> internet of things > blockchain > social media · an internet of things (iot)...

60
> Internet of Things > Blockchain > Social Media > Careers MAY 2019 www.computer.org

Upload: others

Post on 02-Feb-2020

10 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

> Internet of Things

> Blockchain> Social Media

> Careers

MAY 2019 www.computer.org

Page 2: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

Our New Website Has Launched!

Discover more at www.computer.org today!

Some of the many new features include:• Digital Library—Improved search

helps you more easily navigate 700k+ articles in the IEEE Computer Society Digital Library.

• Conference Calendar—Plan your event learning experiences with new fi lters for 200+ conferences.

• Inside the Computer Society—Keep up with member activities in the new Inside the Computer Society area.

• Tech News—Highlights blogs and new articles, as well as trending papers from the digital library.

• Education—View the new IEEE Computer Society Course Catalog featuring a range of educational offerings.

• Calls for Papers—Discover opportunities to write and speak with the new Calls for Papers platform.

Page 3: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

STAFF

EditorCathy Martin

Publications Operations Project SpecialistChristine Anthony

Publications Marketing Project SpecialistMeghan O’Dell

Production & DesignCarmen Flores-Garvey

Publications Portfolio ManagersCarrie Clark, Kimberly Sperka

PublisherRobin Baldwin

Senior Advertising CoordinatorDebbie Sims

Circulation: ComputingEdge (ISSN 2469-7087) is published monthly by the IEEE Computer Society. IEEE Headquarters, Three Park Avenue, 17th Floor, New York, NY 10016-5997; IEEE Computer Society Publications Office, 10662 Los Vaqueros Circle, Los Alamitos, CA 90720; voice +1 714 821 8380; fax +1 714 821 4010; IEEE Computer Society Headquarters, 2001 L Street NW, Suite 700, Washington, DC 20036.

Postmaster: Send address changes to ComputingEdge-IEEE Membership Processing Dept., 445 Hoes Lane, Piscataway, NJ 08855. Periodicals Postage Paid at New York, New York, and at additional mailing offices. Printed in USA.

Editorial: Unless otherwise stated, bylined articles, as well as product and service descriptions, reflect the author’s or firm’s opinion. Inclusion in ComputingEdge does not necessarily constitute endorsement by the IEEE or the Computer Society. All submissions are subject to editing for style, clarity, and space.

Reuse Rights and Reprint Permissions: Educational or personal use of this material is permitted without fee, provided such use: 1) is not made for profit; 2) includes this notice and a full citation to the original work on the first page of the copy; and 3) does not imply IEEE endorsement of any third-party products or services. Authors and their companies are permitted to post the accepted version of IEEE-copyrighted material on their own Web servers without permission, provided that the IEEE copyright notice and a full citation to the original work appear on the first screen of the posted copy. An accepted manuscript is a version which has been revised by the author to incorporate review suggestions, but not the published version with copy-editing, proofreading, and formatting added by IEEE. For more information, please go to: http://www.ieee.org/publications_standards/publications/rights/paperversionpolicy.html. Permission to reprint/republish this material for commercial, advertising, or promotional purposes or for creating new collective works for resale or redistribution must be obtained from IEEE by writing to the IEEE Intellectual Property Rights Office, 445 Hoes Lane, Piscataway, NJ 08854-4141 or [email protected]. Copyright © 2019 IEEE. All rights reserved.

Abstracting and Library Use: Abstracting is permitted with credit to the source. Libraries are permitted to photocopy for private use of patrons, provided the per-copy fee indicated in the code at the bottom of the first page is paid through the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923.

Unsubscribe: If you no longer wish to receive this ComputingEdge mailing, please email IEEE Computer Society Customer Service at [email protected] and type “unsubscribe ComputingEdge” in your subject line.

IEEE prohibits discrimination, harassment, and bullying. For more information, visit www.ieee.org/web/aboutus/whatis/policies/p9-26.html.

IEEE COMPUTER SOCIETY computer.org • +1 714 821 8380

www.computer.org/computingedge 1

IEEE Computer Society Magazine Editors in Chief

ComputerDavid Alan Grier (Interim), Djaghe LLC

IEEE SoftwareIpek Ozkaya, Software Engineering Institute

IEEE Internet ComputingGeorge Pallis, University of Cyprus

IT ProfessionalIrena Bojanova, NIST

IEEE Security & PrivacyDavid Nicol, University of Illinois at Urbana-Champaign

IEEE MicroLizy Kurian John, University of Texas, Austin

IEEE Computer Graphics and ApplicationsTorsten Möller, University of Vienna

IEEE Pervasive ComputingMarc Langheinrich, University of Lugano

Computing in Science & EngineeringJim X. Chen, George Mason University

IEEE Intelligent SystemsV.S. Subrahmanian, Dartmouth College

IEEE MultiMediaShu-Ching Chen, Florida International University

IEEE Annals of the History of ComputingGerardo Con Diaz, University of California, Davis

Page 4: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

MAY 2019 • VOLUME 5, NUMBER 5

THEME HERE

18Toward a Machine

Intelligence Layer for Diverse

Industrial IoT Use Cases

31Emoji: Lingua

Franca or Passing Fancy?

38The Online

Trolling Ecosystem

Page 5: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

46CareerVis:

Hierarchical Visualization

of Career Pathway Data Subscribe to ComputingEdge for free at

www.computer.org/computingedge.

Internet of Things

10 Semantic Enablement in IoT Service Layers—Standard Progress and Challenges

KOMAL GILANI, JAHO KIM, JAESEUNG SONG, DALE SEED, AND CHONGGANG WANG

18 Toward a Machine Intelligence Layer for Diverse Industrial IoT Use Cases

JAN HÖLLER, VLASIOS TSIATSIS, AND CATHERINE MULLIGAN

Blockchain

26 Self-Managing Real Estate NATHAN SHEDROF

27 Blockchain in Developing Countries NIR KSHETRI AND JEFFREY VOAS

Social Media

31 Emoji: Lingua Franca or Passing Fancy? GEORGE HURLBURT

38 The Online Trolling Ecosystem HAL BERGHEL AND DANIEL BERLEANT

Careers

46 CareerVis: Hierarchical Visualization of Career Pathway Data

MINGRAN LI, WENJIE WU, JUNHAN ZHAO, KEYUAN ZHOU, DAVID PERKIS, TIMOTHY N. BOND, KEVIN MUMFORD, DAVID HUMMELS, AND YINGJIE VICTOR CHEN

Departments 4 Magazine Roundup 8 Editor’s Note: Managing IoT Diversity 72 Conference Calendar

Page 6: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

4 May 2019 Published by the IEEE Computer Society 2469-7087/19/$33.00 © 2019 IEEE

CS FOCUS

T he IEEE Computer Society’s lineup of 12 peer-reviewed techni-

cal magazines covers cutting-edge topics ranging from soft-ware design and computer graphics to Internet comput-ing and security, from scien-tifi c applications and machine intelligence to visualization and microchip design. Here are highlights from recent issues.

Computer

Hybrid Vehicular Crowdsourcing with Driverless Cars: Challenges and a SolutionAlthough vehicular crowdsourc-ing represents an emerging technology to assist many smart city applications, maintaining sensing data quality is still a challenge. This article from the

December 2018 issue of Com-puter considers the challenges and off ers a potential solution for a hybrid scenario involving both driverless cars and human-controlled vehicles, within the limited task budget.

Computing in Science & Engineering

Evidence-Based Detection of Advanced Persistent ThreatsThis article from the Novem-ber/December 2018 issue of Computing in Science & Engi-neering presents an approach to the automation of cyberse-curity operations centers with

Magazine Roundup

Page 7: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

www.computer.org/computingedge 5

cognitive assistants that cap-ture and automatically apply the expertise employed by cyberse-curity analysts when they investi-gate advanced persistent threats. The goal is to signifi cantly increase the probability of detect-ing intrusion activity while dras-tically reducing the workload of the operators.

IEEE Annals of the History of Computing

Oral History of Dov FrohmanDov Frohman is an Israeli electri-cal engineer and businessman. In 1970, he invented the Electri-cally Programmable Read-Only Memory (EPROM), a key enabling technology for rapid development of microprocessor-based systems, from personal computers to indus-trial controls. Intel founder Gordon Moore called it “as important in the development of the microcom-puter industry as the micropro-cessor itself.” Frohman was also responsible for establishing Intel’s R&D and manufacturing pres-ence in Israel, one of Intel’s most productive and advanced design centers. Frohman is a nationally known fi gure in Israel. Read more in the October–December 2018 issue of IEEE Annals of the History of Computing.

IEEE Computer Graphics and Applications

Graphoto: Aesthetically Pleasing Charts for Casual Information VisualizationGraphoto is a framework that auto-matically generates a photo or

adjusts an existing one to match a line graph. Since aesthetics is an important element in visualizing personal data, Graphoto provides users with aesthetically pleas-ing displays for casual line graph information visualization. More specifi cally, after creating a line graph of the input data, a photo that resembles the input data on the line graph is selected from a photo archive. The authors of this article from the November/Decem-ber 2018 issue of IEEE Computer Graphics and Applications present a user study to show the eff ective-ness of Graphoto in terms of data interpretation and aesthetics.

IEEE Intelligent Systems

A Multimodal Approach for the Safeguarding and Transmission of Intangible Cultural Heritage: The Case of i-TreasuresIntangible cultural heritage (ICH) creations include music, dance, singing, theater, human skills, and craftsmanship. These cultural expressions are usually transmit-ted orally or using gestures and are modifi ed over a period of time, through a process of collective recreation. As the world becomes more interconnected and many cultures come into contact, local communities run the risk of losing important elements of their ICH, while young people fi nd it diffi cult to maintain the connection with the cultural heritage treasured by their elders. In this article from the November/December 2018 issue of IEEE Intelligent Systems, the authors present a novel holistic

approach for the safeguarding and transmission of ICH that goes beyond the mere digitization of ICH content.

IEEE Internet Computing

Considering Jurisdiction When Assessing End-to-End Network NeutralityExisting solutions designed to assess end-to-end neutrality vio-lations do not consider the nor-mative jurisdictions. The authors of this article from the Novem-ber/December 2018 issue of IEEE Internet Computing argue that jurisdiction-aware violation detec-tion can be achieved through fur-ther steps that can be added to current solutions. As a proof-of-concept, they propose a prototype to expose and discuss the chal-lenges and open issues that need to be faced to consider the norma-tive jurisdiction when assessing end-to-end network neutrality.

IEEE Micro

Image Recognition Accelerator Design Using In-Memory ProcessingThis article from the January/Feb-ruary 2019 issue of IEEE Micro proposes a hardware accelera-tor design, called object recogni-tion and classifi cation hardware accelerator on resistive devices, which processes object recogni-tion tasks inside emerging non-volatile memory. The in-memory processing dramatically low-ers the overhead of data move-ment, improving overall system effi ciency. The proposed design

Page 8: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

6 ComputingEdge May 2019

MAGAZINE ROUNDUP

accelerates key subtasks of image recognition, including text, face, pedestrian, and vehicle rec-ognition. The evaluation shows signifi cant improvements on per-formance and energy effi ciency as compared to state-of-the-art processors and accelerators.

IEEE MultiMedia

Social Relationship Labeling Based on Multimodal Behaviors and Social InteractionsThis article from the October–December 2018 issue of IEEE MultiMedia addresses the social relationship labeling problem by exploiting users’ multi-modal behaviors and abundant social

interactions on Twitter. This can eff ectively alleviate the problem of lacking specifi c information of fol-lowing relationships. The experi-mental results demonstrate the eff ectiveness of the designed fea-tures and diff erent classifi ers.

IEEE Pervasive Computing

Pervasive Agriculture: IoT-Enabled Greenhouse for Plant Growth ControlThe authors of this article from the October–December 2018 issue of IEEE Pervasive Computing present an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are a wireless sensor network, cloud computing, and artifi cial intelli-gence. They are to help in moni-toring and controlling both plants and greenhouse conditions, as well as predicting the growth rate of tomatoes.

IEEE Security & Privacy

The Good, the Bad, and the Ugly: Two Decades of E-Voting in BrazilBrazil pioneered the adoption of nationwide electronic voting 20 years ago. However, today its system is outdated in terms of recent properties. The authors of this article from the November/December 2018 issue of IEEE Security & Privacy discuss the sys-tem’s organization and transpar-ency mechanisms in the context of security requirements derived from a conventional election.

IEEE Software

Spotify Guilds: How to Succeed with Knowledge Sharing in Large-Scale Agile OrganizationsThe new generation of software companies has revolutionized the way companies are designed. While bottom-up governance and team autonomy improve motiva-tion, performance, and innova-tion, managing agile development at scale is a challenge. In this article from the March/April 2019 issue of IEEE Software, the authors describe how Spotify cultivates guilds to help the company share knowledge, align, and make collec-tive decisions.

