Beruflich Dokumente
Kultur Dokumente
Determination of the Account Personal Data Adequacy of Web Community Member .............................. 1
Solomia Fedushko, Yuriy Syerov, Andriy Peleschyshyn and Korzh Roman
VoIP Security: Improving Quality of Service through the Analysis of Secured Transmission ............... 66
Uchenna P. Daniel Ani and Mohammed Mustapha
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ABSTRACT
This article considers the current problem of investigation and development of data
verification of virtual community member by means of computer-linguistic analysis of
web-members socio-demographic profiles for web-community member identification. The
algorithm of formation system of lingvo-communicative indicators based the training
selection of web-forum members is designed. This algorithm includes the formation of
matrix of linguistic-communicative indicators and lingvo-communicative indicator weight
coefficient determination. The computer-linguistic analysis of web-community members'
information tracks is realized and verification of lingvo-communicative indicators of
gender, age and sphere of activities of web-community member is established. Based on
these results of the investigation the software algorithm of web-community members'
socio-demographic profiles verification is designed and software "Verifier of the socio-
demographic profile" is exploited. The account personal data adequacy of web-community
member is determined by means of computation of the measure of the adequacy of personal
account data. The calculation method of reliability of the result of the socio-demographic
characteristics verification of web-community member is developed for constructing the
socio-demographic profile of the web-member for web-community management.
Keywords
Socio-demographic profile, Software, Marker, Web-community member, Personal data,
Validation.
1. INTRODUCTION
The most important issues of web-communities content analysis today is
analysis of web-users personal data [1, 2]. In spite of significant importance
for the further development of this research field, methods of analysis are
undeveloped in particular personal information on account of web-
communities users. Development of web-community management software
is a priority issue because the web-community is a popular and mass service
at WWW, and existing software management tools are imperfect and not
integrated. Authenticity of web-community user personal data is an
important thing in the successful managing of web-communities.
IJCSBI.ORG
The scientific task of validation method development for web-communities
members personal data, including their socio-demographic characteristics,
based on computer-linguistic analysis of the informational content is the
current area of the research in computer linguistics. Since without linguistic
methods and computer-aided tools this is the hardest task and requires
significant time spending for web-communities administrators.
2. BACKGROUND STUDY
The verification of personal data that is contained in the global system
WWW is relevant and important research object in the following areas:
Assessment of the online information reliability.
The concept of content reliability, content relevance and reliability
of highly specialized content.
The formal review of perception of trust in the information among
regular Internet.
The personal data reliability and quality.
Verification of socio-demographic users characteristics in WWW.
The results of the research in the last scientific direction of socio-
demographic characteristics verification of users of the global environment
WWW [3, 4] are in demand of a wide range of experts in the organization
and operation of web-communities, as such, that should ensure their
performance and efficiency. This raises an important problem of the new
methods and tools development that would have a proper scientific
justification, formality, predictable performance and versatility for
analyzing the socio-demographic characteristics reliability of the web-
communities members.
Socio-demographic characteristics
educated
educated
educated
sciences
sciences
Woman
Natural
science
Formal
Highly
Social
Adult
Man
Low
IJCSBI.ORG
For web-community user data validation, in order to improve web-
communities management [5] and to improve target techniques in online
advertising [6] is enough to analyze such basic socio-demographic
characteristics (see. Figure 1).
IJCSBI.ORG
2.1.2 Education
Many community administrators require web-community members to
follow certain conventions of web-communication. Web-communication
convention depends on the objective goal and projected scenarios of the
web-community owners. An important factor in the possibility of
participating in a web-community is a high literacy level of web-community
member [8], level of higher education and skills.
The method of screening illiteracy and with low education level web-
community member will significantly reduce the time and financial costs,
and managers' efforts to moderate web-community. In order to screen
illiterate web- member it required to classify all members by the level of
literacy, which will help to determine the likely level of each web-
community member education. In the task automation research of detecting
errors in the text are only considered character errors. Error analysis and
data consolidation that were conducted by scientists, allows us to offer the
errors typology and to classify members in the order of education level.
2.1.3 Scope of activity
A web-member in a greater or lesser degree can belong to several areas of
interest, as the impact of the content creation in web-communities serve a
direction of education, professional activity and range of interests in spare
time. However, the result of the analysis is to determine the scope of activity
of web-community member. In the general scope of activities are classified
as science fields in the following areas: Natural sciences; social sciences;
formal science. This division is based on analysis of web-community
members Internet communication with different scopes of activities.
In web-community moderation that is intended for communication between
members of certain areas, there many questions appear about level of
professionalism, ethical principles, so filtering of web-users by scope of
activities is a necessary and important task of community administration
(government and policy portals) to improve the web-community position.
2.1.4 Gender
In order to avoid gender conflicts in web-communities that are intended for
women (L'viv Women's Forum Cult of Beauty, "Girls chat", Forum
"L'viv-mama" et al.) and for men ("Man Forum", "Anti-feminine site" etc.)
administrators of these communities need to enter a strict gender division.
"Web-gender change", that is a web-user creation identity of the opposite
sex, it is common on the Internet and is caused by the following factors as
the impact of cultural gender stereotypes, expression of homosexual
tendencies or transsexual or diffuse gender identity. So-called web-sex
change is more peculiar to men due to several reasons desire to control and
manipulate others, for women it is easier to get help and attract attention,
IJCSBI.ORG
desire to power over other men, the study of the relationship between sexes
and get new experience of Internet communication.
2.1.5 The geographic location
Locating web-user with no verification data on computer IP-address of the
web-community member using special software tools (CNGeoip, GeoLite
Country, GeoLite City, IpGeoBase, GeoIp etc.) that can determine the
belonging of IP-address to the level of countries and cities is the aim of
geographic location identification of web-member.
IJCSBI.ORG
Specialized dictionaries;
Content analysis of the Ukrainian web-communities.
The main aim of this process is to consolidate lingvo-communicative
indicative features of Internet communication. Formation of lingvo-
communicative indicator sets is in grouping indicative attributes in intuitive
semantic groups. Visualization of the results is presented in tabular form in
the classification of lingvo-communicative indicators for each value of all
socio-demographic characteristics.
3.1 Formation of matrix of linguistic-communicative indicators
Based on the lingvo-communicative indicators set experts form the matrix
of lingvo-communicative indicators by computer-linguistic analysis of the
web-community content for each value of each socio-demographic
characteristics that is defined separately. As a result, for each value of
certain socio-demographic characteristics we get a matrix of lingvo-
communicative indicators:
SDCh ,Vc SDCh ,Vc
SDCh ,Vc
Ind 1,1 Ind 1,i Ind 1,N _ Vl SDCh,Vc
SDCh ,Vc SDCh ,Vc
LKI SDCh,Vc Ind j ,1 Ind j ,i
SDCh ,Vc
Ind j ,N _ Vl SDCh,Vc
Ind SDCh,Vc
SDCh ,Vc
Ind N _ Ind SDCh,Vc ,i
SDCh ,Vc
Ind N _ Ind SDCh,N _ Vl SDCh,Vc
N _ Ind SDCh,Vc ,1
IJCSBI.ORG
Table 1 Tabular representation of functions: N_Vl & N_Ind
SDCh N_Vl N_Ind
Age 2 6
Gend 2 12
Edu 3 7
Sphere 3 11
Ind * w
N _ Ind SDCh,k
jk Value , User
SDCh,Vc SDCh,U 2 SDCh
i,j Ind i , j i
i 1
IJCSBI.ORG
of web-community member for the presence of socio-demographic markers
to form lingvo-communicative indicator sets for specific web-community
with the same themes.
The matrix of lingvo-communicative indicators is an array of input data for
information system's multi-computer monitoring.
The input data array of multilevel monitoring information system should
meet certain requirements for the synthesis of qualitative multidimensional
model and must be matrices of each marker of lingvo-communicative
indicators frequency characteristics in each web-community member
information track. It is the basis for the socio-demographic characteristics
models synthesis in information system multilevel computer monitoring.
Determination of
adequacy of account
personal data
IJCSBI.ORG
The developed system of sets of web-member Internet communication
lingvo-communicative indicators is the basis for software of test socio-
demographic characteristic values of web-communities members - "Verifier
of socio-demographic profile". The scheme of software algorithm "Verifier
of socio-demographic profile" is described in Figure 2. The algorithm of
"Verifier of socio-demographic profile" is presented in the following stages:
Step 1. Selecting the web-community and information track of member.
Step 2. Analysis of information track.
Step 3. Formation of socio-demographic profile. This step included two
stage: determination of the socio-demographic characteristic value and
determination of membership level to a socio-demographic characteristics.
Step 4. Checking the reliability of the results of the verification process of
socio-demographic characteristics.
Step 5. Determination of adequacy of personal account data.
Step 6. Saving the socio-demographic profile. The result of this step is the
creation and preservation of socio-demographic profiles of web-members.
IJCSBI.ORG
Ind * w
N _ Ind SDCh,k
jk Value , User 1
SDCh,Vc SDCh,U 2 SDCh
i,j Ind i , j i
i 1
scenario, with k
i
i 1 , k i 0 ; Compl UAc the level of account filling;
Actl UAc
the relevance of personal data in the account; Actl Cont the level
IJCSBI.ORG
of content topicality; AdmPUser the administrative authority; TechC UAc
the level the technical correctness of filling the account; Actv User the level
of activity; RCB User the level of compliance with the web-community
member rules; An User the level of anonymity. As a result,
RRVer(SDCh) 0 ,1 . Determination of the reliability level of the result of
the socio-demographic characteristics verification: 0,75 < Reliable Result
1; 0, 25 < Ambiguous Result 0,75; 0 Simulate Result 0,25.
7. CONCLUSIONS
Determination of the account personal data adequacy of web-community
member is the important scientific and applied problem. The construction
methods and means of basic socio-demographic profiles validation of web-
communities members by computer-linguistic analysis of web-members
information track is solved this problem.
The system of lingvo-communicative indicators involves the content
creation and processing of training selection of web-forum members is
formed. Weight coefficients of lingvo-communicative indicators are
determined. The matrix of linguistic-communicative indicators is formed.
The software algorithm of web-community members' socio-demographic
profile verification "Verifier of socio-demographic profile" is designed.
Computer-linguistic analysis of information track of Ukrainian web-forum
members for grammatical, lexical-semantic and lexical-syntactic features
are more specific to one particular socio-demographic characteristic value of
certain web-community members. The research results are significantly
affected by messages context and discussion topics. The basis of this study
is a diverse sample of user information tracks of all thematic chapters, more
than 40 Ukrainian web-forums. Determination of socio-demographic
markers is performed by analysis of information track of more than 640
members of Ukrainian web-communities. The study equally considered
web-forum discussion that arises from a variety of interests of young
persons and adults, men and women with different levels of education.
The reliability of the result of the socio-demographic characteristics
verification of web-community member allows to evaluate the effectiveness
of computer-linguistic analysis of web-community members content and to
construct the socio-demographic profile of the web-community member for
web-community management in web-community administrating process.
IJCSBI.ORG
8. REFERENCES
[1] Fedushko, S., Syerov, Yu., 2013. Design of registration and validation algorithm of
members personal data, International Journal of Informatics and Communication
Technology, Vol.2, No.2, pp. 93-98.
[2] Shakhovska, N., 2011. Methods of customer data processing using intelligent agent of
data sources structure determination. Actual Problems of Economics, Vol. 7(120),
pp. 338-346.
[3] Fedushko, S., Peleschyshyn, O., Peleschyshyn, A., Syerov, Yu., 2013. The verification
of web-community member's socio-demographic characteristics profile, Advanced
Computing: An International Journal, Vol.4, No.3, pp. 29-38.
[4] Syerov, Yu., Peleschyshyn, A., and Fedushko, S., 2013. The computer-linguistic
analysis of socio-demographic profile of web-community member. International
Journal of Computer Science and Business Informatics, Vol. 4, No. 1, pp. 1-13.
[5] Shakhovska, N. and Syerov, Yu., 2009. Web-community ontological representation
using intelligent dataspace analyzing agent. X-th International Conference "The
Experience of Designing and Application of CAD Systems in Microeletronics",
Polyana-Svaliava, Ukraine, pp. 479480.
[6] Shakhovska, N., 2011. Consolidated processing for differential information products.
VII-th International Conference "Perspective Technologies and Methods in MEMS
Design", Polyana-Lviv, Ukraine, p. 176.
[7] Fedushko, S., Bardyn, N., 2013. Algorithm of the cyber criminals identification.
Global Journal of Engineering, Design & Technology, Vol. 2, No. 4, pp. 56-62.
[8] Korzh, R., Peleschyshyn, A., Syerov, Yu., and Fedushko, S., 2014. The cataloging of
virtual communities of educational thematic. Webology, 11(1), pp. 1-16.
