9), 1736.
Ndayizigamiye, P., & Dube, S. (2019, November). Potential Adoption of Blockchain Technology To Enhance Transparency and Accountability in the Public Healthcare
System in South Africa. In 2019 International Multidisciplinary Information Technology and Engineering Conference (IMITEC) (pp. 1-5). IEEE.
Radanović, I., & Likić, R. (2018). Opportunities for use of blockchain technology in medicine. Applied health economics and health policy, 16(5), 583-590.
Treleaven, P., Barnett, J., & Koshiyama, A. (2019). Algorithms: law and regulation. Computer, 52(2), 32-40.
Treleaven, P., Brown, R. G., & Yang, D. (2017). Blockchain technology in finance. Computer, 50(9), 14-17.
Zhang, P., Schmidt, D. C., White, J., & Lenz, G. (2018). Blockchain technology use cases in healthcare. In Advances in computers (Vol. 111, pp. 1-41). Elsevier.
Liu, Y., Lu, Q., Paik, H. Y., & Zhu, L. (2021). Defining Blockchain Governance Principles: A Comprehensive Framework. arXiv preprint arXiv:2110.13374.
Newell, J., Mamun, Q., & Islam, M. Z. (2021). A Generalised Logical Layered Architecture for Blockchain Technology. arXiv preprint arXiv:2110.09615.