IT Professional

Autonomous Cars: Social and Economic ImplicationsOne of the major issues with autonomous cars is their future impact on society, as well as on the research community, aca-demia, and industry. As interest in autonomous car technology grows, the social and economic implications of this technology will aff ect various stakeholders, including its commercialization. In this article from the November/December 2018 issue of IT Pro-fessional, the authors critically review and analyze both the eco-nomic and social implications of the autonomous car. The sig-nifi cance of these implications will play an important role in the future of autonomous cars among consumers .

WWW.COMPUTER.ORG

/COMPUTINGEDGE

Page 9: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

www.computer.org/computingedge 7

Advertising Personnel

Debbie Sims: Advertising CoordinatorEmail: [email protected]: +1 714 816 2138 | Fax: +1 714 821 4010

Advertising Sales Representatives (display)

Central, Northwest, Southeast, Far East: Eric KincaidEmail: [email protected]: +1 214 673 3742Fax: +1 888 886 8599

Northeast, Midwest, Europe, Middle East: David SchisslerEmail: [email protected] Phone: +1 508 394 4026Fax: +1 508 394 1707

Southwest, California: Mike HughesEmail: [email protected]: +1 805 529 6790

Advertising Sales Representative (Classifieds & Jobs Board)

Heather BuonadiesEmail: [email protected]: +1 201 887 1703

Advertising Sales Representative (Jobs Board)

Marie ThompsonEmail: [email protected]: 714-813-5094

ADVERTISER INFORMATION

IEEE Computer Graphics and Applications bridges the theory and practice of computer graphics. Subscribe to CG&A and

• stay current on the latest tools and applications and gain invaluable practical and research knowledge,

• discover cutting-edge applications and learn more about the latest techniques, and

• benefit from CG&A’s active and connected editorial board.

September/October 2016

IEEE CO

MPU

TER G

RA

PHIC

S AN

D A

PPLICAT

ION

S Sep

temb

er/Octo

ber 2

016

Spo

rts Data V

isualizatio

n

VO

LUM

E 36 N

UM

BER 5

c1.indd 1 8/22/16 2:59 PM

November/December 2016

IEEE CO

MPU

TER G

RA

PHIC

S AN

D A

PPLICAT

ION

S N

ovem

ber/D

ecemb

er 2016

D

efense A

pp

lication

s V

OLU

ME 3

6 N

UM

BER 6

DefenseApplications

c1.indd 1 10/24/16 3:44 PM

January/February 2017

IEEE CO

MPU

TER G

RA

PHIC

S AN

D A

PPLICAT

ION

S Jan

uary/Feb

ruary 2

017

Water, Sky, an

d th

e Hu

man

Elemen

t V

OLU

ME 37

NU

MB

ER 1

c1.indd 1 12/14/16 12:21 PM

July/August 2016

IEEE CO

MPU

TER G

RA

PHIC

S AN

D A

PPLICAT

ION

S Ju

ly/Au

gu

st 2016

Q

uality A

ssessmen

t and

Perceptio

n in

Co

mp

uter G

raph

ics V

OLU

ME 3

6 N

UM

BER 4

Quality Assessment

andPerceptionin Computer Graphics

c1.indd 1 6/22/16 1:20 PM AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA&&&&&&&&&&&&&&&&&&&&&&&&&&&&GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCwww.computer.org/cga

Page 10: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

8 May 2019 Published by the IEEE Computer Society 2469-7087/19/$33.00 © 2019 IEEE

EDITOR’S NOTEEDITOR’S NOTEEDITOR’S NOTEEDITOR’S NOTEEDITOR’S NOTEEDITOR’S NOTEEDITOR’S NOTEEDITOR’S NOTEEDITOR’S NOTEEDITOR’S NOTEEDITOR’S NOTEEDITOR’S NOTEEDITOR’S NOTEEDITOR’S NOTE

T he Internet of Things (IoT) pervades many industries, domains, and facets of our lives. Yet, these connected objects

are often not standardized and don’t work across diff erent applications. This lack of interoperabil-ity is a key challenge in increasing adoption and eff ectiveness of IoT systems. Two articles in this issue of ComputingEdge present innovations for managing this heterogeneous IoT ecosystem.

The authors of IEEE Internet Computing’s “Semantic Enablement in IoT Service Layers—Standard Progress and Challenges” argue that standardizing a set of common functions across IoT applications would reduce the development cost of IoT devices. They propose a semantic-enabled IoT service-layer platform based on oneM2M standards. IEEE Intelligent Systems’ “Toward a Machine Intelligence Layer for Diverse Industrial IoT Use Cases” off ers guidelines to help designers create scalable and replicable IoT systems.

Blockchain technology is being employed in a fl ood of diverse new applications. In Computer’s “Self-Managing Real Estate,” the author explains how blockchain records could soon be used for buying a house. IT Professional’s “Blockchain in Developing Countries” details ways that block-chain could help fi ght corruption and promote sta-bility in developing countries.

Next, two articles address phenomena that unite otherwise varied social media platforms. IT Professional’s “Emoji: Lingua Franca or Pass-ing Fancy?” evaluates how people use emojis in digital communication. Computer’s “The Online Trolling Ecosystem” laments the ubiquity of disin-formation on social media and calls for a renewed eff ort to battle its spread.

When it comes to careers, diversity is impor-tant. “CareerVis: Hierarchical Visualization of Career Pathway Data,” from IEEE Computer Graph-ics and Applications, presents a tool for helping young adults explore their many career options.

Managing IoT Diversity

Page 11: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

PURPOSE: The IEEE Computer Society is the world’s largest association of computing professionals and is the leading provider of technical information in the field.

MEMBERSHIP: Members receive the monthly magazine Computer, discounts, and opportunities to serve (all activities are led by volunteer members). Membership is open to all IEEE members, affiliate society members, and others interested in the computer field.

COMPUTER SOCIETY WEBSITE: www.computer.org

OMBUDSMAN: Direct unresolved complaints to [email protected].

CHAPTERS: Regular and student chapters worldwide provide the opportunity to interact with colleagues, hear technical experts, and serve the local professional community.

AVAILABLE INFORMATION: To check membership status, report an address change, or obtain more information on any of the following, email Customer Service at [email protected] or call +1 714 821 8380 (international) or our toll-free number, +1 800 272 6657 (US):

• Membership applications• Publications catalog• Draft standards and order forms• Technical committee list• Technical committee application• Chapter start-up procedures• Student scholarship information• Volunteer leaders/staff directory• IEEE senior member grade application (requires 10 years

practice and significant performance in five of those 10)

PUBLICATIONS AND ACTIVITIESComputer: The flagship publication of the IEEE Computer Society, Computer, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications.

Periodicals: The society publishes 12 magazines, 15 transactions, and two letters. Refer to membership application or request information as noted above.

Conference Proceedings & Books: Conference Publishing Services publishes more than 275 titles every year.

Standards Working Groups: More than 150 groups produce IEEE standards used throughout the world.

Technical Committees: TCs provide professional interaction in more than 30 technical areas and directly influence computer engineering conferences and publications.

Conferences/Education: The society holds about 200 conferences each year and sponsors many educational activities, including computing science accreditation.

Certifications: The society offers three software developer credentials. For more information, visit www.computer .org/certification.

2019 BOARD OF GOVERNORS MEETINGS6 – 7 June: Hyatt Regency Coral Gables, Miami, FL(TBD) November: Teleconference

EXECUTIVE COMMITTEEPresident: Cecilia Metra President-Elect: Leila De Floriani; Past President: Hironori Kasahara; First VP: Forrest Shull; Second VP: Avi Mendelson; Secretary: David Lomet; Treasurer: Dimitrios Serpanos; VP, Member & Geographic Activities: Yervant Zorian; VP, Professional & Educational Activities: Kunio Uchiyama; VP, Publications: Fabrizio Lombardi; VP, Standards Activities: Riccardo Mariani; VP, Technical & Conference Activities: William D. Gropp 2018–2019 IEEE Division V Director: John W. Walz2019 IEEE Division V Director Elect: Thomas M. Conte2019–2020 IEEE Division VIII Director: Elizabeth L. Burd

BOARD OF GOVERNORSTerm Expiring 2019: Saurabh Bagchi, Leila De Floriani, David S. Ebert, Jill I. Gostin, William Gropp, Sumi Helal, Avi MendelsonTerm Expiring 2020: Andy Chen, John D. Johnson, Sy-Yen Kuo, David Lomet, Dimitrios Serpanos, Forrest Shull, Hayato YamanaTerm Expiring 2021: M. Brian Blake, Fred Douglis, Carlos E. Jimenez-Gomez, Ramalatha Marimuthu, Erik Jan Marinissen, Kunio Uchiyama

EXECUTIVE STAFFExecutive Director: Melissa RussellDirector, Governance & Associate Executive Director: Anne Marie KellyDirector, Finance & Accounting: Sunny HwangDirector, Information Technology & Services: Sumit Kacker Director, Marketing & Sales: Michelle TubbDirector, Membership Development: Eric Berkowitz

COMPUTER SOCIETY OFFICESWashington, D.C.: 2001 L St., Ste. 700, Washington, D.C. 20036-4928 • Phone: +1 202 371 0101 • Fax: +1 202 728 9614Email: [email protected]

Los Alamitos: 10662 Los Vaqueros Cir., Los Alamitos, CA 90720Phone: +1 714 821 8380 • Email: [email protected]

Asia/Pacific: Watanabe Building, 1-4-2 Minami-Aoyama, Minato-ku, Tokyo 107-0062, Japan • Phone: +81 3 3408 3118 Fax: +81 3 3408 3553 • Email: [email protected]

MEMBERSHIP & PUBLICATION ORDERSPhone: +1 800 272 6657 • Fax: +1 714 821 4641 Email: [email protected]

IEEE BOARD OF DIRECTORSPresident & CEO: Jose M.D. MouraPresident-Elect: Toshio FukudaPast President: James A. JefferiesSecretary: Kathleen KramerTreasurer: Joseph V. LillieDirector & President, IEEE-USA: Thomas M. CoughlinDirector & President, Standards Association: Robert S. FishDirector & VP, Educational Activities: Witold M. KinsnerDirector & VP, Membership and Geographic Activities: Francis B. Grosz, Jr.Director & VP, Publication Services & Products: Hulya KirkiciDirector & VP, Technical Activities: K.J. Ray Liu

revised 13 February 2019

Page 12: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

10 May 2019 Published by the IEEE Computer Society 2469-7087/19/$33.00 © 2019 IEEE

DEPARTMENT: Standards

Semantic Enablement in IoT Service Layers—Standard Progress and Challenges

We believe that applying semantic technologies to

IoT service layer platforms can improve data

accessibility, data discoverability, and the ability to

extract knowledge about the data. Therefore, this

article shows how semantic technologies can be

leveraged by IoT service layer platforms.

The Internet of Things (IoT) is significantly growing with an aim to make a connected world by providing numerous opportunities for many industrial sectors and domains such as smart cities, smart factories, and smart homes. Cur-

rently, however, IoT applications in these domains are not interoperable with each other. The heterogeneous nature of these applications provide justification for defining a standard way of abstracting vertical data models.1,2 IoT data is usually collected from various sources such as sensory devices and/or crowd sensing. The data is often stored in IoT platforms as resources based on different data models. This collection of data can vary in quality and context. Accord-ingly, a semantic approach—for example, used in the Semantic Web3—can provide great agility toward resource representation, sharing information, and inferring new knowledge from data in the IoT on a global scale.4

Standardizing a set of common functions (such as registration and discovery) across IoT applica-tions and devices would reduce the development cost of IoT devices. This IoT service layer ena-bles application development independent of the underlying network communication and protocols (such as HyperText Transfer Protocol [HTTP] and Constrained Application Protocol [CoAP]) by abstracting different network technologies.5 As most IoT service layer platforms simply store IoT data in a non-semantic aware fashion, the meaning of the data cannot be con-veyed to IoT applications. Therefore, they are unable to understand the context of the data. Meaningful use of any IoT data requires knowledge about its context such as its geolocation, its

Komal Gilani Sejong University

Jaho Kim Korea Electronics Technology Institute

JaeSeung Song Sejong University

Dale Seed InterDigital Communications

Chonggang Wang InterDigital Communications

56IEEE Internet Computing Published by the IEEE Computer Society

1089-7801/18/$33.00 USD ©2018 IEEEJuly/August 2018

Page 13: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

www.computer.org/computingedge 11

IEEE INTERNET COMPUTING

units and its producer. We believe that applying semantic technologies to IoT service layer plat-forms can improve data accessibility, data discoverability, and the ability to extract knowledge about the data. Therefore, this article shows how semantic technologies can be leveraged by IoT service layer platforms.