IJCSBI.ORG
ABSTRACT
Computer network security is one of the most critical issues facing different business
organizations. Protecting organizations data - which is the core of the organization
existence- against attacks is very important. Multiple security tools should be implemented
in the same time in order to protect this data, as modern attacks can easily bypass most
single operated security systems. A well designed security system which take into
considerations most possible network threats is necessary to prevent intruders and provide
secure data exchange. In this paper, layered defense approach is presented as a best solution
to build network security system. In this approach multiple mechanisms are used together
to keep high security level.
Keywords: Network security; layered defense approach; risk analysis; computer network
attacks.
1. INTRODUCTION
Growing number of computer networks and recent developments in
information technology have led to increased demand on network security
issues. Although its huge benefits such as shared data usage, network
convergence introduced large amounts of threats to the organizations
network systems. Having more data flowing through the network poses
security risks for both the facilities and IT teams, as a result a more complex
protection schemes should be applied.
Providing protection for both hardware and software components of the
network is not a single person responsibility, the cooperation between IT
IJCSBI.ORG
staff and the system is required to achieve network protection against
attacks [1]. As different staff members have different responsibilities,
different roles should be assigned to them when building the secure
network. To provide a secure network design, an analysis of possible threats
should be carried out. Appropriate risk analysis can provide an outlook on
possible network threats, network vulnerabilities and the best mechanisms
to maintain and mitigate these effects. Different security mechanisms can be
implemented to secure any organizations network beginning from the core
network and ending with securing user end point. However, some
vulnerable point could be missed which can easily provide a base to attack
the network. Well-designed security system can guarantee high security
level which is required especially in protecting data. The essential approach
towards high level network security is layered defense.
Layered defense is defined as the concept of protecting a computer network
with a series of defensive mechanisms such that if one mechanism fails,
another will already be in place to thwart an attack [2]. Because of the
variety of attacks, no single technique can successfully protect the network.
IJCSBI.ORG
2. ATTACK CLASSIFICATION
The common known attacks can be classified as follows [3, 4]:
A. Eavesdropping or packet sniffing
In this case the attacker captures each packet flows across the network with
the aid of packet sniffer application program. Without strong encryption, the
captured packed is plain text which simply reveal networks information [5].
B. Data modification
The attacker aims to modify the content of the captured packet without the
knowledge of the sender or the receiver.
C. IP address spoofing
This attack enables the attacker to access network data, modify it or even
delete it [5, 6].
D. Password based attacks
Once the attacker discloses the users password, he can access users data
and has all the rights and privileges as real user.
All previous attacks will result in some data being stolen or modified,
anyway the network can continue work properly. When the attacker is more
violent, it will develop more dangerous attacks which will lead not only to
network data changed, but also to destroy the network and bring it down [6].
Once the attacker captured any network node, the node is said to be
compromised. In this case the attacker can start a second group of network
attacks which contains:
A. Trust exploitation
As devices in the shared environment should trust the information from each
other, an attacker can use the compromised device to send and modify
information as a trusted user.
B. Port redirection
By installing port redirection software like NetCat on the compromised
device, the attacker can redirect packets to another port. In this case, all
network data including IP addresses, passwords and other important
information can be monitored by the attacker.
C. Man in the middle attack
In this attack, all packets exchanged between two users is passed through
the compromised device. The attacker could modify the packets without
being noticed by the sender or receiver.
D. Denial of service
IJCSBI.ORG
By flooding the network with extra traffic, the attacker aims to prevent the
network from performing its job. For example, the attacker can flood the
server with so many requests which makes it take a long time to process
these request and become unavailable for other users. DoS attacks are the
hardest attacks to mitigate as they are performed using the allowed traffic in
the network [7].
E. Malicious software (Viruses, worms and Trojans)
Once the attacker becomes trusted within the network, he can send packets
contains viruses, worms and Trojans to different network devices which will
deal with the data as trusted data. These malware can affect devices in
different ways, starting from erasing files to run arbitrary codes causing
memory overloading, consequently switch of the device.
F. Network partitioning
Using port redirection attack and packet sniffing, the attacker can redirect all
the packets to flow to certain device which is basically compromised. In this
case, a lot of network nodes (devices) will be virtually out of the network,
which can a virtual network partitioning.
3. RISK ANALYSIS
The first step towards building a secure network, is to carefully identify and
analyze each attack and evaluate the risks introduced to the organization's
network by these attacks. Risk analysis helps to define possible damage
caused by the attacker and methods to mitigate this damage or even prevent
it. The basic methodology of risk analysis can be summarized as in [8]
Identify the assets.
Identify the threats.
Identify the vulnerabilities.
Identify the existing controls
Generally, previous four points can be seen as three short questions; what to
protect, from whom and how. Assets identification should be done first in
order to define what asset to protect. Network asset contains both hardware
and software components. Risk analysis should clearly define which asset to
be protected and what level of protection required. After that, the
organization should define the possible threats to its network. Threats
contains every unwanted events that can damage the assets, and can be
triggered by natural or human action. Identification of threat sources also is
important point, threat sources varies from natural, human or environmental
hence, good identification of threat source should be done even before
building the network architecture. Network vulnerabilities can be defined
as a flaw or weakness in system security procedures, design,
implementation, or internal controls that could be accidentally triggered or
IJCSBI.ORG
intentionally exploited and result in a security breach or a violation of the
system's security policy [9]. The vulnerable points in the network will not
cause any harm unless some threat exploit to it. All vulnerabilities should be
well identified and monitored to detect any threat possibilities. The final
stage in risk analysis is to identify the existing controls. Controls mean all
existing procedures and mechanisms to mitigate the vulnerabilities. Existing
controls can be identified with the help of documentation of controls and
plans of risk treatment implementation. Multiple controls should be
assigned to mitigate every vulnerability, if one control failed, a
complimentary controls should be addressed to mitigate the threat.
Risk analysis can be done in two ways: Quantitative and qualitative [8].
Quantitative risk analysis is used to define the probability of risk occurrence
and possible losses, and assign them numerical values. Quantitative analysis
helps to estimate the assets, build cost, protect cost and repair cost.
Qualitative analysis is used to predict the level of protection required to the
network including asset and applications. Qualitative analysis represents the
initial monitoring to identify risks and threats that need deeper analysis, and
if the numerical threat estimation is required.
4. LAYERED DEFENSE APPROACH
Layered defense is defined as a set of network defense procedures and
technologies which aims to protect the network from intruders, these
techniques is organized such that if one failed to protect, the next one will
be ready to replace it. The complexity of the procedures depends on
organization requirements in terms of security level, cost and operability.
Any network security approach should be designed according to the
organizations security policies which is defined as a formal statement of
the rules by which people who are given access to an organizations
technology and information assets must abide [10]. In order to design a
secure network, it is really important to have a strong security policies. The
first step in security policies is to inform the network users how to protect
information and technology assets. Dividing people between network
administrators and users can help to protect the network by definition of
limited access. Also setting passwords for certain devices, information or
application will effectively protect the data from unwanted access. In
general, security policies can be summarized as: what to protect, why, from
whom and who is responsible for this protection procedure [11].
IJCSBI.ORG
A. Perimeter defense
Networks perimeter is the point where network connects to the outside so
called untrusted networks, hence providing secure perimeter is the first step
to prevent unwanted access to the network and so the system information.
According to Microsoft TechNet the perimeter is defined as every point
where the internal network is connected to networks and hosts that are not
managed by the organizations IT team. The firewall is the base of every
IJCSBI.ORG
good configured perimeter. As firewall is the security guard which controls
the entry points of the network by checking every incoming and outgoing
packet, a set of rules should be predefined by the organization to help
configure the firewall properly. In this case, well configured firewall will be
able to decide what packets to accept and what to discard. According to [12]
two categories of firewalls exist; state-less firewalls and state-full. If the
firewall tested the fate of the packet by examine the packet itself, then it is
called state-less. But if the decision is made not only based on the packet
test but also by looking to the previous accepted packets, then it is called
state-full. As the packet flow is controlled, many harmful effects can be
eliminated keeping the network safe.
B. Core network defense
The basic key for core network protection is the good designed architecture.
DMZ which is network area separating between firewall and the first router
in the network is an important defense tool. DMZ hardware is working as
the second check point for the packets, by fragmenting the packet, DMZ can
detect whether the payload is malicious or not. Figure 3 illustrate the
implementation of the DMZ within the core network.
Intrusion detection and prevention systems IDPS forms the second defense
line in securing the core network. By collecting information from different
network sources, these systems can detect possible threats [13]. For
example, when the attacker performs port redirection attack, most of the
IJCSBI.ORG
data flows to the compromised device. By analyzing the traffic in the
network, IDPS can find the threat and report to the system administrator to
take proper reaction. The secondary router in the system is also involved in
the layered protection [14]. By dividing the network into different working
groups (VPNs), the secondary router can disseminate the network traffic in
to proper working groups.
C. End point defense
The end point in the network could be both users device and servers.
Users information can be protected by the mean of operating system
protection by adjusting security configurations. Other procedures could be
useful too such as closing unused ports, hard disk encryption and
application whitelisting. Host intrusion detection systems is also can be used
to protect hosts from outside attacks. Anti-viruses software protects the
device from malicious software. These software manages databases which
contain signature for all known malicious computer codes and use signature
scanning to define malicious files. By detecting these file, many attacks and
threats can be omitted.
D. Application defense
Many attacks target the applications especially those which run on the
server. Some of these attacks are; buffer overflow attacks, password
guessing attacks, directory traversal attacks, and poorly configured network
applications that expose data to unauthorized users. Most client applications
do not listen to network ports, so they usually are not susceptible to remote
network attacks. Different tools and solutions could be used to protect
applications like Internet Information Services hardening and SQL
hardening for protecting servers [15], also installing applications and their
updates should be done from their original vendors.
E. Data defense
As business data is the most valuable content of any organization, providing
data protection is the main goal for any network security system. Adding to
previous mechanics, data defense could be done by controlling the access to
files and folders using access control lists (ACLs) [16], besides using some
encryption techniques. To prevent data loss, data back up or restore should
be done periodically using CDs or external hard disk. Finally saving data on
external hard disks rather than keeping it on desktop device can also protect
it from being stolen.
Generally, the layered defense approach use multiple techniques together to
provide total security. For example; an attacker who has physical access to
the networks computer has to gain authorization to access the data. As the
access is protected by users password, the attacker should gain this
password first. Once the attacker break first defense layer (the password),
IJCSBI.ORG
second defense layer in this case, it could be hard disk encryption- will be
ready to defend the attack. If the attacker succeed to break the encryption,
next defense layer lets say; host based intrusion detection system (IDS) -
can detect the attack, by comparing attacker behavior with system logs. The
intrusion detection system will report the attack to the administrator to take
the proper reaction.
5. CONCLUDING REMARKS
In this paper, we introduced a layered approach for computer network
security. The layered network defense can provide better security level by
the mean of arranging defense mechanism in consecutive layers such that
each mechanism has less attacks to deal with compared with the mechanism
in previous layer. Different security mechanisms are required to be
implemented in order to provide total network protection which increase the
cost and complexity of security system. Anyway, a good risk analysis of the
organization network can reduce the cost of implemented security
mechanisms by predicting which mechanism to apply and at which layer.
REFERENCES
[1] Banathy, A., Panozzo, G., Gordy, A. and Senese, J., 2013. A Layered Approach to
Network Security, indestrial IP database, available at :< http://www.industrial-ip.org>
[accessed 15 November 2014].
[2] Shenk, J., 2013. Layered security: Why it works, SANS institute reading room
database. availabel at: < http://www.sans.org/reading-room> [accessed 15 November
2014].
[3] De Capite, D., 2006. Self-Defending Networks: The Next Generation of Network
Security, Cisco press, NewYork.
[4] Kumaravel, A., 2013. Multi-classification Approach for Detecting Network Attacks.
IEEE conference on information and communications technology ICT, Jeju island,
April 11-12 2013. Available at:<http://www.ieeexplore.com>, pp.1114-1117 [accessed
12 December 2014].
[5] Orebaugh, A. and Pinkard, B., 2008. Nmap in the Enterprise: Your Guide to Network
Scanning. [e-book] Syngress press. available at: <http://www.amazon.com/> [accessed
03 December 2014].
[6] Harris, J., 2002, Cisco Network Security Little Black Book. [e-book] Paraglyph press.
available at: <http://www.amazon.com>[accessed 17 December 2014].
[7] Hsu, F. H., and Chiueh, T., 2008. Scalable Network-based Buffer Overflow Attack
Detection, IEEE Xplore database, available at: <http://www.ieeexplore.com>, pp.163-
172, [accessed 10 December 2014].
[8] International Standards Office, 2011. BS ISO/IEC 27005-2011, Information
technology- Security techniques- Information security risk management: Electronoic
documents. ISO. available at:<http://www.iso.org> [accessed 21 December 2014].
IJCSBI.ORG
[9] Stonebumer, G., Goguen, A., and Feringa A., 2002. Risk Management Guide for
Information Technology Systems, National Institute of Standards and Technology e-
library, available at:< http://www.nis.gov>, p.54 [accessed 23 December 2014].