Since the way of storing and managing data in IoT platforms is different compared to the Web, this article shows mechanisms of using a data modelling language such as Resource Description Framework (RDF) to semantically describe IoT data, methods of associating IoT data with this semantic metadata, and methods of handling semantic queries to discover meaningful data from IoT platforms. For this purpose, we have designed a semantic-enabled IoT service-layer platform based on oneM2M global IoT standards supporting semantic features such as annotation and dis-covery.

SEMANTIC TECHNOLOGIES AND RELATED STANDARDS This section explains why semantic technologies are required for IoT service layer platforms6 and gives an overview of core semantic technologies.7 Semantic technologies can play a critical role in data and knowledge management for context-awareness in IoT service platforms.

Ontology Ontology represents concepts as objects that have properties and relationships with other objects. An ontology describes linguistic artifacts using a shared vocabulary of basic concepts about a piece of reality. It helps to support semantic exchange and context-driven communications among people and machines by defining shared and common theories.8

RDF and RDF Schema RDF is a standard model and language that represents the ontological level of facts about a re-source or an individual—for example, types of individuals and their relations, respectively.9 RDF Schema provides a vocabulary for structuring RDF resources and describing relationships among resources. This includes the modelling of classes (rdfs:Class), the rdf:type property that provides the links of instances to a class, and the rdfs:subClassOf property, which allows the specification of class hierarchies.

OWL As an ontology language, RDF and RDFS have limited expressiveness, as they have difficulties describing cardinality constraints (e.g., Parking Garage A has more than 10 unoccupied parking spots). Therefore, OWL was introduced to provide greater expressiveness and even support onto-logical reasoning. OWL offers different sublanguages with different levels of expressiveness and related properties regarding reasoning completeness and time complexity.

SPARQL SPARQL is a query language for interacting with a triple store to process stored RDF triples. SPARQL can support ontological reasoning and semantic discovery. The triple store typically provides an interface to receive SPARQL query requests from a user and to send responses back to the user. Now the question is whether and how these technologies can be leveraged in an IoT service layer platform to support semantic interoperability.

57July/August 2018

DEPARTMENT: Standards

Semantic Enablement in IoT Service Layers—Standard Progress and Challenges

We believe that applying semantic technologies to

IoT service layer platforms can improve data

accessibility, data discoverability, and the ability to

extract knowledge about the data. Therefore, this

article shows how semantic technologies can be

leveraged by IoT service layer platforms.

The Internet of Things (IoT) is significantly growing with an aim to make a connected world by providing numerous opportunities for many industrial sectors and domains such as smart cities, smart factories, and smart homes. Cur-

rently, however, IoT applications in these domains are not interoperable with each other. The heterogeneous nature of these applications provide justification for defining a standard way of abstracting vertical data models.1,2 IoT data is usually collected from various sources such as sensory devices and/or crowd sensing. The data is often stored in IoT platforms as resources based on different data models. This collection of data can vary in quality and context. Accord-ingly, a semantic approach—for example, used in the Semantic Web3—can provide great agility toward resource representation, sharing information, and inferring new knowledge from data in the IoT on a global scale.4

Standardizing a set of common functions (such as registration and discovery) across IoT applica-tions and devices would reduce the development cost of IoT devices. This IoT service layer ena-bles application development independent of the underlying network communication and protocols (such as HyperText Transfer Protocol [HTTP] and Constrained Application Protocol [CoAP]) by abstracting different network technologies.5 As most IoT service layer platforms simply store IoT data in a non-semantic aware fashion, the meaning of the data cannot be con-veyed to IoT applications. Therefore, they are unable to understand the context of the data. Meaningful use of any IoT data requires knowledge about its context such as its geolocation, its

Komal Gilani Sejong University

Jaho Kim Korea Electronics Technology Institute

JaeSeung Song Sejong University

Dale Seed InterDigital Communications

Chonggang Wang InterDigital Communications

56IEEE Internet Computing Published by the IEEE Computer Society

1089-7801/18/$33.00 USD ©2018 IEEEJuly/August 2018

Page 14: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

12 ComputingEdge May 2019

STANDARDS

SEMANTIC-ENABLED IOT SERVICE LAYER A common IoT service layer platform is required by the IoT market to facilitate multi-industry IoT applications. The oneM2M Global Initiative is an international partnership project to de-velop a globally acceptable IoT service-layer standard. The common service layer specified by oneM2M can be embedded into various IoT entities such as end devices, gateways. and serv-ers.10 It provides various IoT common service functionalities such as device registration, group management, and security and privacy.

The oneM2M service layer provides a means for connecting various IoT devices regardless of their access technologies, collecting data from these devices, and managing the collected data. Through its semantic capabilities, it also supports the annotation of semantic descriptions to oneM2M resources. Figure 1 shows the high-level design of a semantic-enabled IoT service layer platform. In order to support semantic features, IoT service-layer platforms have to support at least three basic features as follows:

• Semantic annotation: To achieve data interoperability, the service layer first should be able to support describing the meaning of resources/data.11 IoT service-layer resources (i.e. data sets) can be annotated with semantic information using standardized ontolo-gies and data structures.

• Semantic query and discovery: The platform can support queries from IoT applications based on a semantic query language. When a semantic query is received, the platform executes the query by retrieving semantic information for the targeted resources and processing the discovery query.

Figure 1. Semantic capabilities in an IoT service layer.

• Semantic mashup: Like a traditional Web mashup, a semantic mashup is used to com-pose a virtual IoT resource from more than one IoT resource, which can be other exist-ing virtual resources as well.

In order to provide semantic services to users properly, it is necessary to define common vocabu-laries, standardized data formats and description rules that can eventually solve the interoperabil-ity challenges caused by heterogeneous IoT data. The standard RDF language can be used to describe the semantic information. Also the annotated semantic metadata is then stored by the platform in a new resource designed to accommodate semantic information in an RDF/RDFS format. The metadata can also be stored in a triple store/ontology repository.

Sensor A Actuator B

IoT Networks

BA Resources

IoT Service Layer Virtual Sensor(A + B)

Mashup

Ontology repository

semantic repository

Semantic Annotation

Add semantics

Semantic Mashup

Perform Mashup

Store semantics

Things are represented as Resources

Semantic Discovery

Semantic Query

IoT Application

Discover using semantics

Inference & Reasoning

58July/August 2018

Page 15: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

www.computer.org/computingedge 13

IEEE INTERNET COMPUTING

SEMANTICS IN ONEM2M STANDARDS In this section, we describe how the semantic IoT features mentioned in the previous section can be realized in an IoT service-layer platform.

oneM2M Resources for Storing Semantic Information The two basic logical entities that play a major role in the oneM2M system are an Application Entity (AE) and a Common Service Entity (CSE). In the oneM2M architecture, both CSEs and AEs can reside within different nodes, such as an Infrastructure Node (IN) for a server platform, a Middle Node (MN) for a gateway, an Application Service Node (ASN) and an Application Dedicated Nodes (ADN) for a constrained device.10 The AE is the logical entity that provides application’s business logic. It is used for hosting sensors, applications, and it resides in the Ap-plication dedicated node, which is called AND-AE. On the other hand, the IN-CSE entity is hosted on a server. The CSE functionality is provided for utilization by various AE resources. oneM2M adopted a resource based data model, in which all services are represented as re-sources. A resource can be uniquely addressed by a Uniform Resource Identifier (URI) and ma-nipulated via create, retrieve, update, delete, and notify operations (CRUD+N). To enable semantic technologies, the oneM2M service layer defines a <semanticDescriptor> resource, as highlighted in Figure 2. This resource is responsible for storing semantic infor-mation related to its parent resource and potentially sub-resources. It is created inside an existing container resource or AE resource of CSE in the oneM2M resource structure. The contents of this resource can be provided based on ontologies. The <semanticDescriptor> resource con-tains various attributes—that is, ontologyRef for the URI of an ontology, descriptorRepre-sentation to indicate the format of the semantic information, relatedSemantics to contain the URIs of other related descriptor resources, and descriptor for semantic information it-self—to facilitate semantic information management. The <subscription> resource can be added as a child resource by any CSE/AE that expects to receive automatic notifications on the changes of a <semanticDescriptor> resource.

Figure 2. oneM2M resource structure

Let’s describe an example of the semantic information management process, where two sensors measure temperature information in different units and a smartphone application makes a discov-ery request of relevant semantic information.12 These two sensors are represented as ADN-AE-1 and ADN-AE-2 in an IoT platform server and periodically store measured temperature values in the server. The measured temperature sensor values are stored to a <contentInstance> re-source for each sensor reading with a <semanticDescriptor> as its child resource. The <se-manticDescriptor> resource is used to store the semantic information about the temperature sensor reading and the measured value. Once the <semanticDescriptor> resource is created, the smartphone application (i.e. ADN-AE-3) sends a semantic discovery request to the IN-CSE,

59July/August 2018

STANDARDS

SEMANTIC-ENABLED IOT SERVICE LAYER A common IoT service layer platform is required by the IoT market to facilitate multi-industry IoT applications. The oneM2M Global Initiative is an international partnership project to de-velop a globally acceptable IoT service-layer standard. The common service layer specified by oneM2M can be embedded into various IoT entities such as end devices, gateways. and serv-ers.10 It provides various IoT common service functionalities such as device registration, group management, and security and privacy.

The oneM2M service layer provides a means for connecting various IoT devices regardless of their access technologies, collecting data from these devices, and managing the collected data. Through its semantic capabilities, it also supports the annotation of semantic descriptions to oneM2M resources. Figure 1 shows the high-level design of a semantic-enabled IoT service layer platform. In order to support semantic features, IoT service-layer platforms have to support at least three basic features as follows:

• Semantic annotation: To achieve data interoperability, the service layer first should be able to support describing the meaning of resources/data.11 IoT service-layer resources (i.e. data sets) can be annotated with semantic information using standardized ontolo-gies and data structures.

• Semantic query and discovery: The platform can support queries from IoT applications based on a semantic query language. When a semantic query is received, the platform executes the query by retrieving semantic information for the targeted resources and processing the discovery query.

Figure 1. Semantic capabilities in an IoT service layer.

• Semantic mashup: Like a traditional Web mashup, a semantic mashup is used to com-pose a virtual IoT resource from more than one IoT resource, which can be other exist-ing virtual resources as well.

In order to provide semantic services to users properly, it is necessary to define common vocabu-laries, standardized data formats and description rules that can eventually solve the interoperabil-ity challenges caused by heterogeneous IoT data. The standard RDF language can be used to describe the semantic information. Also the annotated semantic metadata is then stored by the platform in a new resource designed to accommodate semantic information in an RDF/RDFS format. The metadata can also be stored in a triple store/ontology repository.

Sensor A Actuator B

IoT Networks

BA Resources

IoT Service Layer Virtual Sensor(A + B)

Mashup

Ontology repository

semantic repository

Semantic Annotation

Add semantics

Semantic Mashup

Perform Mashup

Store semantics

Things are represented as Resources

Semantic Discovery

Semantic Query

IoT Application

Discover using semantics

Inference & Reasoning

58July/August 2018

Page 16: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

14 ComputingEdge May 2019

STANDARDS

which contains a semantic filter. Then the IN-CSE will use the semantic filter to discover desired resources. After this the application ADN-AE-3 receives a response in the form of unique re-source identifiers. Based on the returned list of unique resource identifiers, ADN-AE-3 can make another request to the IN-CSE to retrieve one or more semantic descriptor resources.

oneM2M Base Ontology In general, information and operations in each IoT system can be described by ontologies, which provide a vocabulary with a structure. These ontologies (with OWL representations) can be used to support interoperability between different systems via ontology integration or mapping.12 For this purpose, oneM2M has defined its own ontology called the oneM2M Base Ontology. Various external ontologies from other IoT systems can be mapped to the oneM2M Base Ontology (e.g., by sub-classing and equivalence) so the interworking between the oneM2M system and external systems can be achieved. The oneM2M Base Ontology contains Classes (i.e. sets of individuals) and Properties (i.e. relationships and links between individuals), but no instances since the Base Ontology only supports a semantic description of these entities in the oneM2M architecture.

Semantic Annotation Semantic annotation, which is the first step toward a semantic IoT system, is a process of adding semantic information to resources in oneM2M IoT platforms so that an annotated resource can be discovered semantically by heterogeneous IoT applications. In the oneM2M system, semantic information is represented using RDF/RDFS (or OWL) as RDF triples. Since the oneM2M sys-tem uses a hierarchical tree structure to store and manage its resources, semantic information is added as a special semantic resource. For this purpose, an IoT semantic annotator (IoT-SA) is introduced that runs within the oneM2M IoT system to automatically annotate semantic infor-mation for various resources representing sensors/devices registered to the oneM2M system with the following five steps:

1. As inputs to the IoT-SA, users/admins select IoT resource(s) to be annotated from the IoT platform and choose ontology(s) to be used during this annotation.

2. The IoT-SA then parses the given ontology to retrieve its classes and properties. The IoT-SA also retrieves other resources having related semantic information from the platform as candidate resources to establish relationships. The related semantic infor-mation is retrieved from <relatedSemantic> attribute, which contains URIs of other linked descriptor resource (s).

3. Users/Admins repeat a process to define semantic information in a triple format (i.e. subject predicate object) based on the given classes and attributes/properties from the given ontology.

4. Selected resources and semantic information are then converted into the defined RDF format and the IoT-SA uploads encoded RDF triples to the <semanticDescriptor> resource under the target resource.

5. The semantically annotated resources can now be discoverable by IoT applications. The updated semantic information can also be seen by users/admins for other pur-poses.

60July/August 2018

Page 17: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

www.computer.org/computingedge 15

IEEE INTERNET COMPUTING

Figure 3. Semantic resource discovery procedures in oneM2M. Once a query is targeted to a resource, then platform determines the scope of the semantic query and executes it against all semantic information.

Semantic Resource Discovery and Semantic Query One of the key benefits of semantic descriptions is to enable semantic resource discovery. Se-mantic resource discovery is basically a capability for an IoT application to discover resources based on certain specified characteristics of resources it is interested in. Semantic resource dis-covery can be achieved by using a SPARQL query. Figure 3 shows semantic discovery proce-dures in oneM2M. An IoT application is notified of the discovered resources and can retrieve desired resources based on the returned URIs after a semantic query is executed in the oneM2M platform. Specifically, a semantic filter is specified in oneM2M, which is formulated as a SPARQL query and contained in a semantic resource discovery request. An IoT application that wants to discover resources using semantics has to form a semantic query statement using SPARQL based on its needs.

When a SPARQL query is received targeting a specific resource (a.k.a. target resource), the re-ceiver (i.e. IN-CSE in Figure 3) performs Semantic Graph Scoping (SGS) to decide the scope of the SPARQL query execution (i.e. to formulate a RDF basis for executing the SPARQL query). Semantic descriptors which are distributed and are hosted in the IoT platform’s resource struc-ture are collected together to formulate a complete RDF data basis.

Semantic Mashup Semantic Mashup is a process to discover and collect data from more than one IoT data sources and apply relevant business logic on the collected data to generate meaningful mashup results. For example, let us consider a case where users are interested in a service called “weather com-fort index,” which provides and expresses satisfaction level regarding weather conditions. The comfort levels can be calculated based on the temperature and humidity sensors deployed in a specific location together with additional weather conditions; this is actually a mashup process and can be provided as a mashup service by an IoT platform. oneM2M specifies a semantic mashup service, which is implemented via a set of mashup procedures as shown in Figure 4. In order to utilize a mashup service, an IoT application should first discover the corresponding SMJP (i.e. a <semanticMashupJobProfile> resource as defined in oneM2M (Step 1). A SMJP describes the profile and necessary information required for a specific mashup service such as input parameters, member resources, mashup function, and output parameters. The SMJP resource shall contain <semanticMashupInstance>, <semanticDescriptor> and <sub-scription> as child resources.13 Based on the profile described in the SMJP, Originators (e.g. AEs) can create corresponding semantic mashup instances where semantic mashup results will be generated and stored in <semanticMashupResult>. The Mashup Requestor may use <se-manticMashupResult> to retrieve the mashup result.

Semantic IoTApplication

ADN-AEServer

IN-CSE

Base

AE-1

AE-2

Cot_2_1

Cot_2_2

SD_1

SD_2

SD_3

SD_4

SD_nAE-x… …

Normal resource

<semanticDescriptor> resource

SD_3 SD_4Semantic GraphScoping (SGS) RDF

Data basis

SD_3 SD_4

A SPARQL Query Statement

Return results (List of Resources)

Executeon Returns

61July/August 2018

STANDARDS

which contains a semantic filter. Then the IN-CSE will use the semantic filter to discover desired resources. After this the application ADN-AE-3 receives a response in the form of unique re-source identifiers. Based on the returned list of unique resource identifiers, ADN-AE-3 can make another request to the IN-CSE to retrieve one or more semantic descriptor resources.

oneM2M Base Ontology In general, information and operations in each IoT system can be described by ontologies, which provide a vocabulary with a structure. These ontologies (with OWL representations) can be used to support interoperability between different systems via ontology integration or mapping.12 For this purpose, oneM2M has defined its own ontology called the oneM2M Base Ontology. Various external ontologies from other IoT systems can be mapped to the oneM2M Base Ontology (e.g., by sub-classing and equivalence) so the interworking between the oneM2M system and external systems can be achieved. The oneM2M Base Ontology contains Classes (i.e. sets of individuals) and Properties (i.e. relationships and links between individuals), but no instances since the Base Ontology only supports a semantic description of these entities in the oneM2M architecture.

Semantic Annotation Semantic annotation, which is the first step toward a semantic IoT system, is a process of adding semantic information to resources in oneM2M IoT platforms so that an annotated resource can be discovered semantically by heterogeneous IoT applications. In the oneM2M system, semantic information is represented using RDF/RDFS (or OWL) as RDF triples. Since the oneM2M sys-tem uses a hierarchical tree structure to store and manage its resources, semantic information is added as a special semantic resource. For this purpose, an IoT semantic annotator (IoT-SA) is introduced that runs within the oneM2M IoT system to automatically annotate semantic infor-mation for various resources representing sensors/devices registered to the oneM2M system with the following five steps:

1. As inputs to the IoT-SA, users/admins select IoT resource(s) to be annotated from the IoT platform and choose ontology(s) to be used during this annotation.

2. The IoT-SA then parses the given ontology to retrieve its classes and properties. The IoT-SA also retrieves other resources having related semantic information from the platform as candidate resources to establish relationships. The related semantic infor-mation is retrieved from <relatedSemantic> attribute, which contains URIs of other linked descriptor resource (s).

3. Users/Admins repeat a process to define semantic information in a triple format (i.e. subject predicate object) based on the given classes and attributes/properties from the given ontology.

4. Selected resources and semantic information are then converted into the defined RDF format and the IoT-SA uploads encoded RDF triples to the <semanticDescriptor> resource under the target resource.

5. The semantically annotated resources can now be discoverable by IoT applications. The updated semantic information can also be seen by users/admins for other pur-poses.

60July/August 2018

Page 18: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

16 ComputingEdge May 2019

STANDARDS

Figure 4. IoT Semantic mashup procedures in oneM2M. Each specific mashup service is described by a Semantic Mashup Job Profile (SMJP) which defines all required elements (e.g. types of input parameters, types of member resources, mashup operations or business logic, etc.) in RDF triples by this mashup service.

Based on the discovered SMJP, the next step is for the IoT application to create a Semantic Mashup Instance (SMI) resource, for example, by giving appropriate input parameters and mem-ber resources (Step 2). The SMI resource is used to contain input parameters, member resources, and any generated mashup results. Basically, SMJP provides a guidance on how an SMI shall be created and how the mashup result shall be calculated. The third step is for the IoT platform (i.e. CSE in oneM2M) to discover and collect original data from each member resource (e.g. via se-mantic resource discovery procedures) (Step 3). After the data is collected from the identified member resources (i.e. data sources), the IoT platform calculates the mashup result according to the business logic as described in the SMJP (Step 4). The generated semantic mashup result is stored in the SMI, which can be retrieved by the IoT application or other entities (Step 5).

CONCLUSION There is a strong need to resolve the interoperability issue in the IoT service layer using semantic technologies inspired by semantic Web. This article described a semantic-enabled IoT service layer architecture based on the oneM2M global IoT service layer standards. In this architecture, semantic descriptor resources are introduced to represent semantic information in RDF triples. This semantic descriptor resource allows an IoT service layer or an IoT application to annotate existing IoT resources/data with additional semantic information using selected ontologies and RDF/RDFS. The added semantic information is then leveraged for semantic filtering/discovery and semantic mash-up.

The proposed semantic-enabled IoT architecture also supports a semantic repository to maintain all semantic information in a centralized triple store. Then, a SPARQL query can be executed directly on the triple store against the semantic information stored there. Future work includes advanced semantic annotation with other data models, information synchronization between oneM2M service layer resource structure and the triple store, distributed semantic analytics and other functions, as well as interoperability with other standards.

ACKNOWLEDGMENT This work was supported by Institute for Information & communications Technology Pro-motion(IITP) grant funded by the Korea government(MSIT) (No. B0184-15-1003, No. B0184-15-1001)

SMJP

SMI

R1 R2 R3 MashupResult

IoTApplication

oneM2M Semantic Mashup Function

SMJP discovery

1 SMI creation2

Mashup ResultRetrieval

5

Identified Data

Resource R1

Resource R2

Resource R3

Resource R4

Resource R5

Resource R6

oneM2M Resources

SMIInstantiation

Data source identification

3

Data collection and result generation

4

62July/August 2018

Page 19: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

www.computer.org/computingedge 17

IEEE INTERNET COMPUTING

REFERENCES 1. D. Bandyopadhyay and J. Sen, “Internet of Things: Applications and Challenges in

Technology and Standardization,” Wireless Personal Communications, vol. 58, no. 1, 2011, pp. 49–69.

2. C. Perera et al., “Context Aware Computing for The Internet of Things: A Survey,” IEEE Communications Surveys & Tutorials, vol. 16, no. 1, 2014, pp. 414–454.

3. T. Berners-Lee, J. Hendler, and O. Lassila, “The Semantic Web,” Scientific American, vol. 284, no. 5, 2001.

4. A. Palavalli, D. Karri, and S. Pasupuleti, “Semantic Internet of Things,” IEEE Tenth International Conference on Semantic Computing (ICSC 16), 2016, pp. 91–95.

5. M. Palattella et al., “Standardized Protocol Stack for the Internet of (Important) Things,” IEEE Communications Surveys & Tutorials, vol. 15, no. 3, 2013, pp. 1389–1406.

6. p. Sethi and s. Sarangi, “Internet of Things: Architectures, Protocols, and Applications,” Journal of Electrical and Computer Engineering, 2017, pp. 1–25.

7. E. Kovacs et al., “Standards-Based Worldwide Semantic Interoperability for IoT,” IEEE Communications, vol. 54, no. 12, 2016, pp. 40–46.

8. A. Sheth, C. Henson, and S.S. Sahoo, “Semantic Sensor Web,” IEEE Internet Computing, vol. 12, no. 4, 2003, pp. 78–83.

9. M.N. Meenachi and S.M. Babi, “A Survey on Usage of Ontology in Different Domain,” International Journal of Applied Information Systems, vol. 4, no. 2, 2012, pp. 46–55.

10. J. Swetina et al., “Toward a standardized common M2M service layer platform: Introduction to oneM2M,” IEEE Wireless Communications, vol. 21, no. 3, 2014, pp. 20–26.

11. E. Kovacs et al., “Standards-Based Worldwide Semantic Interoperability for IoT,” IEEE Communications Magazine, vol. 54, no. 12, 2016, pp. 40–46.

12. “Developer Guide: Implementing Semantics,” oneM2M, TR-0045, vol. v.1.0.0, November 2017.

13. “Functional Architecture,” oneM2M, TS-0001, vol. v.3.10.0, February 2018.

ABOUT THE AUTHORS Komal Gilani is an MSc student at Sejong University. Her research interests include IoT semantics, smart cities, and industrial IoT. She has a BS in computer science from Arid Ag-riculture University Rawalpindi. Contact her at [email protected].

Jaeho Kim is a principal engineer at Korea Electronics Technology Institute. His research interests include IoT, smart cities, and digital twin technologies. He has a PhD in electrical and electronic engineering from Yonsei University. Contact him at [email protected].

JaeSeung Song is an associate professor at Sejong University. His research interests in-clude IoT semantics, software testing, and industrial IoT. He has a PhD in computing from Imperial College London. Contact him at [email protected].

Dale Seed is a principal engineer at InterDigital Communications. His research interests include IoT protocols and services. He has a MS in computer science and engineering from the Pennsylvania State University. Contact him at [email protected].

Chonggang Wang is a principal engineer at InterDigital Communications. His research in-terests include IoT, blockchain and distributed ledger technologies, and AI-powered future networking and computing. He has a PhD in computer science from Beijing University ofPosts and Telecommunications. Contact him at [email protected].