[10] Fraser, B., 1997. Site Security Handbook, RFC 2196, available
at:<http://www.ietf.org> [accessed 10/12/2014].
[11] Malik, S., 2002. Network Security Principles and Practices. [e-book] Cisco Press.
available at: <http://www.amazon.com> [accessed 23 December 2014].
[12] Gouda, M. and Liu, A., 2007. Structured firewall design, International Journal of
Computer and Telecommunications Networking, Vol 51, Issue 4 ; pp11061120.
[13] Beigh, B., Peer, A., 2012. Intrusion Detection and Prevention System: Classification
and Quick Review, ARPN Journal of Science and Technology, Vol 2, No 7, pp.661-
675.
[14] Conkil, WM. and White G., 2010. Principles of Computer Security: CompTIA
Security+ and Beyond. 3rd ed [e-book] McGraw-Hill/Osborne Media, available at:
<http://www.amazon.com>, [accessed 01 December 2014].
[15] Shucheng, Y. et al., 2010. Achieving secure, scalable, and fine-grained data access
control in cloud computing, IEEE conference on computer communications, San
Diego, Ca, March 15-19 2010. Avaialbel at <www.ieeexplore.com>, pp. 1-9,
[accessed 07 December 2014].
[16] Huu, T. et al., 2005. A trust based access control framework for P2P file-sharing
systems, Proceedings of the 38th Annual Hawaii International Conference on System
Sciences. Hawaii island, US, January 3-6 2005. Available at:
<http://www.ieeexplore.com>, pp. 1-10, [accessed 16 December 2014].
IJCSBI.ORG
ABSTRACT
Millennials are the young emerging workforce. Virtual workplaces led by young business
leaders are replacing the brick and mortar leaders in the developed world. In the global
marketplace, local, regional, and multinational firms delegate virtual business leaders to
address company transactions. An essential component in the competitive global
environment, millennial business leaders may shape comparative advantage, especially in
the Middle East and North African Area (MENA). This case study focuses on the
emergence of millennial leadership inside virtual teams. The aim of this paper is twofold:
(1) whether the organizational structure impacts millennials authority as the team leader
and (2) whether structure influences the team members perception of their leaders
entitlement attitude. Participants were selected and teamed up as virtual business units.
From the research analysis, it was found that millennial leaders emerge from business units
Moreover, leaders may use authority and may have an entitlement attitude.
Recommendations were made based on the results and implications.
Keywords: Leadership, Millennials, Entitlement, Authority, Virtual Communication
1. INTRODUCTION
Millennials, technology, and organizational structures are focal in third
millennium business management, especially critical in the Middle East and
North African front given globalization, liberalization, and emerging
democratization. Research has found that millennials are the young
emerging workforce; they are entitled; and they network 24/7. Studies have
found that young entrepreneurs have played a vital role in shaping Middle
East and North African (MENA) business growth: Between 2002 and 2010,
foreign investment exploded in the Arabian Gulf influencing the industrial
and organizational climate (Kalayci and Adtan, 2012; Toone, 2012).
Millenials are said to be energized and technologically adept as a human
resource, using social media to network business objectives. Nonetheless,
effectively leading and managing a business is challenging, whether
interacting face-to-face or online, especially when the business leader is
neither sufficiently experienced nor assigned but emerges. Furthermore,
millennial business leaders who exploit fast-changing opportunities may
require a different range of core competencies than those in traditional
structures given their sense of entitlement.
IJCSBI.ORG
2. RELATED WORKS
Studies have shown that business leaders awareness of rapidly changing
environments teeming with opportunities and threats generate competitive
survival strategies. Many traditional business organizations seem to be
eroding, defunct, bringing with them high uncertainty avoidance and
resistance to adapt, yet millennials are change agents as leaders in the
international marketplace in which multinational business strategy
implements procedure using broader flatter organizations. New structural
design mechanisms are built to ensure leaner more flexible coordination and
control (Maney, Hamm and OBrien, 2011; Goleman, 2006; Drucker,
1996). The opportunities for and need of virtual organizations has grown
with the combination of increasing globalisation and widespread
developments in information communication and technology (ICT) (Hill
and Hernandez_Requejo, 2011). For those who are flexible enough to
create, innovate, adapt and/or engage in change management, opportunities
for business growth and development abound (Kinicke and Fugate, 2012;
Kets De Vries, 2010; Beaver and Hutchings, 2005; Farren and Kaye, 1996;
Drucker, 1985). Millennial executives as virtual business team leaders look
for methods and tools that can help them sustain competitiveness; many are
able to reinvent themselves. Research studies have shown that millennials
leaders understand that todays organizations whether traditional or
decentralized, bureaucratic or boundaryless (Welch and Welch, 2007) are
networks (Shirky, 2008; Handy, 1996) much more than a structure to be
quantitatively designed, measured, and controlled. Young yet versatile with
a mindset that is open rather than closed to the inner and outer sphere
(Goethe), Millennials generate organizational structures that require both
or either of a forceful or enabling leader contingent on the context and the
emotional economy (Kellerman, 2010; Kaplan and Kaiser, 2006; Goleman,
2006). One of the most common changes made in organizations is the
development of teams (Robbins, 2011; Elloy, 2008; Osburn and Moran,
2000) whereby virtual teams are groups of employees dispersed in time and
geography who, collaboratively through interdependent work tasks, generate
a product/service using ICT (Zivick, 2012). Researchers note that virtual
leaders must develop a strong portfolio of technical, interpersonal, and
conceptual skills appropriate for managing the virtual organizational
structure (Bass and Bass, 2010) whose framework is quite similar to
traditional ones though supported and driven by online leadership.
Moreover, research studies have also shown that in a leaderless autonomous
work team context leadership behaviour is necessary to move the team
forward (Zigurs, 2003). Reliance on a leader who emerges is essential for
the team as the leader seems to fit the responsibilities: in addition,
IJCSBI.ORG
she/he is selected because of proven competence (Erez, Lepine and Elms,
2002).
Studies have shown that whether assigned or emergent, leadership, mediated
by technology, implements the same tasks/performances and builds the
same relationship functions online as traditional organizations do though
due to availability of information, dispersion of the team, and permanence
of the communication some differences exist (Avolio and Kahai, 2001).
Research has shown that team functional issues as task completion may be
more difficult to resolve. In addition, studies showed that use of authority is
at times used laterally rather than hierarchically (Glucker and Schrott,
2007).Virtual leaders may have additional issues to handle stemming from
the online context (Nicholson et al., 2007).
Millennials are the emerging workforce. Born between 1980 and 1999, they
are educated, sociable, civic-minded, have a sense of morality and diversity,
are well-travelled, and technologically sophisticated (Pew Research Center,
2010; Brokaw, 1998; Strauss and Howe, 1991). They are independent, hard
working, and entrepreneurial. These personality characteristics were shaped
by the first fifteen years of the millennials life that served as the foundation
for their expectations and impacted their behavior. The new leader on the
business frontlines is less process and outcome oriented and less money
focused. Millennials balance family life with their work life, a witness of
and probably a testament to their parents being downsized. Their world is
wired and connected: computers, cell-phones, I-pods, I-pads, DVDs, and
cable TV. Having grown up with technology, this generation has an ICT
confidence and tenacity unlike others, awakened by and aware of world
events 24/7 (Akhras, 2012a). More importantly, millennials want to be
challenged in life and at work; easily bored with routine streamlined work
processes (US Department of Education). This Spawned Generation,
Generation Whatever (Christen in Payment, 2009, p.23) may seek creative
challenging tasks, working perseverant and consistently to win (Crampton
and Hodge, 2007), mainly driven by personal concerns.
Research has shown that millennial, like all other generations, may have
issues that need to be resolved, chief among which is their sense of
entitlement: They perceive themselves as the first, and they must
consistently be considered as the first (Twenge, 2006). Studies have found
that millennials entitlement is related to their socialization and their level of
their internet connectivity and networking dependency. Although brought
up by different generations of parents, research has shown that similar
parenting and socialization skills enriched millennials: children were
expected to excel and have a high sense of achievement. Promoting self-
esteem was part of their elementary education; moreover, parents also
excessively praised childrens assignments (Trzesniewski and Donnellan,
IJCSBI.ORG
2010; U.S. Department of Education). Millennials childhood was highly
scheduled with choice-overload and resultant stress-overload (Gleeson,
2007), maybe they are better seen as an Accelerated Generation.
Entitlement in the work environment may also have sprung from the fact
that millennials have been socialized in a world of instant information and
social networking 24/7 where events are celebrated round-the-clock. As
such, researchers have found that millennials thrive well in work-related-
contexts supported by positive as well as continuous instant feedback
(Demirdjian, 2012; Cisco Connected World Report, 2011; U.S. Department
of Commerce, 2013; Scheck, 2012; Silbergh and Lennon, 2006). Moreover,
it has also been noted that millennials tend to work well with others,
collaborating, bringing to the work context, a de-cubiclized work space
(Kapoor and Solomon, 2013; Zopiaris, Krambia-Kapardis and Varnavas,
2012; Lowe, Levitt and Wilson, 2008). Researchers have noted that not only
do millennials search for and combine frequent positive open
communication, but they also share it (Marston, 2007; Howe and Straus,
2007).
Millennial leaders play a critical role in MENA business world. Given the
review drawn from the literature, this research study seeks to determine
whether the organizational structure impacts millennials authority as the
team leader and whether being virtual influences the team members
perception of their leaders entitlement attitude in both the assigned-leader
and the emergent-leader teams.
4. METHODOLOGY
This section covers the purpose of the study, the research questions, the
participants, the procedures used in the study, the research design, rubrics,
and analysis of data used.
Purpose
The purpose of this study is to determine whether the organizational
structure influences team members perception of their leaders application
of authority and their entitlement attitude.
Research Questions
IJCSBI.ORG
perceive significantly more use of an entitlement attitude
by the leader than do virtual teams with assigned leaders.
Participants
The participants who attend two graduate level business courses at the
faculty of business administration and economics are selected as
participants. The sum total of students is 60: 34 are male; 26 are female; and
31 work in domestic and international companies. All participants attend
the Fall Semester at a private English speaking university in the Middle East
and North African Area (MENA).
Procedure
In this research design, the participants are assigned a graded team project
across the academic semester. The participants are placed in virtual teams
of five members. Each team is to work on tasks on the internet. The team
project is to be developed by all the members of the team who are to meet
regularly on the team blog in order to achieve their assigned team objective.
The blogs are generated by the course leader who is the blog administrator.
During the sixth week of a fifteen week semester, the participants are
placed in formal teams and
told to meet to discuss the project and how and when they will
work together.
During the seventh week, the formal teams are divide into two
categories: assigned team leader and no assigned team leader. Thus,
three teams had an assigned leader (AL) and three did not.
During the eighth week, the participants as virtual team members are
told to collaborate on the blog, synchronously or asynchronously, in
order to personalize their blog, adding IT features to enhance and
facilitate online communication.
During the ninth week, the participants are given the first task on the
group project. This is to be performed by each team member,
individually. The task is submitted on the team blog.
During the eleventh and twelfth week of a fifteen week semester, the
team participants have a collaborative task. All need to work
together, synchronously or asynchronously, to complete the task.
The second task must be submitted as one assignment online.
During the thirteenth week, the final task is to be completed. The
team participants are to finalize the graded team project. It is to be
submitted online.
During fifteen week, all the participants are to fill out a survey (See
Appendix One).
IJCSBI.ORG
The first rubric is paired three times with Hypothesis One-- In terms
of online group transactions, virtual business team members with
emergent leaders perceive significantly more authority being applied
by the leader than do virtual teams with assigned leaders. On the
Likert Scale (1 is non existence and 5 is regularly applied) points
reflect the participants perception of the leaders application of
authority (see Figure 1 below).
The second rubric is paired with Hypothesis Two which states that in
terms of online group transactions, virtual business team members
whose leaders emerge perceive significantly more use of an
entitlement attitude by the leader than do virtual teams with
assigned leaders. Thus, the rubric evaluates the attitude of
entitlement reflected by the virtual business team leaders on the
Likert Scale (1 is non existence and 5 is regularly applied) (see
Figure 2 below).
IJCSBI.ORG
5. RESULTS
Based on the data analyzed, the section below discusses the results of the
analysis in line with the literature reviewed.
The first hypothesis which stated that in terms of online group transactions,
virtual business team members with emergent leaders perceive significantly
more authority being applied by the leader than do virtual teams with
assigned leaders was supported: three different tasks that were performed by
the six virtual teams were evaluated ( Task One: T=2.834 df (36), Sig(1
tailed)=0.004<0.05; Task Two: T= 2.408,df(58), Sig(1 tailed)+0.0095<0.05;
Task Three: T=7.405, df(30), Sig (1 tailed)+0.000<0.05) (See Appendix
One). Emergent leaders played a dominant role: They stepped forward to
take over and directed the team to success (See Figure 1: Rubric to Assess
Perception of Authority Application). The MENA Millennial leaders held
themselves responsible to ensure the tasks were completed in terms of path
and alignment while others in the team were responsive to being led as has
been noted by other practitioner-researchers (Oh, 2012; Blanchard, 1996,
p.86; Covey, 1996, pp. 152-3).
Business leaders held the four members in their team accountable for their
performance. In the six teams, the level of contribution of different members
was not of equal measure meaning that in three of the teams, a team leader
emerged applying authority to promote performance, communication, and
interdependence while in the other three teams the assigned leaders directed
performance. Virtual leaders have to consistently deal with maintaining
hierarchical order and compliance online (Zivick, 2012). In the United Arab
Emirates, teams have been a key component in delivering strategic goals in
successful project-based companies where it was found team leaders and
members played a responsible role in task performance (Randeree and
Ninan, 2011). Tasks may need to be executed in a coordinated fashion for
project completion (Kinicke and Fugate, 2012), and the interrelationship
IJCSBI.ORG
between leadership and virtual teamwork and the members themselves was
necessary in the six virtual teams (Carte, Chidambaram and Becker, 2006,
p. 340). Studies show virtual teams need leaders with skills and personalities
able to handle identical work-related problems online in a manner at times
different from traditional co-located teams ( Avolio and Kahai, 2001). In
this study, e-mail, mobile texting as well as face-to-face interaction were
used as channels of communication. Similar to leaders in traditional teams,
the face-to-face conversation on accountability may need to be done in a
one-to-one manner using teleconferencing or video-conferencing (See
Appendix One). When the leaders authoritatively directed, the team
responded and the project was completed: In effect, emergent leaders
applied more authority in each of the three tasks.
IJCSBI.ORG
In short, the business team leaders in this study using information media
understood that not all team members are as goal oriented or entitled as
they. Given their need to excel, authority, mainly as a hierarchal tool rather
than a lateral tool, was used to achieve assigned team directives issued by
top level managers superior to them on the chain of command. Different
technological channels of communication were tapped into to ensure team
objectives were performed.
6. CONCLUSIONS
Two conclusions were arrived at as a result of the study: virtual business
team members perceive that their leaders apply authority to ensure that team
goals are met; moreover, virtual business team members perceive their
leaders as entitled, full of self-esteem, confident in their competence and
their precedence in the business team.
The research study found that some of the Millennials also known as
MySpace Generation, dot.com Generation, the Internet Generation, the
Great Generation, Generation Y, the Yes generation, Nexters, and the
Digital generation may be perceived as entitled business leaders. They are
comfortable in a flexible virtual work-related environment which they
perceive as boundaryless (Welch and Welch, 2007). There, they network
24/7, at times applying authority to achieve team objectives. Millennial
business leaders in the Middle East North African Area (MENA) today may
be seen as enthusiastic, engaged, inclusive, sociable, achievers, and curious
as other Millennials are (Pew Research Center, 2010; Everett, 2011;
Lippmann, Bulanda and Wagenaar, 2009).
The limitations found in the research conducted may have stemmed from
the sample selected as it was a convenience sample (Fraenkel and Wallen,
2006). The generalizability of the findings is limited given the absence of
random sampling as well as similar nationality, field of specialization, and
uneven gender distribution. The student sample was composed of more
males to females. An additional limitation was the samples lack of personal
access to the internet as the factor of expense is an overriding issue in some
developing countries. For those participants who had access, the lack of
efficiency, speed, and intuitiveness of local digital services may be
perceived as another limitation imposed on the sample in terms of their
tolerance to the poor quality of the IT service. These factors have been
observed by other practitioner researchers as obstacles to participants
performance (Akhras, 2012b; Jenkins, 2006).
To conclude, this small scale research study found that young leaders
proved to be effective manager by applying authority. Pragmatically,
IJCSBI.ORG
organizational culture proved to be hierarchical. Nonetheless,
globalization, liberalization, democratization are changing the make-up of
the political economic landscape as direct investment through multinational
business corporation may infuse Western culture (Praveen Parboteeach &
Cullen, 2012; Toone, 2012; Kalayc and Adtan, 2012; Hill and
Hernandez_Requejo, 2011). As a practitioner-researcher, I believe that
further research ought to be conducted in other business institutions in the
MENA in order to determine whether the finding arrived at in this small
scale study (Bates, 2005) are similar to others in the region. It is
recommended that further research be conducted in order to better
understand the nature and role of millennials as the emergent or assigned
new generation of post-information technology leader.
REFERENCES
Akhras, C., 2012a. Building student engagement: Integrating the discussion forum. Journal
of Emerging Trends in Computing and Information Sciences, 3(10).
Akhras, C., 2012b. MBA online: Is challenging peer work motivating? Mastered? Journal
of Educational Multimedia and Hypermedia, 21(4), 215-231.
Alexander, C. S. and, Sysko, J. M. 2012. A study of the cognitive determinants of
Generation Ys entitlement mentality. Academy of Educational Leadership Journal, 16(2),
63-68.
Avolio, B. J. and Kahai, S. S.,2001.Adding the e to e leadership: how it may impact your
leadership. Organizational Dynamics, 31(4), 325-338.
Bass, B. M and Bass, R. 2008. The Bass Handbook of Leadership: Theory, Research,
and Managerial Applications. New York: Free Press.
Bates, A. W. 2005. Technology, E-Learning and Distance Education. 2nd Edition.
Routledge: London.
Beaver, G. and Hutchings, K. 2005. Training and developing an age diverse workforce in
SMEs: The need for a strategic approach. Education + Training, 47(7/8), 592-604.
Blanchard, K. 1996. Turning the organizational pyramid upside down, The Leader of the
Future. The Drucker Foundation. Editors F. Hesselbein, M. Goldsmith, and R. Beckhard.
San Francisco: Jossey-Bass Publishers. pp.81-88.
Brokaw, T. 1998. The Greatest Generation. New York: Random House.
Carte, T. A., Chidambaram, L. and Becker, A., 2006. Emergent leadership in self-managed
virtual teams: A longitudinal study of concentrated and shared leadership behaviours.
Group Decision and Negotiation, 15, 323-343.
Cisco 2011. Connected World Report. Cisco.
Covey, S. C. 1996. Three roles of the leader in the new paradigm. The Leader of the
Future. The Drucker Foundation. Editors F. Hesselbein, M. Goldsmith, and R. Beckhard.
San Francisco: Jossey-Bass Publishers. pp. 149-160.
Crampton, S. M. and Hodge, J. W., 2007. Generations in the workplace: Understanding age
diversity. The Business Review, 9(1), 16-22.
Demirdijian, Z. S., 2012. The millennial generations mindset: Susceptibility to economic
crisis. The Business Review, 19(2), 1-11.
Drucker, P. F. 1985. Innovation and Entrepreneurship: Practices and Principles. New
York:
IJCSBI.ORG
Edmunds, J. and Turner, B. S. 2005. Global generations: social change in the twentieth
century. The British Journal of Sociology, 56(4), 559-577.
Elloy, D. 2008. The relationship between self-leadership behaviours and organization
variables in a self-manged work team environment. Management Research News, 31(11),
801-810.
Erez, A. Lepine, J. and Elms, H. 2002. Effects of rotated leadership and peer evaluation on
the functioning and effectiveness of self-managed teams. Personnel Psychology, 55, 932-
947.
Farren, C. and Kaye, B.L. 1996. New skills for new leadership roles. The Leader of the
Future. The Drucker Foundation. Editors F. Hesselbein, M. Goldsmith, and R. Beckhard.
San Francisco: Jossey-Bass Publishers. pp. 175-188.
Ferrell, O. C., Hirt, G. A. and Ferrell. L. 2012. Business: A Changing World. 8th edition.
New York: McGraw Hill
Fraenkel, J. R. and Wallen, A. 2006. How To Design and Evaluate Research in
Education. 6th ed. Boston: McGraw Hill.
Gleeson, P. B. 2007. Understanding generational competence related to professionalism:
Misunderstandings that lead to a perception of unprofessional behaviour. Journal of
Physical Therapy Education, 21(3), 23-28.
Glucker, J. and Schrott, G., 2007. Leadership and Performance in Virtual Teams: Exploring
brokerage in electronic communication. International Journal of e-Collaboration, 3(3), 31-
52.
Goleman, D. 2006. Social Intelligence. New York: Bantam Books.
Handy, C. 1996. The new language of organizing and its implications for leaders. The
Leader of the Future. The Drucker Foundation. Editors F. Hesselbein, M. Goldsmith, and
R. Beckhard. San Francisco: Jossey-Bass Publishers.3-10.
Hill, C. H. and Hernandez-Requejo, W. 2012. Global Business Today. Seventh Edition.
New York: Mc Graw Hill Irwin.
Howe, N. and Straus, W. 2007. Millenials Go to College. Virginia: LifeCourse Associates.
Jenkins, H. 2006. Confronting the challenges of participatory culture: Education for the
21st century. The John D. And Catherine T. Mac Arthur Foundation. Retrieved August
28, 2012. http://digitallearning.macfound.org.
Kalayc, C. and Adtan, S. 2012. Democracy and trade: the case of OECD and MENA
countries. TISK Academy. 7(13), 198-219.
Kapor, C. and Solomon, N. 2011. Understanding and managing generational differences in
the workplace. Worldwide Hospitality and Tourism Themes, 3(4), 308-318.
Kets De Vries, M., Guillen, L., Korotovv, K. and Florent-Treacy, E. 2010. The Coaching
Kaleidoscope : Insights from the Inside. INSEAD Business Press. London, United
Kingdom: Palgrave Macmillan.
Kinicke, A. and Fugate, M. 2012. Organizational Behavior. 5th edition. McGraw Hill
Lippman, S., Bulanda, R. E., and Wagenaar, T. C. 2009. Student entitlement: Issues and
strategies for confronting classroom and beyond. College Teaching, 57(4), 1-12.
Maney, K., Hamm, S., and OBrien. 2011. Making the World Work Better: The Ideas That
Shaped a Century and a Company. Upper Saddle River, New Jersey: IBM Press Pearson-
plc
Marston, C. 2007. Motivating the whats in it for me workforce.: Manage across the
generational divide and increase profits. New Jersey: Wiley.
Martin, C. A. 2005. From high maintenance to high productivity: What managers need to
know about Generation Y. Industrial and Commercial Training, 37, 39-44.
Myers, K., and Sadaghiani, K. 2010. Millennials in the workplace: A communication
perspective on millenials organizational relationships and performance. Journal of Business
Psychology, 25, 225-238.
IJCSBI.ORG
Nicholson, D. B., Sarker, S., Sarker, S., and Valacich, J. S. 2007. Determinants of effective
leadership in ainformation systems development teams: an exploratory study of face-to-face
and virtual contexts. Journal of Information Technology Theory and Application, 8(4), 39-
49.
Oh, Se-Hyung. 2012. Leadership emergence in autonomous work teams: Who is more
willing to lead. Social Behavior and Personality, 40(9), 1451-1464.
Orsburn, J. D. & Moran, L. 2000. The New Self-Directed Work Teams: Mastering the
Challenge. New York: McGraw Hill.
Payment, M. 2008. Millenials: The emerging workforce. Interview with Carol Christen.
Career Planning and Adult Development Journal, 34(3), 23-32.
Pew Research Center. 2010, February 24. The millennials :confident. connected. open to
change. Retrieved November 12, 2010. From http://pewresearcg.org/pubs/1501/
millennials-new-surveyy-generational-personality-upbeat-open-new-ideas-technology-
bound.
Praveen Parboteeeach, K. and Cullen, J. B. 2012. Strategic International Management.
International Edition. New York: SouthWestern CENGAGE Learning.
Randeree, K. and Ninan, M., 2011. Leadership and teams in business: a study of IT projects
in the United Arab Emerites. Journal of Managing Projects in Business, 4(11), 28-48.
Robbins, S. and Judge, T. 2012. Organizational Behavior (15e/Global) Pearson: Prentice
Hall
Scheck, M., 2012. Training and management of pilots across generations. International
Journal of Business and Social Science, 3(3), 137-150.
Shirky, C. 2008. Here Comes Everybody. New York: Penguin.
Silbergh, D. and Lennon, K., 2006. Developing leadership skills: Online vs. Face-to-face.
Journal of European Industrial Journal. 7(30), 498-511.
Straus, W, and Howe, N. 1991. Generation: The History of Americas Future. 1584-2069.
New York: Quill William Morrow.
The Drucker Foundation. 1996. Foreword. P. Drucker. The Leader of the Future. The
Drucker Foundation. Editors F. Hesselbein, M. Goldsmith, and R. Beckhard. San
Francisco: Jossey-Bass Publishers. pp. xi-xv.
Toone, J. E. 2012. Mirage in the Gulf: Examining the upsurge in FDI in the GCC and its
legal and economic implications for the MENA region. Emory International Law Review,
26(2), 677-731.
Trzesniewski, K. H. and Donnellan, M.B., 2010. Rethinking the Generation Me : A study
of cohort effects from 1976-2006. Perspectives on Psychological Science, 5, 58-75.