STANDARDS

Figure 4. IoT Semantic mashup procedures in oneM2M. Each specific mashup service is described by a Semantic Mashup Job Profile (SMJP) which defines all required elements (e.g. types of input parameters, types of member resources, mashup operations or business logic, etc.) in RDF triples by this mashup service.

Based on the discovered SMJP, the next step is for the IoT application to create a Semantic Mashup Instance (SMI) resource, for example, by giving appropriate input parameters and mem-ber resources (Step 2). The SMI resource is used to contain input parameters, member resources, and any generated mashup results. Basically, SMJP provides a guidance on how an SMI shall be created and how the mashup result shall be calculated. The third step is for the IoT platform (i.e. CSE in oneM2M) to discover and collect original data from each member resource (e.g. via se-mantic resource discovery procedures) (Step 3). After the data is collected from the identified member resources (i.e. data sources), the IoT platform calculates the mashup result according to the business logic as described in the SMJP (Step 4). The generated semantic mashup result is stored in the SMI, which can be retrieved by the IoT application or other entities (Step 5).

CONCLUSION There is a strong need to resolve the interoperability issue in the IoT service layer using semantic technologies inspired by semantic Web. This article described a semantic-enabled IoT service layer architecture based on the oneM2M global IoT service layer standards. In this architecture, semantic descriptor resources are introduced to represent semantic information in RDF triples. This semantic descriptor resource allows an IoT service layer or an IoT application to annotate existing IoT resources/data with additional semantic information using selected ontologies and RDF/RDFS. The added semantic information is then leveraged for semantic filtering/discovery and semantic mash-up.

The proposed semantic-enabled IoT architecture also supports a semantic repository to maintain all semantic information in a centralized triple store. Then, a SPARQL query can be executed directly on the triple store against the semantic information stored there. Future work includes advanced semantic annotation with other data models, information synchronization between oneM2M service layer resource structure and the triple store, distributed semantic analytics and other functions, as well as interoperability with other standards.

ACKNOWLEDGMENT This work was supported by Institute for Information & communications Technology Pro-motion(IITP) grant funded by the Korea government(MSIT) (No. B0184-15-1003, No. B0184-15-1001)

SMJP

SMI

R1 R2 R3 MashupResult

IoTApplication

oneM2M Semantic Mashup Function

SMJP discovery

1 SMI creation2

Mashup ResultRetrieval

5

Identified Data

Resource R1

Resource R2

Resource R3

Resource R4

Resource R5

Resource R6

oneM2M Resources

SMIInstantiation

Data source identification

3

Data collection and result generation

4

62July/August 2018

This article originally appeared in IEEE Internet Computing, vol. 22, no. 4, 2018.

Page 20: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

18 May 2019 Published by the IEEE Computer Society 2469-7087/19/$33.00 © 2019 IEEE64 1541-1672/17/$33.00 © 2017 IEEE IEEE INTELLIGENT SYSTEMS

Published by the IEEE Computer Society

Editor: Amit Sheth, Kno.e.sis—the Ohio Center of Excellence in Knowledge-Enabled Computing, [email protected]

I N T E R N E T O F T H I N G S

Toward a Machine Intelligence Layer for Diverse Industrial IoT Use CasesJan Höller and Vlasios Tsiatsis, EricssonCatherine Mulligan, Imperial College London

The Internet of Things (IoT) has moved be-

yond the hype, and today we see promising

applications materializing and industries trans-

forming through well-known digitalization as well

as servitization—that is, delivering a service as an integral part of a product. This is evident in the increasing number of physical industry assets rep-resented and manipulated in both the digital and physical worlds and in the fact that the business models for physical and digital assets are converg-ing toward service as opposed to product sales.

IoT can be used in many industry sectors with numerous benefi ts. Cost optimization and envi-ronmental effi ciency are just two factors driving this expansion. Examples of IoT applications in-clude predictive maintenance and condition-based monitoring, which are mainly used in industrial settings. However, the envisioned IoT applications are so diverse and include such a broad spectrum of technologies that system designers need design support tools and guidelines. This article provides a few of these design guidelines in the form of ar-chitecture and design patterns to enable scalable and replicable solutions rather than point solu-tions stemming from point problems. As a result, we attempt to structure both the problem (use case space) and the solution domain (architecture).

IoT involves the instrumentation of physi-cal world assets or infrastructures (collectively called an entity of interest) with sensors, actua-tors, and identifi cation devices to enable monitor-ing and control of these entities. The main high-level building blocks are devices, connectivity, and distributed machine intelligence. Although there

is no formal defi nition of machine intelligence, for the purposes of this article we defi ne it as the com-bination of machine learning and artifi cial intel-ligence technologies, which includes data analyt-ics, symbolic reasoning, and action planning. It is expected that the value created by IoT lies mainly in the services provided by machine intelligence rather than devices and connectivity services. As a result, this article focuses on sharing our experi-ence with the analysis of several IoT use cases and a machine intelligence framework that combines knowledge of solution design for them.

ApproachThe main goal of building replicable solu-tions can be likened to the goal of formulating a reference architecture that encompasses and encodes the knowledge of numerous solution ar-chitectures. In turn, according to Nick Rozanski and Eóin Woods, a solution architecture can be described as a set of architecture views or blue-prints, each addressing the concerns of a specifi c stake holder.1

In generating a reference architecture one typi-cally follows the design process for a single stake-holder concern that is typically expressed with one or more use cases. The process is then re-peated for all possible stakeholder concerns. In the end, all solution architectures are combined in a union.

In this article, we follow the reference archi-tecture process for a subset of stakeholders (end users); therefore, the union of different solu-tion architectures is a partial version of a refer-ence architecture called the machine intelligence

Page 21: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

www.computer.org/computingedge 19JULY/AUGUST 2017 65

framework. Figure 1 illustrates this process, referred to as structuring the solution domain. Other types of stakeholders are developers and service providers. The resulting ma-chine intelligence framework with a different stakeholder will be some-what different from that of an end user. However, following the same methodology outlined here, frame-works for other stakeholders can be generated.

Because of the huge number of avail-able use cases, with new ones arising all the time, following the design pro-cess to generate a single solution archi-tecture is not tractable. Therefore, we also structure the problem domain or the potential use cases. For the pur-poses of this exercise, we limited the studied use case sources to oneM2M,2 the Industrial Internet Consortium (IIC) use cases and testbeds (www.iiconsortium.org), and National In-stitute of Standards and Technology big data.3 In the context of this arti-cle, structuring the problem domain (Figure 1) means that individual uses cases are grouped into use case fami-lies or patterns. We have used the use cases’ structure to limit the number of times we applied the design process

for developing solution blueprints. As a result, instead of generating solution blueprints from each specific use case, we generated architecture blueprints for a representative use case from a family of use cases or a use case pat-tern. We then iterated the design pro-cess over all the identified use case patterns.

Structuring the Problem Domain: Use Case PatternsWe have studied about 100 use cases from different sources, which have varying degrees of detail and are clas-sified or grouped according to mar-ket-related terms. The most typical of these are the (market) sector and (market) vertical that a use case be-longs to. Although not well-defined in the literature, we have followed the IIC definition and taxonomy.4 According to the IIC, a sector (such as healthcare) is a logical group of related verticals (for example, hos-pitals), and a vertical is a market in which vendors offer goods and services that meet a particular set of usage, technical, or regulatory requirements.

We focus our study on the end user as the main system stakeholder

as stated earlier. The end user for-mulates concerns that are concretely described in use cases. These are grouped logically into (use case) ap-plications apart from their market classification into sector and verti-cal. Our assumption is that a sec-tor contains multiple verticals, each containing multiple applications and multiple use case instances of dif-ferent use case types. We refer to a use case instance as simply a “use case” (see Figure 2). In turn, each use case expresses a stakeholder concern requiring a desired (tech-nical) system functionality or set of characteristics.

Although this classification is done mainly from a market perspective, we aimed to reshuffle the same set of use cases into another set of groups that emphasize the technical characteris-tics. We call these groups (technical) use case patterns. We also identified a set of technical characteristics based on which the different (technical) use case patterns can be described; how-ever, for brevity we omit the techni-cal characteristics from the pattern definitions.

Through our research, we have identified seven use case patterns.

Figure 1. Structuring the problem and solutions domains (MI: machine intelligence, SLO: service-level objective).

Problem domain

Use case patterns

Use casetaxonomy

Developer usecases

Service provideruse cases

Pattern #K

Pattern #2

Pattern #1

Solution domain

MI frameworkBlueprints

Blueprint #1.1............

Blueprint #1.N1.............

Data andresource

processingControllers Task

planning

Objectmanagement

SLO and workfloworder management

Task and objective analysis

Knowledgemanagement

Multi-objectiveoptimization

Insightgeneration

User use cases

Designprocess

64 1541-1672/17/$33.00 © 2017 IEEE IEEE INTELLIGENT SYSTEMSPublished by the IEEE Computer Society

Editor: Amit Sheth, Kno.e.sis—the Ohio Center of Excellence in Knowledge-Enabled Computing, [email protected]

I N T E R N E T O F T H I N G S

Toward a Machine Intelligence Layer for Diverse Industrial IoT Use CasesJan Höller and Vlasios Tsiatsis, EricssonCatherine Mulligan, Imperial College London

The Internet of Things (IoT) has moved be-

yond the hype, and today we see promising

applications materializing and industries trans-

forming through well-known digitalization as well

as servitization—that is, delivering a service as an integral part of a product. This is evident in the increasing number of physical industry assets rep-resented and manipulated in both the digital and physical worlds and in the fact that the business models for physical and digital assets are converg-ing toward service as opposed to product sales.

IoT can be used in many industry sectors with numerous benefi ts. Cost optimization and envi-ronmental effi ciency are just two factors driving this expansion. Examples of IoT applications in-clude predictive maintenance and condition-based monitoring, which are mainly used in industrial settings. However, the envisioned IoT applications are so diverse and include such a broad spectrum of technologies that system designers need design support tools and guidelines. This article provides a few of these design guidelines in the form of ar-chitecture and design patterns to enable scalable and replicable solutions rather than point solu-tions stemming from point problems. As a result, we attempt to structure both the problem (use case space) and the solution domain (architecture).

IoT involves the instrumentation of physi-cal world assets or infrastructures (collectively called an entity of interest) with sensors, actua-tors, and identifi cation devices to enable monitor-ing and control of these entities. The main high-level building blocks are devices, connectivity, and distributed machine intelligence. Although there

is no formal defi nition of machine intelligence, for the purposes of this article we defi ne it as the com-bination of machine learning and artifi cial intel-ligence technologies, which includes data analyt-ics, symbolic reasoning, and action planning. It is expected that the value created by IoT lies mainly in the services provided by machine intelligence rather than devices and connectivity services. As a result, this article focuses on sharing our experi-ence with the analysis of several IoT use cases and a machine intelligence framework that combines knowledge of solution design for them.

ApproachThe main goal of building replicable solu-tions can be likened to the goal of formulating a reference architecture that encompasses and encodes the knowledge of numerous solution ar-chitectures. In turn, according to Nick Rozanski and Eóin Woods, a solution architecture can be described as a set of architecture views or blue-prints, each addressing the concerns of a specifi c stake holder.1

In generating a reference architecture one typi-cally follows the design process for a single stake-holder concern that is typically expressed with one or more use cases. The process is then re-peated for all possible stakeholder concerns. In the end, all solution architectures are combined in a union.

In this article, we follow the reference archi-tecture process for a subset of stakeholders (end users); therefore, the union of different solu-tion architectures is a partial version of a refer-ence architecture called the machine intelligence

Page 22: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

20 ComputingEdge May 201966 IEEE INTELLIGENT SYSTEMS

Massive monitoring. This use case pattern involves numerous sensors deployed across a large geographical area. Data is collected over a period of time for bulk batch or stream analysis. Data analysis aims to find trends, de-tect anomalies or abnormal situations, or simply learn the behavior of the monitored asset or phenomena. Typi-cal examples include environmental and climate monitoring and pollution monitoring.

Asset management. This pattern in-volves managing physical assets that are well-defined and confined. Exam-ple assets include a building, vehicle, piece of industrial machinery, tur-bine, or human patient. Typical man-agement aspects are to optimize the asset’s operation, perform diagnos-tics, or do predictive maintenance.

Logistics. A typical logistics scenario can be described as the process of coor-dination, management, and orchestra-tion of a collection of tasks in a work-flow to achieve a set of goals (such as time or cost optimization) by making efficient use of the available resources.

Typical examples include fleet manage-ment, supply-chain optimization, and pickup-delivery services.

Remote operations. Remote opera-tion generally refers to the control and operation of a system or equip-ment from a remote location either by humans or software. In this case, the remotely operated system or equip-ment cannot or is not designed to operate completely autonomously to accomplish the task. Typical exam-ples include remote mining, remote- controlled vehicles and drones, and remote surgery.