Twenge, J. M. 2006. Generation Me: Why Todays Young Americans Are More Confident,
Assertive, Entitled__and More Miserable Than Ever Before. New York, Free Press.
U. S. Department of Education. http://www.ed.gov/rschstat/landing.jhtm
U.S. Department of Commerce. http://www.commerce.gov/ ; www.census.gov.
Ulrich, D. 1996. Credibility X Capability. The Leader of the Future. The Drucker
Foundation. Editors F. Hesselbein, M. Goldsmith, and R. Beckhard. San Francisco: Jossey-
Bass Publishers. pp. 209-220.
Welch, J. and Welch, S. 2007. Winning. New York: Mass Market Paerback.
Zigurs, I., 2003. Leadership in virtual teams: Oxymoron or opportunity? Organizational
Dynamics, 3(4), 339-351.
Zivick, J., 2012. Mapping global virtual team leadership actions to organizational roles. The
Business Review, Cambridge, Maryland. 19(2), 18-25.
Zopiatis, A., Krambia-Kapardis, M, and Varnavas, A. 2012. Y-ers, X-ers, and Boomers:
Investigating the multigenerational [mis]perceptions in the hospitality workplace. Tourism
and Hospitality Research, 12(2), 101-121.
IJCSBI.ORG
APPENDIX
Survey
Please fill out the following survey related to the team you belonged to. Answer all the
questions posed honestly. On the Likert scale below, 1 represents no authority, 3 moderate
application of authority whereas 5 represents appropriate application of authority).
1. In the team you belonged to, did one of the team members emerge as a leader?
Yes----- No-----
Who was it?-----
2. Circle whichever personality characteristics the team leader reflected interacting
on the team project
a. Assertive
b. Diligent/Conscientiousness with respect to task completion
c. Flexible
d. Taking full charge of task completion
e. Supportive
f. Communicative on different IT media 24/7
g. Dominant
3. How much authority did the team leader exercise when you completed task one of
the team project, adding IT features to the blog? 1 3 5
4. How much authority did the team leader exercise when you worked on completing
task two of the team project, the collaborative work on the team project? 1 3 5
5. How much authority did the team leader exercise when you and your team mates
completed task three, completion of the team project? 1 3 5
6. Based on the leaders behavior within the team, how much of an entitlement
attitude did s/he display. 1 3 5
IJCSBI.ORG
ABSTRACT
This article considers the work of the system Electronic Reception as the queuing system.
An overview the structure of the system Electronic Reception as a chart is given. The
initial descriptions for the queuing system are formed. Also scheme simulation model of
Electronic Reception is represented and found probabilities of states of the system using
the application of queuing theory. Context diagram of process of queuing system
Electronic Reception is designed. Data flow diagrams of the first level of the queuing
system Electronic Reception and data flow diagram of the subsystem Analysis of claim
which detailed the context diagram of process of queuing system Electronic Reception is
designed. A simulation model of single-channel service system Electronic Reception is
realized. The initial output characteristics of a service system Electronic Reception and
the parameters of the simulation model are formed. The state probabilities of the service
system are found. For a description of the mathematical model queuing system Electronic
Reception use data that were obtained in one of the experiments.
Keywords
Queuing system; Simulation model; States marginal probability; Consolidation; Electronic
Reception; System.
1. INTRODUCTION
Under the modern conditions of information technologies development,
increases the role of the Internet in people's lives has emerged the concept of
"information society". Therefore there is a necessity to implement electronic
governance for communication between authorities and citizens in various
spheres of life.
One example of such contact is the implementation of electronic public
receptions. The main purpose of electronic receptions is providing the
citizens with passive and active access to public information, electronic
consulting, collecting and analyzing citizens' views about current events,
issues. Informational services, provided by electronic reception, include:
receiving electronic claims and offering electronic consultation, receiving
claims which are addressed directly to the heads of departments of the city
council [1].
IJCSBI.ORG
The advantages of implementing electronic receptions in the field of
electronic governance are:
ensure transparency of information by public authorities (citizen can
track their claims at all stages of consideration);
citizens save time (you can get consultation through the Internet and
personal computer at home);
access to resources at any time;
saving privacy of citizens.
Despite listed above advantages, still remain some disadvantages:
the processing time is unknown;
because of large number of claims, some can be lost and not
considered;
the time it takes to review an claim, may exceed the time limits
specified in the notice of consideration of claims and therefore
claims may remain unanswered.
In this case, in order to assess the performance of electronic receiving and, if
necessary, to make it more efficient, it is necessary to analyze it as a
queuing system.
It is necessary to solve a number of problems that may arise in the queuing
system. The main reason of these problems is irregular income of claims. It
is not possible to predict how and when complaints will be received by the
queuing system "Electronic Reception", and so there can be cases when the
system may not cope with incoming applications. There is a negative state
of system when system is almost always in a state of inaction. In such case,
the cost of its implementation is not justified [2].
It is important to organize the system to increase its throughput and
minimize losses of claims. On this depends on the number of channels that
are working on stream of claims, their productivity and discipline service.
Therefore it is important to analyze the work of the "Electronic Reception"
in artificially created conditions to obtain empirical results for the proper
relationship of government with citizens and quick respond.
IJCSBI.ORG
electronic appeal from the receipt time is impossible to determine by
mathematical means. Despite this requirement using simulation modeling is
obvious and undeniable. To construct the imitation model it is necessary to
reproduce as accurately as possible all the processes that occur in the
system. This requires analyzing in detail all system components and the
relationships between these components.
Established simulation model of system of electronic processing of appeals
applied and successfully used in the field of e-governance, particularly in
city councils that in improved service delivery to the city citizens are
interested. Also, this model is used in the educational organizations in order
to establish feedback to applicants, students, teachers, and, in general,
institutions, organizations and companies to establish regular contact with
its customers and to receive quickly respond to the proposals, complaints or
shortcomings in the work.
IJCSBI.ORG
spam
incoming flow 1.1. Analysis of 1.2. Deleting
claim confirm the deletion spam
of applications
data about
users and
status of claims
new
1.3. Processing claims
claims in certain data storage
department
Information
about claims
and users
change
the status
of claims
Figure 2. Data flow diagram of the first level of the queuing system "Electronic
Reception
Figure 2 shows the major subsystems that a claim passes, namely:
analysis of a claim;
deleting spam;
processing claim in certain departments;
sending a reply.
After analyzing the subsystems that resulted from the decomposition of
contextual diagrams we can conclude second level decomposition of the
subsystems "Analysis of claims" and "Reply to the user." is possible.
The first subsystem "Analysis of claims", which is shown in Figure. 3, is
divided into the following processes:
analysis of user data and text of claim;
definition of the claim category and appropriate department;
sending a claim to the department;
composing of a response.
Input data of subsystem: incoming flow of applications. Output data of
subsystems: spam, responses, new claim, entering information into the
database.
IJCSBI.ORG
data about
confirm
users and
the deletion
spam status of claims
1.1.2. Definition
1.1.1 Analysis of
incoming flow of the category
user data and
of applications claims and
text claims
department
1.1.3. Sending
an claim to the new claims
department
1.1.4.
Formulation and data storage
responses
IJCSBI.ORG
considering claim and date of its completion is added to the status of a
claim.
processed claims
1.4.2.Fixing
change
1.4.1. Preparation discuss treatment
the status
posts completion status
in the database of claims
IJCSBI.ORG
in the citizens` claims of three types: application of the relative priority
(claim1), application of conventional type (claim2) and processed claim that
only requires an answer (claim3). An arrival time of application is
determined by the exponential distribution law. The service time is given to
implement the system with priority, but it is believed to be exponentially
distributed [4].
Only one claim is served by a channel at a time period. If the channel is not
loaded when a message comes, claim will be processed. If there are no
claims, the system is idle.
The discipline of service is following: if the system is already analyzing an
ordinary claim or a processed claim, the claim with priority does not
displace the claim of these types of services, and becomes the next.
If the system has no claim with priority, claims are served according to the
FIFO discipline. If the system has several claims with priority, they are
ordered for processing adhering to the rules of the discipline FIFO
discipline.
Basing on the described above initial output characteristics perform, the
simulation model is constructed and common parameters to the system as a
whole and blocks separately are formed. As a result of simulation and
analysis of the results is proved that the number of service channels,
necessary for the simplest flows manages flows and other types processing.
Claim
Claim 11 Exponentially
distribution
Exponentially uniform
distribution distribution
path combiner
(setting FIFO
priorities)
Claim
Claim 22 answer
answer
Exponentially
distribution
Claim
Claim 33
IJCSBI.ORG
mathematical model QS "Electronic receiver" type M/M/1 and M/M/2, and
thus find the probability states in which the system may be.
For a description of the mathematical model QS "Electronic receiver" type
M/M/1 use data that were obtained in one of the experiments.
It is necessary to describe all possible states of single-channel service
system "Electronic Reception":
S 0 service channel is free;
S1 service channel is busy, but there are no queues;
S 2 service channel is busy, there is a claim in the queue;
S m service channel is busy, all m claims are queuing, the condition
< should be true.
1 1
Calculate the value of :. 0,897666 . From the formula
t ser 1,114
we find : 0,3915 0,897666 0,351436 . Since the
intensity of the input stream is smaller than the intensity of the channel
and the load factor <1, the marginal probability of the system exists and
the queue is not growing constantly. As a result of the service system
"Electronic Reception" will go down in a steady (stationary) mode. The
relative bandwidth of the system is Q Pser 1, and the absolute bandwidth is.
To find the probability of system states we use already defined formulas that
describe the processes of "death and reproduction."
The probability that the message will be processed Ppro is 1, and in turn, the
probability of denial of service Pden is 0.
IJCSBI.ORG
Maximum probability that provided employment service facility, in turn is
one appeal, is p2 2 (1 ) 0,39152 0,6085 0,093266 0,0933 , that
the probability of this event is 9.33%.
IJCSBI.ORG
2
p2 p0 0,08644619 0,0865 or 8,65%;
2!
3
p3 p0 0,01591186 0,0159 or 1,59%.
3!
The probability that in the queue are one or two appeals is defined as
follows:
3 0,55223
p21 p0 0,567 0,02386779 0,0239 ;
212! 22
4 0,5522 4
p 2 2 2 p0 0,567 0,006589897 0,0066
2 2! 42
The probability that the queue will be formed is:
3
Pq p0 0,0329711198 0,0329 .
2!(2 )
The average number of available channels is
na n 2 0,5522 1,4478 , and the employment rate channel is
ne 0,5522
ke 0,2761 .
n n 2
Thus, multi-channel service system is the equal time period in free and busy
state, which may indicate that the system is functioning normally.
6. CONCLUSIONS
In the article the structure of the "Electronic Reception" is suggested and the
initial baseline of characteristics for the service system is formulated. The
simulation model of the queuing system "Electronic Reception" is presented
and the probability of boundary conditions of the system is determined.
Efficiently performed modeling of functioning process of queuing system
"Electronic Reception" is allow creating a system that can provide an
opportunity to give electronic consultations to citizens on various issues
timely. As a result, the implementation of electronic receptions in the field
of electronic governance ensure transparency of information by public
authorities, save time of citizens, give access to resources at any time and
save privacy of citizens. Also, the result of modeling implementation allows
effectively plan electronic reception functioning, to analyze the possible
problems that arise in the system, to calculate the required material,
financial and human resources.
IJCSBI.ORG
7. REFERENCES
IJCSBI.ORG
A. M. Peleshchyshyn
Lviv Polytechnic National University, Lviv, Ukraine
Z. Holub
Lviv Polytechnic National University, Lviv, Ukraine
ABSTRACT
The growing popularity of social networks made them a perfect platform for informational
warfare. They are widely utilized in influencing miscellaneous processes of human
interaction, namely opinion formation, decision making, imposing goals and spreading
information. Such interference in peoples behavior poses a threat to the personality and the
society as a whole. An open problem is to reduce the informational hazard in virtual
communities to the threshold value. Our contribution to the solution of the problem is the
algorithm of choosing discussions of a virtual community that are suitable for the influence
on the internal informational space. The algorithm in action is demonstrated on the virtual
community model. In this paper we dwell on one stage of the algorithm, particularly
making suggestions. On this stage, the list of discussions unsuitable for informational
influence (prohibited discussions) is composed. The experiments results have proved the
significance of this stage and the advantages of influencing a virtual community with the
list of prohibited discussions in getting accurate outcome.
Keywords
Informational influence, Informational hazard index, Prohibited discussion, Virtual
community, Group value, Information space, Reachability matrix.
1. INTRODUCTION
The Social networks development and increase in the number of users,
which ensued from continuous improvement of the tools, made social
networks an ideal base for creating virtual communities.
Owing to the content diversity of virtual communities` discussions, the users
have an opportunity to join a related to their fields of interest conversations.
As a result discussions could be used for conducting social researches,
finding out people`s attitudes to various fields of consideration (politics,
culture, etc.). Besides, as time goes by they are more and more used in
information wars, namely electoral competitions, marketing products or
services in the competitive space, or affecting collective conscience. The
last could be carried out with the aim to change people`s behavior, impose
IJCSBI.ORG
goals, that either don`t correspond to their interests or contain information
risks to an individual, society or state.
Thus, there exist not only beneficial to society virtual communities aiming
at enhancing society`s well-being as a whole, or separate social groups and
individuals life, however social networks are more and more used for
creating destructive virtual communities. Destructive communities do not
exclude illegal methods from their strategies. They direct their aggression at
opposing social networks or generally at society.
One of the methods used in information wars and preventing information
hazards is informational influence, which is employed for informational
management. In this case informational management means providing the
objects of influence with the information that will make them alter the
course of their behavior.
Informational influence success to the great extent depends on the right
choice of the object for informational influence. To put it differently
information advantage is essential. This necessity is a result of the
complicated discussion structure of virtual communities. Due to the
immense network of interconnected with hyperlinks discussions and
numerous registered users, the informational influence on all virtual
community`s constituents at once is impossible.
2. RELATED WORKS
The rules, following which a state could combat informational influence of
virtual communities, are presented in [1, 2]. They are:
Applying force - shutting down servers;
Legal prosecuting virtual community members;
Monitoring and exercising of informational influence methods with
the aim to fight the informational influence of virtual communities.
Monitoring and exercise of informational influence methods to fight virtual
informational influence of communities is proved to be in the long run the
most efficient of three enlisted previously methods. These methods give
opportunity not only to cease or slow down virtual communities activities
but change their ideology.
In the research [3] the model of virtual community informational space,
which consist of exterior and internal informational space, was created.
Taking into account the model of informational space presented in [4, 5]
was worked out informational hazard index. It is utilized to measure the
informational hazard level. The following constituents of informational
space are considered:
IJCSBI.ORG
The number of virtual community members;
The amount of operating assets;
The amount of virtual community content;
Discussion relations structure of a virtual community.
In order to resist and fight informational hazards in virtual communities it
was researched how to choose the appropriate strategy of informational
influence on internal virtual community space.
The strategies of influence on the internal space of the virtual community
were worked out according to the rules of counteraction to informational
hazards in virtual communities.
Strategy 1. Discussions banning, that means decrease in discussions and
members number.
Strategy 2. Destroying discussions` relations, doesn`t involve without
diminishing discussions and members number.
Strategy 3. Destroying discussions` relations, with the aim of forming
groups of discussions, doesn`t involve without diminishing discussions and
members number.
Conducted researches [6] showed that the most efficient in influencing the
structure of virtual community`s informational space are mixed strategies.
Before making this deduction the following influence types were studied:
Discussions relations destroying by means of discussions banning;
Informational influence on discussion content in order to reduce the
degree of messages relevance to the discussion`s topic, which would
result in transferring the discussion to rival virtual community.
IJCSBI.ORG
Member(VirtualCommunityi ) means the set of registered in social networks
-th virtual community participants (members);
Ni
Member(VirtualCommunityi ) = Member (Thread j )
j =1
,
Member (Thread j )
where represents the set of registered in social networks
j-th discussion participants;
N i represents the number of -th virtual community discussions;
link ij
where indicates the existence of hyperlinks between the i-th and the j-
th discussions of the virtual community;
n denotes the number of discussions in the virtual community;
IJCSBI.ORG
The presence of a hyperlink between the i-th and the j-th discussions in the
virtual community is determined in the following way:
Or:
IJCSBI.ORG
4. THE ALGORITHM OF CHOOSING DISCUSSIONS
The algorithm outcome is the minimal amount of the virtual community
discussions sufficient for performing informational influence on the internal
space aiming at reducing informational hazard to the threshold level.
Running the algorithm the following complementary goals are reached:
Discussions groups forming;
When applying the algorithm repeatedly, the feedback of
informational influence on the virtual community should be taken
into account.
The overall algorithm is depicted on Figure 1.
BEGIN
Block 1
Forming groups of
discussions
Block 2
Choosing a
discussion for II
Excluding the
discussion from VC
Block 3
Calculating information
hazard index
InfTreat(VirtualCommunity)
InfTreat (VirtualCommunity) >
InfTreat *
Block 4
Making
suggestions
END
Figure.1: The flow chart of the algorithm of choosing virtual community discussions
suitable for the influence on the internal informational space.
IJCSBI.ORG
4.1 Block 1
Discussion groups have to be formed according to the following rules [4,5]:
The group can`t be empty, it should consist at least of one
discussion.
A virtual community can contain from 1 to n groups (n means a
number of discussions in a virtual community), therefore the group
can contain from 1 to n discussions.
All discussions are interconnected with internal and exterior
hyperlinks or have common members. Discussions, not connected
with any discussion of the group, found another group.
All discussions of the group have no internal or external hyperlinks
and no common members with the discussion from the other groups.
Otherwise, the groups have to be referred as to one.
Next step is to assess the value of the formed groups. The formula for
calculating virtual community group value is presented further:
M i
ln (Sim(Thread j ) card (ThreadMembers j ) )
( Group )
j =1
ThreadMembers j
where represents the set of the j-th discussion participants;
Sim(Thread j )
stands for the degree of the j-th discussion`s topic relevance;
M (Groupi ) stands for the number of discussions in the j-th group.
The degree of relevance is calculated by the equations described below [3]:
Post +j (Thread i )
where the set of the -th discussions positive messages;
IJCSBI.ORG
Post (j flood ) (Thread i )
means the set of the i-th discussions messages that in
light of the virtual community subject matter convey no useful information;
N (Threadi ) means the number of the -th discussions messages.
And
Weight (Post )
N ( Thread i )
+
j (Thread i )
j =1
Sim(Thread i ) =
Weight (Post )
N ( Thread i )
j (Thread i )
j =1
where
(
Weight Post +j (Thread i ) )
denotes the weight of the -th discussion`s
positive messages;
N (Threadi ) denotes the number of the -th discussions messages.
w *
Centroid (Threadi )
M Centroid (Threadi )
,
w*
wher Centroid (Thread i ) represents the weight of the keyword from the -th
discussion centroid, which is in the j-th post of the i-th discussion;
M Centroid (Threadi )
represents the number of the keywords from the -th
discussion centroid, which are in the j-th post of the i-th discussion;
The group that has the highest value of all other groups and contains more
than two elements is to be selected.
4.2 Block 2
Before applying informational influence, it is necessary to decide on a
discussion or several suitable for informational influence discussions.
Further step is excluding the discussion from the virtual community, this
can be achieved either by applying power (shutting down a discussion) or
by informational influence (reducing the degree of the discussion topic
relevance and discussion transfer to the rival virtual community).
4.3 Block 3
Calculating the information hazard index for the virtual community that has
undergone enlisted above changes [4,5]:
IJCSBI.ORG
Value(VirtualCommunity )
Value(VirtualCommunity ) * ,
InfTreat (VirtualCommunity ) =
1, Value(VirtualCommunity ) > 1
Value(VirtualCommunity ) *
i =1 j =1
M j
( Group )
IJCSBI.ORG
5. DISCUSSION GROUPS FORMING
Due to the fact that the virtual community is presented by means of the
matrix method, the algorithm of the graph partition into as dense as possible
graphs is used.
To perform this, the adjacency matrix A is exploited. All the diagonal
elements of the adjacency matrix A are equal 1, as long as, each vertex is
reachable for itself.
Following the parallel algorithm of constructing reachability matrix on the
basis of the graph [9], build the reachability matrix R.
The constructing reachability matrix algorithm consists of the following
steps:
1. Create a reachability matrix .
2. Using the general formula, create a reachability matrix for the k
subsequent iterations.
The matrix where the entry of 1 in row i, column j indicates a path from i to
r =1
j with just one edge ij , is the result of parallel algorithm of constructing
reachability matrix.
Having grouped the matrix R by shifting the columns and rows that have
similar ordinal numbers, you will build a block diagonal matrix , where
the each group of elements denotes a group of virtual community
discussions.
If all matrix elements equals 1, a virtual community is represented only by
one group.
If from all elements representing a vertex, only a diagonal element equals 1,
the discussion is isolated.
IJCSBI.ORG
The algorithm consists of the following steps:
1. Create a reachability matrix .
2. Using the general formula, create a reachability matrix for the k
subsequent iterations.
3. Repeat the step 2 until the sum of all row elements of the matrix
equals the number of discussions in the group.
The outcome of the algorithm are one or several discussions that have the
shortest route to all the other discussion groups of a virtual communities.
IJCSBI.ORG
Besides a discussion list, the prospective structure of the internal and
external information space of the virtual community after informational
influence is sketched.
For the further virtual community monitoring is determined the observation
window. It gives opportunity to see the results of the informational
influence.
During the revised social network monitoring are taken all measures to form
the virtual community with the determined subject matter.
The list of prohibited discussions is made before the revised monitoring.
9. EXPERIMENTAL PART
The calculations were made for the virtual community model with the
following features showed in Table 1.
Table 1. Characteristic features of the virtual communitys models graph
IJCSBI.ORG
4. The highest degree of posts relevance to the topic of the 1
discussion
Calculations were carried out for the two virtual community types:
Type 1.
Virtual communities with no list of prohibited discussions, which usage in
carrying out informational influence is impossible.
Type 2.
Virtual communities with provided list of prohibited discussions, which
usage in carrying out informational influence is impossible. The list is
composed on the basis of calculations made for the Type 1.
For both types calculations are repeated until information hazard index
drops to its threshold value 0,5.
Graphs structures for type 1 and type 2 are depicted in the figures 1 and 2
correspondently.
IJCSBI.ORG
Calculations results for the type 1 and type 2 are presented in the Table 1
and 2 correspondingly.
Table 3. Calculations results for the Type 1
Reduction of an
Isolated discussions count
informational hazard
Informational hazard
index:
index of the VC
Object of the II
Groups count
destroying VC
excluding VC
Step
By means of
By means of
elements
structure
Total
0 1 0,723
1 5 1 2 0,721 0,002 0,002 0,000
2 128 2 9 0,670 0,052 0,051 0,001
3 1 3 13 0,642 0,081 0,079 0,002
4 224 3 20 0,634 0,088 0,086 0,002
5 311 3 20 0,633 0,089 0,087 0,002
6 428 4 32 0,621 0,102 0,099 0,003
7 101 4 38 0,615 0,108 0,105 0,003
8 196 4 42 0,610 0,112 0,109 0,004
9 435 4 53 0,599 0,123 0,118 0,005
10 201 4 57 0,595 0,128 0,122 0,005
11 253 4 59 0,593 0,129 0,124 0,006
12 135 4 70 0,583 0,140 0,133 0,007
13 401 4 75 0,579 0,143 0,136 0,007
14 470 4 79 0,573 0,150 0,141 0,008
15 132 4 85 0,565 0,158 0,148 0,010
IJCSBI.ORG
16 496 4 89 0,560 0,163 0,153 0,010
17 487 4 90 0,558 0,165 0,154 0,011
18 265 4 96 0,552 0,170 0,159 0,011
19 336 4 96 0,551 0,172 0,160 0,012
20 345 4 99 0,547 0,176 0,164 0,012
21 459 5 102 0,536 0,187 0,174 0,013
22 293 5 105 0,532 0,190 0,177 0,013
23 300 5 106 0,528 0,194 0,181 0,013
24 165 5 107 0,527 0,196 0,182 0,014
25 209 5 115 0,521 0,202 0,188 0,014
26 129 5 122 0,512 0,211 0,195 0,016
27 429 5 127 0,508 0,215 0,198 0,016
28 121 5 129 0,505 0,218 0,200 0,017
29 398 5 136 0,498 0,224 0,206 0,018
Table 4. Calculations results for the Type 2
Reduction of an
Isolated discussions count
informational hazard
Informational hazard
index:
index of the VC
Object of the II
Groups count
destroying VC
excluding VC
Step
by means of
by means of
elements
structure
Total
0 1 0,723
1 5 1 2 0,721 0,002 0,002 0,000
2 230 1 7 0,714 0,008 0,007 0,001
3 278 1 11 0,708 0,016 0,014 0,002
4 218 1 12 0,707 0,028 0,014 0,002
5 152 1 12 0,695 0,026 0,014 0,004
6 187 1 12 0,696 0,026 0,014 0,005
7 204 1 12 0,697 0,025 0,014 0,006
8 227 1 12 0,698 0,025 0,014 0,006
9 224 2 18 0,689 0,034 0,023 0,011
10 209 2 25 0,682 0,040 0,029 0,011
11 144 2 28 0,678 0,044 0,032 0,012
12 253 2 30 0,677 0,046 0,034 0,012
13 300 2 32 0,672 0,050 0,037 0,013
14 165 2 34 0,670 0,053 0,039 0,014
15 270 2 35 0,668 0,055 0,041 0,014
16 176 2 35 0,668 0,055 0,041 0,014
17 170 2 39 0,664 0,059 0,045 0,014
18 181 2 41 0,660 0,063 0,048 0,015
19 214 3 41 0,618 0,105 0,089 0,016
20 196 3 45 0,613 0,110 0,093 0,017
21 246 3 47 0,611 0,111 0,094 0,017
22 139 4 48 0,605 0,117 0,099 0,018
23 293 4 48 0,602 0,120 0,102 0,019
IJCSBI.ORG
24 173 4 51 0,600 0,122 0,103 0,019
25 265 4 58 0,594 0,128 0,109 0,019
26 435 4 68 0,576 0,147 0,126 0,021
27 249 5 70 0,571 0,152 0,131 0,021
28 110 6 70 0,553 0,170 0,148 0,022
29 401 6 75 0,550 0,173 0,151 0,022
30 496 6 80 0,544 0,178 0,156 0,023
31 470 6 83 0,538 0,185 0,162 0,023
32 487 6 84 0,534 0,189 0,166 0,023
33 336 6 84 0,534 0,188 0,164 0,024
34 345 6 87 0,530 0,192 0,168 0,024
35 459 7 90 0,519 0,204 0,179 0,025
36 82 8 95 0,510 0,212 0,187 0,025
37 429 8 101 0,507 0,216 0,190 0,026
38 311 8 102 0,506 0,217 0,191 0,026
39 428 8 114 0,494 0,228 0,202 0,026
Figure 4 presents changes of the information hazard index value for the
Type 1and Type 2.