Robots and autonomous machines. This use case pattern covers the op-erations and management of par-tially or fully autonomous systems such as robots, vehicles, and drones. Such systems are often described as cyberphysical systems (CPS), which integrate the dynamics of the physi-cal processes with those of the soft-ware and networking. Typical ex-amples include static or mobile factory floor robots and autonomous vehicles.

Infrastructure monitor and control. This use case pattern covers manage-ment of large-scale industrial or ex-tended infrastructures that need to be monitored and controlled. Exam-ples include a transportation infra-structure such as a national road net-work, a utility infrastruc ture such as the electric grid, oil and gas pipelines, and street lighting.

Device swarms. This use case pat-tern covers devices and systems that operate autonomously with a simple set of rules and no central intelli-gence, and form peer-to-peer groups to collectively reach a common goal. Typical examples include microgrid producers and consumers and zero-trust computing applications such as home automation.

Structuring the Solution DomainThe solution domain consists mainly of architectural blueprints that in-clude a few main types of system components. This domain encom-passes devices, connectivity, cloud and distributed computing, machine intelligence, and mechanisms for vi-sualizing information and integrat-ing applications to an enterprise environment. These blueprints typi-cally concretely express the func-tional components of a resulting solution. However, a system also typically consists of a set of non-functional characteristics. Through our research we have identified a core set of functional and nonfunc-tional characteristics that can be grouped into different perspectives: data and information perspectives (multimodality of IoT data, the need for insight and analysis-driven func-tions, knowledge representation, cognition, and so on); control per-spectives, meaning whether a control functionality exists (sensing and ac-tuation in feedback loops, workflow/

Market classification

Technical classificationor pattern extraction

Vertical

Application

Use case pattern

Sector

1

1

n

m

m

m

contains

appears

contains

Use case patterns

Robots andautonomous machines

Asset management

Infrastructuremonitor and control

Massive monitoring

Remote operations

Logistics

Device swarms

Figure 2. Structuring Internet of Things sectors, verticals, applications, and use cases toward recurring use case patterns.

Page 23: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

www.computer.org/computingedge 21JULY/AUGUST 2017 67

process-driven); and general charac-teristics (locality, timing criticality, safety, and security).

A Framework for Distributed Machine Intelligence for Industrial Use CasesOur approach is to aggregate solution blueprints for the identified recurring use case patterns, thus arriving at our desired framework. As mentioned, our focus in this article is distrib-uted machine intelligence functional-ity supporting the diversity of IoT use cases we have identified.

For the sake of brevity, we have left out two important, but for the objective of this article, secondary considerations. The first is the gen-eral need for distributed processing of machine intelligence logic, and the second is lifecycle management of the solution.

IoT data processing and decision making is generally a highly distrib-uted capability. The need for distrib-uted processing in IoT comes from different requirements.5 Data vol-umes, cost, performance and latency, autonomous local asset operation, ro-bustness, and safety around IoT asset operation are the main requirements. IoT distributed processing extends beyond the datacenter to constrained IoT devices, and the resulting het-erogeneity needs to be managed to meet service-level agreements for the applications.

Lifecycle management includes operational aspects such as the type of logic to deploy and location of the deployment, ensuring necessary ro-bustness, and trust and security. In addition, the system should be adap-tive and cognitive to handle chang-ing external requirements or chang-ing contexts. For instance, the system should ideally detect the need to change controller parameters that

might be wrongly set or continu-ously do model training.

Machine Intelligence Functional DomainsThe machine intelligence framework provides the functionality needed to realize the use case applications rele-vant to end users. As such, it processes IoT data from various sources, de-rives and executes control operations to manipulate the asset or infrastruc-ture via actuators, and maintains a cognitive knowledge base related to the assets. An objective of the frame-work is to partition functionality

into application-independent building blocks. These can then be intercon-nected to realize the use case applica-tions according to a service-oriented paradigm, lending themselves to mi-croservices implementations.6

The main functional domains, as shown in Figure 3, include the capa-bility to manage data and relevant IoT resources (sensing, actuation, and identification) and process data and extract information (analytics or machine learning); various types of control and execution (control-lers or planning tools); and capabili-ties to manage and represent knowl-edge relating to the assets and the system. Figure 3 shows the functional

domains as well as some of the main interfaces between them.

Data and Resource ProcessingBy data and resources we mean sensor data, actuator services, and their rep-resentations. Individual sensor data and actuator control is the raw fab-ric for interacting with the physi-cal world. Sensor data includes in-dividual data items and events and datastreams from a single sensor. Re-sources are abstractions of sensors and actuators in the system.

Massive-scale IoT deployments re-quire some key considerations in the collection phase. Data can be re-ceived as an event stream with vary-ing speed, volume, and dynamicity over time. Information creation, at-tribute validation, and verification are necessary steps in the data collec-tion. Data can be received asynchro-nously or synchronously, depending on the type of application at hand.

Data management, curation, and resource management are crucial in IoT systems and comprise the follow-ing steps. First, data is collected and distributed. Then, data and resources are modeled to capture heterogeneity (structured, unstructured), high dis-tribution, large size (number of data sources, streams, and actuator end points), and semantic annotation de-scribing meaning of the endpoint ca-pabilities. Resources need the proper annotation, describing such attributes as meaning, origin, and quality. Also, transmitted data needs to be filtered to the application needs. IoT data, when needed, will require distributed stor-age, taking into account factors such as cost and storage capacity.

Real resources require appropriate abstract representations and manage-ment in an IoT system, for example, as a representation of a datastream or as an aggregation of sensor data. Resource abstraction implies a level

The machine intelligence framework provides the functionality needed to realize the use case applications relevant to end users.

66 IEEE INTELLIGENT SYSTEMS

Massive monitoring. This use case pattern involves numerous sensors deployed across a large geographical area. Data is collected over a period of time for bulk batch or stream analysis. Data analysis aims to find trends, de-tect anomalies or abnormal situations, or simply learn the behavior of the monitored asset or phenomena. Typi-cal examples include environmental and climate monitoring and pollution monitoring.

Asset management. This pattern in-volves managing physical assets that are well-defined and confined. Exam-ple assets include a building, vehicle, piece of industrial machinery, tur-bine, or human patient. Typical man-agement aspects are to optimize the asset’s operation, perform diagnos-tics, or do predictive maintenance.

Logistics. A typical logistics scenario can be described as the process of coor-dination, management, and orchestra-tion of a collection of tasks in a work-flow to achieve a set of goals (such as time or cost optimization) by making efficient use of the available resources.

Typical examples include fleet manage-ment, supply-chain optimization, and pickup-delivery services.

Remote operations. Remote opera-tion generally refers to the control and operation of a system or equip-ment from a remote location either by humans or software. In this case, the remotely operated system or equip-ment cannot or is not designed to operate completely autonomously to accomplish the task. Typical exam-ples include remote mining, remote- controlled vehicles and drones, and remote surgery.

Robots and autonomous machines. This use case pattern covers the op-erations and management of par-tially or fully autonomous systems such as robots, vehicles, and drones. Such systems are often described as cyberphysical systems (CPS), which integrate the dynamics of the physi-cal processes with those of the soft-ware and networking. Typical ex-amples include static or mobile factory floor robots and autonomous vehicles.

Infrastructure monitor and control. This use case pattern covers manage-ment of large-scale industrial or ex-tended infrastructures that need to be monitored and controlled. Exam-ples include a transportation infra-structure such as a national road net-work, a utility infrastruc ture such as the electric grid, oil and gas pipelines, and street lighting.

Device swarms. This use case pat-tern covers devices and systems that operate autonomously with a simple set of rules and no central intelli-gence, and form peer-to-peer groups to collectively reach a common goal. Typical examples include microgrid producers and consumers and zero-trust computing applications such as home automation.

Structuring the Solution DomainThe solution domain consists mainly of architectural blueprints that in-clude a few main types of system components. This domain encom-passes devices, connectivity, cloud and distributed computing, machine intelligence, and mechanisms for vi-sualizing information and integrat-ing applications to an enterprise environment. These blueprints typi-cally concretely express the func-tional components of a resulting solution. However, a system also typically consists of a set of non-functional characteristics. Through our research we have identified a core set of functional and nonfunc-tional characteristics that can be grouped into different perspectives: data and information perspectives (multimodality of IoT data, the need for insight and analysis-driven func-tions, knowledge representation, cognition, and so on); control per-spectives, meaning whether a control functionality exists (sensing and ac-tuation in feedback loops, workflow/

Market classification

Technical classificationor pattern extraction

Vertical

Application

Use case pattern

Sector

1

1

n

m

m

m

contains

appears

contains

Use case patterns

Robots andautonomous machines

Asset management

Infrastructuremonitor and control

Massive monitoring

Remote operations

Logistics

Device swarms

Figure 2. Structuring Internet of Things sectors, verticals, applications, and use cases toward recurring use case patterns.

Page 24: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

22 ComputingEdge May 201968 IEEE INTELLIGENT SYSTEMS

of indirection requiring a resolution function that dynamically maps be-tween the resource representation and the real resource.

Insight GenerationForecasting is a key issue in the prominent IoT use case of predictive maintenance, which is used to deter-mine the health of a piece of machin-ery and understand when any mainte-nance might be needed.

Forecasting involves predicting new outcomes based on previously known results. Depending on the IoT use case, different forecasting time-frames apply. For example, trajectory forecasting of moving objects can be real time, whereas machine degrada-tion is more long term. Forecasting can be data driven or model driven depending on the problem require-ments. Model training is a necessity and can be based on training sets or

via reinforcement learning. Typical forecasting models can be statistical or neural networks-based, Bayesian or non-Bayesian, linear or nonlinear, parametric or nonparametric, univar-iate or multivariate.

Sensor fusion is another technique. In general, fusion concerns combin-ing data and information from di-verse sources so that the resulting information is more accurate than if one had relied on a single source. An example is the localization of an object that can rely on a combi-nation of ultra-wide band (UWB) transponders, camera detection, and contextual information sensed by the object itself, and when fused pro-vide a much higher degree of location accuracy.

Knowledge ManagementKnowledge management involves rep-resenting, modeling, structuring, and

sharing knowledge about a physical asset or infrastructure. Knowledge is the collected set of data, inferred knowledge and insights, and control capabilities of the asset. The knowl-edge can further be structured so the different data, insights, and control capabilities can be directly mapped to the asset’s real-world structure, thus becoming a proper digital representa-tion of the asset.

Knowledge is generally of two types: declarative knowledge (also re-ferred to as propositional knowledge) and procedural knowledge (also re-ferred to as imperative knowledge). Declarative knowledge describes what an entity is and how it is struc-tured and formally expressed using ontologies. Procedural knowledge de-scribes how an entity behaves, for ex-ample, in response to stimuli; and the formal description format is typically via state machines.

Controllers

PID

Rule based

Task planning

TemporalLong term

Mid term

Short term

TieredData and resource processing

Datacollection

Actuationdispatch

Data/eventdistribution

Resourcemanagement

Curation

Annotation

Object management

Localization

Identification Catalog

SLO and workfloworder management

Task and objective analysis

Knowledge management

Name space:X

Multi-objective optimization

KPI conflict arbitration

KPI tradeoffs

Plan selection

Insight generation

Fusion

Model selection

Model training

Long term

Mid term

Short term

Forecasting

Anomaly detection

ClassificationNamespace:

real-world model

Semantic interoperability

Tier 1

Tier 2

Tier 3

Figure 3. Framework for machine intelligence supporting a diversity of IoT use cases (KPI: key performance indicator, PID: proportional, integral, and derivative; SLO: service-level objective).

Page 25: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

www.computer.org/computingedge 23JULY/AUGUST 2017 69

Knowledge is captured and made available in what can be referred to as a knowledge base, which is man-ifested by a set of ontologies. Typi-cal ontologies in IoT are not only for the actual real-world model of the asset and expert knowledge but also knowledge about system and appli-cation objectives, such as key per-formance indicators (KPIs), a work order, task plans, and constraints of the IoT system itself. The real-world model is typically a hierarchical or graph structure.

Across domains in IoT, seman-tic interoperability is essential for achieving many business applica-tions.7 Semantic interoperability enables data and information to be shared across domains and un-derstood by systems without need-ing manual interpretations on top of technical details or protocol and syntactic interoperability. Semantic interoperability requires mapping methods that can be predefined or self-learning. The latter requires al-gorithms that consider structural, terminological, and semantic differ-ences and similarities.

Object ManagementObject management involves identify-ing, localizing, and cataloging physi-cal assets that are handled by the IoT system. This is important for some types of use cases, such as logistics involving transported goods or local-ization of tools on a factory floor.