Figure 4. Changes of the information hazard index value for the Type 1and Type 2
Foreseen post-influence structures for the Type 1 and Type 2 virtual
communities are presented in the Figures 4, 5 correspondingly.
IJCSBI.ORG
IJCSBI.ORG
10. CONCLUSIONS
The set in the beginning of the research goals were reached. In other words
the problem was formulated and applying graph-theoretic methods was
developed an algorithm of making the minimal list of virtual community
discussions suitable for the informational influence aiming at informational
hazard reduction to its threshold. By repeated algorithm application, the
feedback of informational influence on the internal space structure of a
virtual community is taken into account. Moreover the list of unsuitable for
informational influence discussions (prohibited discussions) is formed. The
list contains strongly moderated discussions (administrators and moderators
constantly delete undesirable content) and discussions, informational
influence on which caused negative results on the participants of the
discussion. Experiments results proved that the highest informational hazard
index reduction ensued from destroying the structure of internal
informational space. Causing a decrease in virtual community discussions
count (members of virtual community count) appeared to be less efficient.
The maximal informational hazard reduction occur, either by forming
separate groups of discussions according to the Strategy 3 or by forming
large quantity of isolated discussions corresponding to Strategy 2.
11. REFERENCES
IJCSBI.ORG
[8] Zykov, A.A, 1987. The fundamentals of the graph theory. Moscow: Chief editorial
office of physics and mathematics literature.
[9] Kniazkova, A.V. and Volchenskaia, T.V., 2014. The parallel algorithm of finding
reachability in a graph. [online] Fundamental Researches. Available at: <http://
www.rae.ru/fs/?section=content&op=show_article&article_id=10003049> [Accessed
05 June 2014].
[10] Abramov, K.G., Monachov, Ju.B. and Bodrov, I.Ju., 2011. To the question of social
networks topology modeling. In: SFedU (Southern Federal University), 5th All-
Russian scientific-practical conference on theory and practice of imitational modeling.
Saint Petersburg, Russia. 19-21 Oktober 2011. Saint Petersburg: Southern Federal
University, pp. 11 14.
[11] Hubanov, D.A. and Chkhartishvili, A.H., 2014. Formal and informal connections of
users of Facebook social network. In: IMP RAS (The Institute of Management
Problems of the Russian Academy of Sciences), 12th All-Russian conference on
management issues. Moscow, Russia.16-19 June 2011. Moscow: The Institute of
Management Problems, pp. 301 309.
IJCSBI.ORG
Mohammed Mustapha
INEC, Abuja-Nigeria
ABSTRACT
VoIP as a packet switched system is clearly one of the most important evolving trends in
computing and telecommunications. However, just like many other new Information
technology trends, VoIP introduces both security risks and opportunities for the IT world,
viable solutions of which are required. The use of publically verified cryptographic
algorithms to ensure confidentiality of VoIP traffic transmitted over insecure public
networks as the Internet cannot be overemphasized. Nonetheless, the uses of cryptographic
algorithms yet imposes a delay overhead and packet size overhead on VoIP, which is
unconnected to the processing time required to encrypt/decrypt bits or blocks of data and
the increase in packet size due the block size of the encryption algorithm. This delay levied
is dependent on the mode of operation of the cryptographic algorithms. Mindful of the fact
that other components like voice codecs and network bandwidth also contributed delay
capabilities on VoIP traffic, and additions of security overheads, there exists a threshold
point where an increase in call volume exerts a negative effect on pre-established calls with
respect to time and the rate of packet loss. This study sought to determine the combination
of cryptographic algorithms, cipher mode and voice codec that holds the uppermost
threshold point, before the latency and rate of packet loss of active calls goes past ITU
acceptable standards; for one way latency in both plain and encrypted VoIP traffic of
150ms and 200ms respectively and 5% packet loss rate. Through simulation of appropriate
scenarios, results indicates that each of the encryption algorithms (AES, DES and 3DES)
append additional overhead on the e2e delay and rate of packet loss during VoIP
transmission. Also revealing that VoIP-supported codecs are faster and have a higher
threshold in terms of the number of calls before the e2e delay and the rate of packet loss
exceeds the acceptable limit for encrypted and plain VoIP e2e delay and packet loss rate.
Keywords
VoIP QoS, VoIP Security, VoIP Encryption, Block Cipher Encryption, Stream
Cipher Encryption.
1. INTRODUCTION
The use of stream media applications such as Voice over Internet Protocol
(VOIP) is of great importance in todays co-operate business strategy,
public and private use because it provides a cheap alternative to the
IJCSBI.ORG
IJCSBI.ORG
both academia and industry, for the adequate selection of the best
encryption algorithms, the best mode of operation (stream/block), combined
with the best voice codecs for implementing in secure VoIP transmission.
Although VoIP uses two main protocols; the signalling protocol and media
transfer protocol, this work focuses on measuring the effect of encryption
algorithms on media transfer protocols (RTP) only for pre-established VoIP
transmission. Latency (e2eDelay), Packet Jitter and Packet Loss Ratio are
the key network metrics used to determine the QoS of VoIP transmission.
Precisely, only the effect of latency (e2eDelay) and the packet loss rate of
the encryption algorithms will be determined. Encryption Algorithms to be
covered include; Advance Encryption Standard (AES) with 128 bits key,
Data Encryption Standard (DES) with 56 bits key and Triple Data
Encryption Standard (3DES) with 56 bits key. The effects on latency and
packet loss rate of the above listed encryption algorithms will be determined
on G.711 and G.729 voice codec support VoIP network.
IJCSBI.ORG
dedicated end-to-end connection between the two end users, VoIP packet
transmission does not require a directed channel, but rather employs UDP,
which is a connectionless transport protocol. In VoIP, how the packets get
from source to destination is not as important as the speed taken by packets
to reach destination from the source [9]. VoIP supports the use of IP-phones
(phones connected to the router), computer-to-computer communication,
soft-phones (software based phones such Skype) and also in combination
with PSTN or SIP-Based VoIP (internet/intranet), figure 1 shows a basic
architecture of a VoIP system [10].
IJCSBI.ORG
2.1.1 Confidentiality
This defines a concept protecting data or information from unauthorised
accessed. It is achieved by encrypting the media transport protocols using
symmetric encryption algorithms running in stream or block cipher modes
to encrypt/decrypt VoIP packet or blocks of VoIP packets. SRTP was
developed to provide RTP with a means of ensuring confidentiality. SRTP
encrypts only the payload section of the VoIP packet, leaving the Header
information (IP/UDP/RTP) section unencrypted [14]. All VoIP packets
traffic are encrypted at source and decrypted at the destination by a Crypto-
Engine.
2.1.2 Integrity
This principle saves from unauthorised modification of data or information.
The integrity of VoIP traffic is archived by the use of a Hash function
algorithm. By default HMAC-SHA1 is used to ensure that VoIP packets
have not been altered during transmission. Integrity is also implemented in
VoIP when establishing a session in SIP. Typically, hashing the VoIP
packet includes both the VoIP payload and the information Header. At the
source end a hash value of RPT or SRTP VoIP packets is generated and the
integrity is checked at the destination end by generating its own hash value
and comparing it against the hash value of the received.
2.1.3 Authentication
The security by Authentication feature used in VoIP is performed on the
Session Protocols, in order to authenticate end-to-end establishment of VoIP
session, asymmetric encryption algorithms are used. The two end users
IJCSBI.ORG
negotiate a cipher suite to use in order to create a master key [14]. For
instance, the SIP protocol doesnt support any security mechanisms, but by
the use of well-known, publically tested internet security mechanisms such
as HTTP digests; it provides a mechanism for authenticating VoIP users.
The authentication process can be hop-to-hop or end-to-end [21].
However, the service flexibility in terms of mobility has seen wireless VoIP
(VoIPoW) advancing farther than landline networks. VoIPoW enables
mobile devices such as laptops, mobile phones, two way radios etc., to place
and receive VoIP calls on a wireless network infrastructure either through
Wireless LAN or Wireless WAN. Just like in VoIP wired landline network,
in VoIPoW; the user terminal connects and registers with a call server by
obtaining an IP address from a DHCP server, while SIP and RTP protocols
supported by TCP/UDP helps the user to initiate and engage in a VoIP
conversation by routing the compressed voice packet over a gateway to the
destination user. Thus, VoIP employs the use of multiple protocols that
support IP-based network, wired or wireless radio communication
technology and other legacy communication systems such as PSTN and
ISDN. It can also be deployed on a multitude of different architectures.
For instance, Session Initiation Protocol (SIP) is a signalling protocol that is
an application layer protocol on the TCP/IP network model which is based
on request-response. It implies a client/server based architecture usually
connecting two end users via a proxy server. The protocol is used to
establish, terminate and modify sessions in VoIP over an IP based network
[22]. SIP is also supported by Session Description Protocol (SDP); a
protocol that carries the session descriptions such as session information
and media information [23]. SDP is transmitted with the SIP packet during
the first INVITE packet and contains the session information that consists
IJCSBI.ORG
of the session name and proposes the number of times the session is active,
and the contact detail of the source of the session. The media information
consists of type of media (voice/video) and the transport protocol
information (RTP/UDP/IP).
2.3.1 Latency
Latency or e2edelay in VoIP is the total round-trip delay time for a bi-
directional VoIP packet transmission between two end users [29]. It can be
measured in two ways; 250ms for a round-trip from source to destination
and back to the source, or 150ms for one-way trip from source to
destination, which also includes the delay time for the packet to travel along
multiple hops over the internet as specified by the ITU-G 11.4 standards. It
is calculated by defining three parameters in VoIP transmission; Dtransmitter,
IJCSBI.ORG
2.3.2. Jitter
Jitter defines the measured variation in each successive packet arrival time
due to transmission delay [32]. This occurs when each successive packet
have a different latency, since packets are transmitted over the network by
the UPD transport protocol each packet will take a different pathway, and
the arrival time will differ from source to destination A jitter buffer
algorithm is used to assemble the packet but at the cost of time. If the packet
cannot be reassembling within 150ms the packet is dropped. The
acceptable level of jitter is about 20ms regardless of the number of multiple
hops between the source and destination, if the time increases above 20ms
the buffer cannot reassemble the packets in correct order making the
conversation sound choppy [30].
IJCSBI.ORG
A comparative study of the effects of AES in both stream and block cipher
modes on the QoS results relative to end-to-end delay between two end user
[35]. The objectives of the study included; determining the errors generated
by the two cipher modes when packets are decrypted at the destination end,
and the effect of the errors on the QoS. Secondly, determining the effect of
the two cipher modes on packet size, crypto-engine and packet loss on the
QoS in terms of end-to-end delay. The authors used a GSM 06.10 Codec
and AES algorithm for both stream and block mode to encrypt and decrypt
RTP on the crypto-engine. The result showed that the packet size, crypto-
engine and the packet loss all bear effects on the end-to-end delay between
two end users. This outcome was further consolidated by [36], in his work.
He worked on the effect of AES on packet size and the throughput of the
crypto-engine when AES is operating on stream and block cipher mode.
IJCSBI.ORG
Considering packet size scenario, his work showed that that each of the
cipher mode has an effect on the packet size but AES operating on block
cipher mode has a greater effect on packet size when compared to stream
cipher mode, [36]. Considering crypto-engine, AES was used on the two
cipher mode and the crypto-engine saturated by increasing the PPS by 25
PPS in every 30 seconds for each four (4) VoIP packet transmitted with the
size of 60, 100, 250, and 100 for each of the four packets respectively.
While focusing on packet size, the study proves that each of the cipher
mode has an effect on the packet size but AES operating on block cipher
mode has a greater effect on packet size when compared to stream cipher
mode, the outcomes are shown in figures 2 and 3 [36].
The maximum threshold of the two cipher modes before the QoS is affected
is indicated by a negative slope. In terms of packet loss, Mean Opinion
Score (MOS) was used to evaluate the effect of packet loss on QoS of the
two cipher modes on end-to-end delay. As would be noted, AES as stream
cipher mode has less packet loss in end-to-end delay compared to block
cipher mode, because of the use of key stream by stream ciphers.
Summative, it implied that AES on stream cipher mode has a better
performance than when run on block cipher mode that is before loss due to
synchronization error [36].
IJCSBI.ORG
The end-to-end delay when encryption was applied was above 200ms which
is beyond the acceptable limit. However, packet loss consideration revealed
a three-time increase in the payload size; especially when the payload size is
10 bytes and also observed that the rate of packet loss is lower with
increased payload size when using DES/3DES encryption algorithm. For
IJCSBI.ORG
call volume traffic the study revealed that for all payload size when G.729
codec is used with DES/3DES; the rate of packet loss will be above the
acceptable loss limit [38].
The works reviewed took differing approaches for answering the question
which algorithm is better in terms of the effect on the QoS of the VoIP
network? The outcomes are quite similar with respect to latency, packet
loss with each laying emphasis on direct relation between latency, packet
loss, and jitter to the type of encryption algorithm in the crypto-engine, the
cipher mode of operation, length of the encryption key and the payload size
(codec). However, they both bear varied strengths and limitations that
basically tended towards methodology, topology and parameters. While the
former used a point-to-point network connection between the two hosts;
which restricted the results to only VoIP in a peer-to-peer network, and
focused on the use of only AES encryption algorithms, without
considerations to other encryption algorithms like DES, 3DES, Blowfish,
etc. The latter simulated a real world application of VoIP network with
routers, switches, and firewall but whose result is only restricted to
encryption algorithms running on block cipher modes only.
3. MODEL SIMULATION
This covers a detailed overview of the experiment test-bed and the
simulation parameters that will be used to evaluate the effects of encryption
algorithms on QoS; when implemented in Stream and Block ciphers mode
to secure VoIP communication. The methodology for performing the
experiment and the simulation parameters will all be implemented in NS2
network simulation environment. Such parameters as the VoIP codec, the
type of encryption algorithms, the length of the encryption key, the mode of
encryption (Stream or Block cipher mode), the network topology and the
type of transport protocols (UPD/TCP), the media transfer protocol (RTP)
and the network bandwidth will be considered. The comprehensive
simulation parameters setup is captured in table 1.
IJCSBI.ORG
1) AES Scenario
The first simulation scenario involves evaluating the cost of AES encryption
when implemented in stream or block cipher mode in securing VoIP traffic.
The cost of AES encryption with 128 bits key on QoS when used in
combination with G.711 and G.729 codecs is quantified by measuring the
latency (end2end one way delay) of VoIP packet from source to destination
as shown in the figure 5. The figure indicates that simulations will run for
10 minutes, in each successful minute of the simulation ten nodes having
two-way VoIP transmission will be initiated. Each VoIP packet during the
transmission will be encrypted with AES encryption algorithm.
IJCSBI.ORG
Statistics Value
Simulator NS2
Number of scenarios 3
Number of domains 4
Nodes per domain 25 (To simulate the different geographical locations covering the
study.
Queue Size 50
Traffic
IJCSBI.ORG
IJCSBI.ORG
2) DES Scenario
This involves using DES encryption algorithm with 54 bits encryption key
and 64 bits block size to encrypt the VoIP packet. G.711 and G.729 codecs
will also be used in a similar scenario as depicted in figure 5.
Adopting the similarities, DES simulation will run for 10 minutes, in each
successful minute of the simulation, ten nodes each having two-way VoIP
transmission will be initiated with each VoIP packet during the transmission
encrypted with DES 54 bit encryption key algorithm. The scenario is also
segmented into two experiments in which DES runs on Stream cipher mode
and on Block Cipher mode, with each of the cipher modes utilizing G.711
and G.729 VoIP codecs in encrypted forms. Using the volume of VoIP
traffic, the threshold point at which the QoS will be affected in respect to
the two cipher mode will be determined. Similar criteria as the AES are also
adopted here for the simulation timeline.
3) 3DES Scenario
This third simulation adopts Triple DES (3DES) encryption algorithms to
encrypt VoIP traffic. Akin to DES in the second simulation, 54 bits
encryption key length and 64 bit block size will be used in combination with
IJCSBI.ORG
And just like the prior tests, 3DES will run on both Stream cipher and Block
Cipher modes with each of the cipher modes utilizing G.711 and G.729
VoIP codecs in encrypted form. All other criteria similar to prior test.
Figure 6: AES using G.711 (64Kbps) in Stream and Block Cipher mode
IJCSBI.ORG
Figure 7: Packet Loss Rate for AES using G.711 (64Kbps) |G.729 (8Kbps)
On the other hand, results show that AES using G.729 (8Kbps) codec in
stream mode perform better in block mode, with a threshold of 40 VoIP
calls for encrypted VoIP traffic which is 201ms and 30 VoIP calls for plain
VoIP traffic which is 155ms, and in block cipher mode the threshold of 20
VoIP calls for encrypted VoIP traffic which is 200ms and 15 VoIP calls for
plain VoIP calls which is 150ms.
The high threshold of AES (128 bits) in stream cipher mode on both G.711
(64Kbps) and G.729 (8Kbps) codecs can be directly linked to, how stream
ciphers encrypt and decrypt data using an XORed operation, in which each
bits of data is encrypted using a key stream. The voice codec delay, the
network propagation delay, network bandwidth and the FIFO queue buffer
IJCSBI.ORG
at each particular time of the simulation are also a major contributing factor
to the increase in e2e delay in each of the cipher modes.
Considering the rate of packet loss for AES (128 bits) with G.711 (64Kbps)
and G.729 (8Kbps), results as shown in figure 7 shows that AES (128 bits)
in both G.711 (64Kbps) and G.729 (8Kbps) codecs on stream and block
cipher mode has a drastic effect on the rate of packet loss. Although the
results indicates that AES (128 bits) in stream cipher mode has a lowest
packet loss rate when compared with AES (128 bits) in block cipher mode
which yields 40 VoIP calls before the acceptable packet loss rate of 5% is
exceeded . While in block cipher mode yields a threshold of 25 VoIP calls
before 5% packet loss rate is exceeded. For G.729 (8Kbps) codec, it
indicates that AES (128 bits) has little significant difference in stream and
block cipher mode with respect to packet loss rate. Specifically, AES (128
bits) in stream mode has a threshold of 22 VoIP calls before the packet loss
rate exceeds 5%, and a threshold of 12 VoIP calls in block mode. Increase
in packet size, and FIFO queue algorithms on each of the routers all
contribute to the rate of packet loss.
For rate of packet loss on G.711 (64Kbps) and G.729 (8Kbps) codec with
DES (56 bits) encryption, results in figure 9 show that DES (56 bits) in both
G.711 (64Kbps) and G.729 (8Kbps) on stream and block cipher mode has a
sweeping outcome on the rate packet loss. On G.711 (64Kbps), DES (56
bits) in stream cipher mode has a less packet loss rate when compared with
IJCSBI.ORG
DES (56bits) in block cipher mode with 20 VoIP calls before the acceptable
packet loss rate of 5% is exceeded. While in block cipher mode, the
threshold point at which the acceptable packet loss rate exceeds 5% is at 15
VoIP calls. While On G.729 (8Kbps), it indicates that DES (56 bits) has no
significant difference in stream and block cipher mode with respect to
packet loss rate, this is because the rate of packet loss of the two cipher
mode is drastic in less than 10 VoIP calls for acceptable packet loss of 5%;
all other conditions remaining unchanged as with AES (128bits).
Figure 8: DES with G.729 (8Kbps) in Stream and Block Cipher mode
Figure 9: Packet Loss Rate for AES with G.711 (64Kbps) |G.729 (8Kbps)
IJCSBI.ORG
Figure 70: 3DES with G.711 (64Kbps) in Stream and Block Cipher mode
Figure 81: Packet Loss Rate for AES with G.711 (64Kbps) |G.729 (8Kbps)
IJCSBI.ORG
linked to the large computational time required to encrypt and decrypt bits
and blocks of data.
For the rate of packet loss for DES (56 bits) with G.711 (64Kbps) and
G.729 (8Kbps), 3DES (56 bits) in both G.711 (64Kbps) and G.729 (8Kbps)
on stream and block cipher mode has a far-reaching outcome on the rate of
packet loss. This is shown in figure 11. On G.711 (64Kbps), the results
indicates that 3DES (56 bits) in both stream and block cipher mode packet
loss rate are negligible between the two cipher modes; with each of the
cipher mode exceeding 5% packet loss at about 5 VoIP calls. However,
using G.729 (8Kbps); the results indicates that 3DES (56 bits) has no
significant difference in stream and block cipher modes with respect to
packet loss rate. This is because the rate of packet loss of the two cipher
mode is drastic in less than 5 VoIP calls for acceptable packet loss of 5%.
Undoubtedly, the results of the study strongly indicates that each of the
encryption (AES, DES, 3DES) algorithms append an additional overhead on
the e2e delay and rate of packet loss during VoIP transmission. However
IJCSBI.ORG
REFERENCES
[1] B Boguhn. (2009, June) A Compare Business Products Web site. [Online].
http://www.comparebusinessproducts.com/phone-systems/business-voip/voip-named-
as-fastest-growing-technology-of-the-past-decade.
[2] N Wittenberg. (2009) Understanding Voice Over IP Technology, Cengage Learning.
Document.
[3] D J Wright. (2001) Voice over packet networks. Document.
[4] O Hersent, IP Telephony: Deploying VoIP Protocols and IMS Infrastructure.: John
Wiley & Sons, 2010.
[5] M Leggieri and E Gambi, "Quality assessment of secure VoIP communications," in
16th International Conference on Software, Telecommunications and Computer
Networks, 2008. SoftCOM 2008, 2008.
[6] J Fischl and H Tschofenig, "Making SIP Make Cents ," Queue, vol. 5, no. 2, pp. 42-
49, 2007.
[7] C Shiping and W Xinyuan, "On the anonymity and traceability of peer-to-peer VoIP
calls," Network, vol. 20, no. 5, pp. 32-37, 2006.
[8] A S.W Marzuki and C Yu Ka, "Performances analysis of VoIP over 802.11b and
802.11e using different CODECs," in 2010 International Symposium on
Communications and Information Technologies (ISCIT), 2010.
[9] N Sulaiman and R Carrasco, "Performance Evaluation of Voice Call over an IP based
Network," in 41st Annual Conference on Information Sciences and Systems, 2007.
CISS '07, 2007.
[10] M B VoIP. (2005) A Business Voip Website. [Online].
http://mybusinessvoip.com/what-is-voip
[11] K K Tam and H L Goh, "Session Initiation Protocol," in IEEE International
IJCSBI.ORG
IJCSBI.ORG
[31] M Rawashdeh and A Karmouch, "Seamless video handoff in session mobility over the
IMS network," in IEEE International Symposium on World of Wireless, Mobile and
Multimedia Networks & Workshops, 2009, 2009.
[32] L Atzori and F Boi, "IP Telephony over Mobile Ad Hoc Networks: Joint Routing and
Playout Buffering," in IEEE International Conference on Communications, 2008. ICC
'08, 2008.
[33] A Talevski et al., "The Impact of Security on VoIP Call Quality," Mobile Multimedia,
vol. 7, no. 1, pp. 113-128, April 2011.
[34] M F Tuysuz and H A Mantar, "Evaluation of cross layer QoS aproachs for improving
voice quality over multi-rate WLANs," in 2010 International Conference on
Computer Engineering and Systems (ICCES), 2010.
[35] Ashraf D Elbayoumy and Simon J Shepherd, "Stream or Block Cipher for Securing
VoIP?," International Journal of Network Security, vol. 5, no. 2, pp. 128133,
September 2007.
[36] A. D. E. a. S. J Shepherd , "Stream or Block Cipher for Securing VoIP?,"
International Journal of Network Security, vol. 5, no. 2, pp. 128133, 2007.
[37] Gregory Epiphaniou, Carsten Maple, Paul Sant, and Peter Norrington, "The effects of
encryption on VoIP streams under the code-excited linear prediction coder G.729," in
2010 International Conference for Internet Technology and Secured Transactions
(ICITST), 2010.
[38] G Epiphaniou, C Maple, P Sant, and P Norrington , "An experimental analysis on
iterative block ciphers and their effects on VoIP under different coding schemes," in
2010 International Conference on Signal Processing and Multimedia Applications
(SIGMAP), 2010.
[39] Mohammed Mustapha, "Measuring the Security Overhead of Stream and Block
Ciphers on SIP-Based VoIP Transmission," Department of Computer Science and
Technology, University of Bedfordshire, Bedfordshire, MSc. Thesis 2012.