Object identification is possible us-ing various techniques, such as tags based on optical or radio technolo-gies (for example, QR codes or RFID tags). The purpose is to uniquely identify and name objects. A resolu-tion infrastructure is usually in place to find information about the object. A prominent example is electronic product code information services (EPCIS).8

Object localization needs to be tailored to the IoT needs and de-ployment scenarios (such as indoor or outdoor environments). Typical indoor localization technologies in-clude video or image processing, Bluetooth beacons, use of Wi-Fi ac-cess points, or UWB ranging. Out-doors, GPS-based localization is typically relied on. For any local-ization solution, the required ac-curacy, size of area covered, and

real timeliness of location must be considered.

A catalog function can also be re-quired. This function works as a re-pository of all assets of interest and includes other properties of the asset. EPCIS is an example.8

ControllersControl is a core automation point in any IoT system involving actuators. Control software commands the assets’ desired behavior. Common to all con-trollers is the deterministic behavior of

controlling operations based on input from an a priori desired and defined operational behavior. The use of dif-ferent controller types is based on func-tional and nonfunctional characteris-tics meeting application needs.

Whereas many control systems in robotics and other real-world continu-ous and industrial systems use propor-tional, integral, and derivative (PID) controls, other IoT use cases, such as home automation, often use rule-based systems for event-driven control.

A PID controller is a control loop feedback mechanism using a math-ematical function that takes the de-viation between the desired state and the measure state as input for control. Proportional control means that pro-portional feedback of the deviation is provided to determine the control value. A derivative part of the devia-tion dampens the error. An integral part of the deviation provides errors to be removed over time. Examples include inverse kinematics for robot control and temperature control of a fluid system. This requires knowl-edge about the physical behavior and properties of the asset controlled.

Rule-based controllers are based on a set of predefined rules that are trigger-action pairs, where a trigger is a condition and an action is a pre-defined workflow typically containing commands to the devices or related services—for example, following the simple logic of “if this, then that.”

In sufficiently complex, dynamic, and nondeterministic situations one can enhance the usability and main-tainability of both PID and rule-based control systems by making them use task planning technologies to help infer the actions to be taken.

Task PlanningTask planning can be defined as the process of generating a sequence of ac-tions with certain objectives. Planning

Semantic interoperability enables data and information to be shared across domains and understood by systems without needing manual interpretations on top of technical details or protocol and syntactic interoperability.

68 IEEE INTELLIGENT SYSTEMS

of indirection requiring a resolution function that dynamically maps be-tween the resource representation and the real resource.

Insight GenerationForecasting is a key issue in the prominent IoT use case of predictive maintenance, which is used to deter-mine the health of a piece of machin-ery and understand when any mainte-nance might be needed.

Forecasting involves predicting new outcomes based on previously known results. Depending on the IoT use case, different forecasting time-frames apply. For example, trajectory forecasting of moving objects can be real time, whereas machine degrada-tion is more long term. Forecasting can be data driven or model driven depending on the problem require-ments. Model training is a necessity and can be based on training sets or

via reinforcement learning. Typical forecasting models can be statistical or neural networks-based, Bayesian or non-Bayesian, linear or nonlinear, parametric or nonparametric, univar-iate or multivariate.

Sensor fusion is another technique. In general, fusion concerns combin-ing data and information from di-verse sources so that the resulting information is more accurate than if one had relied on a single source. An example is the localization of an object that can rely on a combi-nation of ultra-wide band (UWB) transponders, camera detection, and contextual information sensed by the object itself, and when fused pro-vide a much higher degree of location accuracy.

Knowledge ManagementKnowledge management involves rep-resenting, modeling, structuring, and

sharing knowledge about a physical asset or infrastructure. Knowledge is the collected set of data, inferred knowledge and insights, and control capabilities of the asset. The knowl-edge can further be structured so the different data, insights, and control capabilities can be directly mapped to the asset’s real-world structure, thus becoming a proper digital representa-tion of the asset.

Knowledge is generally of two types: declarative knowledge (also re-ferred to as propositional knowledge) and procedural knowledge (also re-ferred to as imperative knowledge). Declarative knowledge describes what an entity is and how it is struc-tured and formally expressed using ontologies. Procedural knowledge de-scribes how an entity behaves, for ex-ample, in response to stimuli; and the formal description format is typically via state machines.

Controllers

PID

Rule based

Task planning

TemporalLong term

Mid term

Short term

TieredData and resource processing

Datacollection

Actuationdispatch

Data/eventdistribution

Resourcemanagement

Curation

Annotation

Object management

Localization

Identification Catalog

SLO and workfloworder management

Task and objective analysis

Knowledge management

Name space:X

Multi-objective optimization

KPI conflict arbitration

KPI tradeoffs

Plan selection

Insight generation

Fusion

Model selection

Model training

Long term

Mid term

Short term

Forecasting

Anomaly detection

ClassificationNamespace:

real-world model

Semantic interoperability

Tier 1

Tier 2

Tier 3

Figure 3. Framework for machine intelligence supporting a diversity of IoT use cases (KPI: key performance indicator, PID: proportional, integral, and derivative; SLO: service-level objective).

Page 26: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

24 ComputingEdge May 201970 IEEE INTELLIGENT SYSTEMS

can be applied to a variety of prob-lems such as route planning of au-tonomous vehicles, optimization of a logistics flows, and automation of field personnel.

The planning problem is normally represented by three key elements—states, actions, and goals. State iden-tifies the model of the world, actions represent different operations that af-fect the system’s state, and goals are states to achieve or maintain. Deriv-ing the task plan is to take the cur-rent state, the desired state and the possible actions and from that gener-ate a plan as a sequence of possible or proposed actions. A plan can also be a partially ordered list of tasks. One possible way to perform task plan-ning is using AI planners, where the world and the problem are modeled using a planning domain definition language (PDDL).

Multiobjective OptimizationAutomating complex system opera-tions by leveraging data-driven strat-egies designed to analyze alternatives under multiple conflicting views or KPIs is challenging. First, KPI evalua-tions are not always reliable and might be subject to changes over time; sec-ond, the costs incurred in adapting solutions under operation must be ac-counted for. In such cases, it is difficult to track how the underlying tradeoffs (such as return versus risk or through-put versus cost) will evolve over time, and decision-making preferences are hard to elicit and represent computa-tionally. In the absence of clear pref-erences and priorities over the KPIs, general problem-solving strategies and architectures must be designed for au-tomating general data-driven multiob-jective opti mization (MOO) systems under uncertainty.

MOO can play a key role in appli-cations where conflict resolution is ex-pected. For instance, in supply-chain

control applications, the proposed sys-tem can monitor the profitability for the whole chain as well as the overall product shortage risk. Those two KPIs are clearly in conflict as optimization at an extreme for one results in a risk for the other.

A key difference between task plan-ning and optimization is that in the latter does not assume that desired goal states will be input by the system stakeholders. This stems from the fact that it can be impossible for humans to cope with the underlying complex-ity of explicitly specifying goal states while simultaneously fulfilling all ser-vice-level objectives (SLOs). In such cases, it is possible to leverage simu-lation-based MOO to automatically explore the space of all candidate goal states that not only fulfill all SLOs but actually surpass them and deliver out-standing performance.

Service Level Objectives and Workflow ManagementThe end user’s interests in the sys-tem can be specified as a set of high-level, quantifiable performance met-rics by SLOs and workflow orders. SLOs are translated into KPIs, which are deemed critical for verifying ser-vice execution and detecting devia-tions from SLOs. KPIs can further be broken down to needed insights and, together with workflow orders, the in-tentions or actions of the system. The insights and actions can then be used to define the needed sensor data and actuator controls. For instance, in a lo-gistics use case, a workflow order can request that a number of products be delivered to a certain subset of retail-ers within a specified deadline to keep shortage risk under the agreed levels.

The KPIs and workflow orders en-capsulate information that allows the extraction of inputs to task planning, controllers, and MOO, which also includes the necessary information

from the insight generation func-tional domain. For task planning, the extracted inputs should correspond to goal states that can be used to compute an appropriate plan.

For controllers, workflow orders might specify new set levels of pa-rameters or rules. For multiobjective optimizers, workflow orders should specify a set of KPIs to be balanced by automated tradeoff analysis to comply to overall service objectives as well as mitigating conflicts.

IoT is about the digital representa-tion of the physical world to enable the digitalization and servitization of physical assets or entities of interest. Since the application spread in to-day’s IoT is wide and is typically structured in market-oriented groups, a system designer needs IoT system design patterns to assist in designing for scalable and replicable solutions. The work presented here provides a generic blueprint for designers to jumpstart the design process of an unknown use case.

References 1. N. Rozanski and E. Woods, Software

Systems Architecture: Working with

Stakeholders Using Viewpoints and

Perspectives, 2nd ed., Addison-Wesley,

2011.

2. ETSI, oneM2M Use Case Collection,

ETSI TR118501v1.0.0, tech. report,

2015; www.etsi.org/deliver/etsi_tr

/118500_118599/118501/01.00.00_60

/tr_118501v010000p.pdf.

3. Nat’l Inst. of Standards and Tech-

nology, Big Data Interoperability

Framework: Volume 3, Use Cases and

General Requirements, NIST Special

Publication 1500-3, 2015; http://dx.doi

.org/10.6028/NIST.SP.1500-3.

4. R.A. Martin and A. Soellinger, “The

Emerging IIC Verticals Taxonomy Land-

scape,” IIC J. Innovation, June 2016;

Page 27: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

www.computer.org/computingedge 25JULY/AUGUST 2017 71

www.iiconsortium.org/news/joi

-articles/2016-June-The-Emerging-IIC

-Verticals-Taxonomy-Landscape.pdf.

5. OpenFog Consortium, OpenFog Refer-

ence Architecture for Fog Computing,

tech. report OPFRA001.020817, 2017;

www.openfogconsortium.org/ra.

6. J. Lewis and M. Fowler, “Microser-

vices: A Definition of This New Archi-

tectural Term,” MartinFowler.com,

25 Mar. 2014; https://martinfowler

.com/articles/microservices.html.

7. M. Serrano et. al., IoT Semantic

Interoperability: Research Challenges,

Best Practices, Recommendations and

Next Steps,” European Research Clus-

ter on the Internet of Things (IERC),

2015; www.internet-of-things-research

.eu/pdf/IERC_Position_Paper_IoT

_Semantic_Interoperability_Final.pdf.

8. EPC Information Services (EPCIS)

Standard, release 1.2, GS1, 2016; http://

www.gs1.org/sites/default/files/docs/epc

/EPCIS-Standard-1.2-r-2016-09-29.pdf.

Jan Höller is a research fellow at Ericsson

Research, Sweden. His research interests in-

clude industrial Internet of Things systems,

digital transformation, and machine intel-

ligence in autonomous systems. Höller has

an MSc in engineering physics from Lund

Institute of Technology. He serves on the

Board of Directors of the IP for Smart Ob-

jects Alliance. Contact him at jan.holler@

ericsson.com.

Vlasios Tsiatsis is a senior researcher at Er-

icsson Research, Sweden, and an Internet

of Things architect. His research interests

include IoT, cloud, and analytics security.

Tsiatsis has a PhD in electrical engineering

from the University of California, Los Ange-

les. He is a member of IEEE and ACM. Con-

tact him at [email protected].

Cathy Mulligan is a research fellow at

Imperial College London and vice chair

for ETSI Industry Specification Group for

Context Information Management. Her re-

search interests include digital technolo-

gies and its impact on industrial structures.

Mulligan has a PhD in engineering from

the University of Cambridge. She is a mem-

ber of IEEE, IET, and ACM. Contact her at

[email protected].

Read your subscriptions through the myCS publications portal at

http://mycs.computer.org

Take the CS Library wherever you go!

IEEE Computer Society magazines and Transactions are now available to subscribers in the portable ePub format.

Just download the articles from the IEEE Computer Society Digital Library, and you can read them on any device that supports ePub. For more information, including a list of compatible devices, visit

www.computer.org/epub

70 IEEE INTELLIGENT SYSTEMS

can be applied to a variety of prob-lems such as route planning of au-tonomous vehicles, optimization of a logistics flows, and automation of field personnel.

The planning problem is normally represented by three key elements—states, actions, and goals. State iden-tifies the model of the world, actions represent different operations that af-fect the system’s state, and goals are states to achieve or maintain. Deriv-ing the task plan is to take the cur-rent state, the desired state and the possible actions and from that gener-ate a plan as a sequence of possible or proposed actions. A plan can also be a partially ordered list of tasks. One possible way to perform task plan-ning is using AI planners, where the world and the problem are modeled using a planning domain definition language (PDDL).

Multiobjective OptimizationAutomating complex system opera-tions by leveraging data-driven strat-egies designed to analyze alternatives under multiple conflicting views or KPIs is challenging. First, KPI evalua-tions are not always reliable and might be subject to changes over time; sec-ond, the costs incurred in adapting solutions under operation must be ac-counted for. In such cases, it is difficult to track how the underlying tradeoffs (such as return versus risk or through-put versus cost) will evolve over time, and decision-making preferences are hard to elicit and represent computa-tionally. In the absence of clear pref-erences and priorities over the KPIs, general problem-solving strategies and architectures must be designed for au-tomating general data-driven multiob-jective opti mization (MOO) systems under uncertainty.

MOO can play a key role in appli-cations where conflict resolution is ex-pected. For instance, in supply-chain

control applications, the proposed sys-tem can monitor the profitability for the whole chain as well as the overall product shortage risk. Those two KPIs are clearly in conflict as optimization at an extreme for one results in a risk for the other.

A key difference between task plan-ning and optimization is that in the latter does not assume that desired goal states will be input by the system stakeholders. This stems from the fact that it can be impossible for humans to cope with the underlying complex-ity of explicitly specifying goal states while simultaneously fulfilling all ser-vice-level objectives (SLOs). In such cases, it is possible to leverage simu-lation-based MOO to automatically explore the space of all candidate goal states that not only fulfill all SLOs but actually surpass them and deliver out-standing performance.

Service Level Objectives and Workflow ManagementThe end user’s interests in the sys-tem can be specified as a set of high-level, quantifiable performance met-rics by SLOs and workflow orders. SLOs are translated into KPIs, which are deemed critical for verifying ser-vice execution and detecting devia-tions from SLOs. KPIs can further be broken down to needed insights and, together with workflow orders, the in-tentions or actions of the system. The insights and actions can then be used to define the needed sensor data and actuator controls. For instance, in a lo-gistics use case, a workflow order can request that a number of products be delivered to a certain subset of retail-ers within a specified deadline to keep shortage risk under the agreed levels.

The KPIs and workflow orders en-capsulate information that allows the extraction of inputs to task planning, controllers, and MOO, which also includes the necessary information

from the insight generation func-tional domain. For task planning, the extracted inputs should correspond to goal states that can be used to compute an appropriate plan.

For controllers, workflow orders might specify new set levels of pa-rameters or rules. For multiobjective optimizers, workflow orders should specify a set of KPIs to be balanced by automated tradeoff analysis to comply to overall service objectives as well as mitigating conflicts.

IoT is about the digital representa-tion of the physical world to enable the digitalization and servitization of physical assets or entities of interest. Since the application spread in to-day’s IoT is wide and is typically structured in market-oriented groups, a system designer needs IoT system design patterns to assist in designing for scalable and replicable solutions. The work presented here provides a generic blueprint for designers to jumpstart the design process of an unknown use case.

References 1. N. Rozanski and E. Woods, Software

Systems Architecture: Working with

Stakeholders Using Viewpoints and

Perspectives, 2nd ed., Addison-Wesley,

2011.

2. ETSI, oneM2M Use Case Collection,

ETSI TR118501v1.0.0, tech. report,

2015; www.etsi.org/deliver/etsi_tr

/118500_118599/118501/01.00.00_60

/tr_118501v010000p.pdf.

3. Nat’l Inst. of Standards and Tech-

nology, Big Data Interoperability

Framework: Volume 3, Use Cases and

General Requirements, NIST Special

Publication 1500-3, 2015; http://dx.doi

.org/10.6028/NIST.SP.1500-3.

4. R.A. Martin and A. Soellinger, “The

Emerging IIC Verticals Taxonomy Land-

scape,” IIC J. Innovation, June 2016;

This article originally appeared in IEEE Intelligent Systems, vol. 32, no. 4, 2017.

IEEE WORLD CONGRESS ON SERVICES 20198–13 July 2019 • University of Milan • Milan, Italy

conferences.computer.org/services/2019Register Now

Engage, Learn, and Connect at IEEE SERVICES 2019— The leading technical forum covering services computing and applications, as well as service software technologies, for building and delivering innovative industry solutions.

■ IEEE International Congress on Big Data (BigData Congress 2019)

■ IEEE International Conference on Cloud Computing (CLOUD 2019)

■ IEEE International Conference on Edge Computing (EDGE 2019)

■ IEEE International Conference on Cognitive Computing (ICCC 2019)

■ IEEE International Congress on Internet of Things (ICIOT 2019)

■ IEEE International Conference on Web Services (ICWS 2019)

■ IEEE International Conference on Services Computing (SCC 2019)

■ Plus two additional signature symposia on future digital health services and future fi nancial services

Don’t miss IEEE SERVICES 2019—the ONLY services conference that publishes its proceedings in the IEEE Xplore digital library—where the brightest minds converge for service computing’s latest developments and breakthroughs.

Page 28: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

26 May 2019 Published by the IEEE Computer Society 2469-7087/19/$33.00 © 2019 IEEE104 C O M P U T E R P U B L I S H E D B Y T H E I E E E C O M P U T E R S O C I E T Y 0 0 1 8 - 9 1 6 2 / 1 8 / $ 3 3 . 0 0 © 2 0 1 8 I E E E

EDITOR BRIAN DAVID JOHNSON Frost and Sullivan; [email protected] FUTURE TODAY

Self-Managing Real EstateNathan Shedro� , Seed Vault Ltd.

Blockchain is poised to make a sea change

in just about every industry and business,

even real estate.

Remember that folder with all the important papers related to your house? You know, the one with your mortgage and

insurance documents, the foundation repair bill, the estimate to redo the electrical for that home theater, and the map showing that your neighbor’s driveway is actually 2 ft. on your side of the property line? Very soon, a new technology called blockchain might allow the house itself to track what happens to it, so that you (and subse-quent owners) don’t miss anything. In fact, blockchain is poised to make a sea change in just about every industry and business.

Blockchain is an open, peer-to-peer (meaning shared) ledger of transac-tions. It’s accounting, but the ledger doesn’t live in a central place—it’s distributed and supported by every-one’s systems. So to authenticate a transaction, more than one node has to “see” the transaction occur and agree that it’s accurate. Only then is the transaction added to the ledger. Once the block (transaction page) is � lled, it’s permanently recorded, and a new block is started. The block can’t be changed once it’s veri� ed—it’s part of the permanent record. This means that every single transaction can be

retrieved forever, creating a radical new kind of transparency. And every-one should be considering how such transparency will a� ect their business and their industry.

But back to your house. Blockchain technologies are governed by software code called smart contracts. Think of this code as self-running rules that automate all of the processes. If de-signed correctly, a business can prac-tically manage itself based on the self-running code.

Therefore, blockchain technology could enable your house to manage its own transactions. It’s not going to call the plumber—yet—but it could manage all of the those documents. Sometime in the next 10 years, rather than relying on a real estate agent or current owner to share the provenance of a property you might be able to sub-mit a query and get a report on every transaction for a house or condo: ev-ery repair, change of hands, valuation estimate, tax assessment, redistrict-ing, construction document, and lien. You’ll no longer wonder whether that house is built on an old burial ground or whether the agent failed to mention the meth lab the past owners oper-ated. The blockchain record will tell you, and you’ll be able to trust it. And

the house will continue collecting and recording this information through a network of blockchain-enabled ser-vices, including identity, storage, and transaction tokens. Your home and its relationships will be recorded for all to see, which might be liberating or creepy—or both.

We don’t normally think of ob-jects as having agency (be-ing entitled to act and make

decisions for themselves), though we all know they have a history. This � rst step is an extension of that his-tory: making it visible to all. The next step—giving objects autonomy—is the subject for another column entirely.

NATHAN SHEDROFF is executive

director of the non-profi t Seed Vault

Ltd., an independent bot blockchain

community. Contact him at nathan@

nathan.com.

Read your subscriptions through the myCS publications portal at

http://mycs.computer.org

WWW.COMPUTER.ORG

/COMPUTER

r1fut.indd 104 12/29/17 1:33 PM

This article originally appeared in Computer, vol. 51, no. 1, 2018.

Page 29: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

2469-7087/19/$33.00 © 2019 IEEE Published by the IEEE Computer Society May 2019 27

COLUMN: IT TRENDS

Blockchain in Developing Countries

A large portion of the population in the developing world can benefit from blockchain technologies. According to the ICT Facts and Figures 2017 report, 42.9 percent of households in developing countries have Internet access.1 This percentage is rising quickly due to the increasing affordability and usability of smartphones. It can be argued that in many ways, blockchain has a much higher value proposition for the developing world than for the developed world. Why? Because blockchain has the potential to make up for a lack of effective formal institutions—rules, laws, regulations, and their enforcement. In this article, we will discuss key concerns regarding institutions in the developing world and evaluate

the potential use of blockchain to address them.

PROPERTY RIGHTS According to a 2011 UN report, weak governance led to corruption in land occupancy and administration in more than 61 countries. Corruption varied from small-scale bribes to the abuse of government power at the national, state, and local levels.2

Enforcement of property rights incentivizes investment and provides resources to avoid poverty. Agreed-upon property rights allow entrepreneurs to use the assets as collateral and thus increase their access to capital. However, a large proportion of the poor lack property rights.

Around 90 percent of land is undocumented or unregistered in rural Africa. Likewise, a lack of land ownership remains among the barriers to entrepreneurship and economic development in India.3 One estimate suggests that more than 20 million rural families in India do not own land and millions more lack legal ownership of the land where they have built houses and worked.4 Landlessness is arguably a more powerful predictor of poverty in India than caste or illiteracy.4 In addition, according to the United States Agency for International Development (USAID), only 14 percent of Hondurans legally own their properties. Among those properties that are occupied legally, only 30 percent are registered.5

It is not uncommon for government officials to alter titles of registered properties, and there are cases where government officials have allocated properties with altered titles to themselves. Bureaucrats have reportedly altered titles and registered beachfront properties for themselves,6 and have allegedly accepted bribes in exchange for property titles. Citizens often lack access to records, and those records that are accessible might provide conflicting information. Property owners are often unable to defend themselves against infringement of property usage and mineral rights.7

Nir Kshetri University of North Carolina at Greensboro

Jeffrey Voas IEEE Fellow

Editor: Jeffrey Voas, NIST; [email protected]

11IT Professional Published by the IEEE Computer Society

1520-9202/18/$33.00 ©2018 IEEEMarch/April 2018

Page 30: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

28 ComputingEdge May 2019

IT PROFESSIONAL

Blockchain can reduce friction and conflict, as well as the costs associated with property registration. It is possible to do all or most of the processing using smartphones.8 Given this, it is encouraging that various initiatives have been undertaken. The US-based platform for real-estate registration, Bitland, announced the introduction of a blockchain-based land registry system in Ghana, where 78 percent of land is unregistered.9 There is a long backlog of land-dispute cases in Ghanaian courts.10 Bitland records transactions securely, with GPS coordinates, written descriptions, and satellite photos. This and similar processes are expected to guarantee property rights and reduce corrupt practices. As of mid-2016, 24 communities in Ghana had expressed interest in the project.9 Bitland is planning to expand to Nigeria in collaboration with the OPEC Fund for International Development.11

The bitcoin company BitFury and the Georgian government signed a deal to develop a system for registering land titles using blockchain.12 Currently, to buy or sell land in Georgia, the buyer and the seller must use public registry. They will pay between $50 and $200, depending on the speed with which they want the transaction notarized. This pilot blockchain project will move the registry process to blockchain. The costs for the buyer and the seller is now expected to be in $.05-$.10 range.13

In 2017, India’s Telangana and Andhra Pradesh states announced plans to use blockchain for land registry. Telangana started a land registry pilot project in the capital city of Hyderabad. It was reported in September 2017 that a complete rollout of the program in Hyderabad and nearby areas would take place within a year.14 In October 2017, the Andhra Pradesh government collaborated with a Swedish start-up, ChromaWay, to create a blockchain-based land registry system for the planned city of Amaravati.15

CONTROLLING CORRUPTION Blockchain creates a tamper-proof digital ledger of transactions and shares the ledger, thus offering transparency. Cryptography allows for access to add to the ledger securely. It is extremely difficult—if not impossible—to change or remove data recorded on a ledger. With this feature, blockchain makes it possible to reduce or eliminate integrity violations such as fraud and corruption while also reducing transaction costs.

As an example, the use of fake export invoices to disguise cross-border capital flows has been pervasive in China. During April to September of 2014, $10 billion worth of fake trade transactions were discovered.16 Major fraud cases occurred at the Qingdao port, where companies had used fake receipts to secure multiple loans against a single cargo of metal.17 The Qingdao incident involved 300,000 tons of alumina, 20,000 tons of copper, and 80,000 tons of aluminum ingots.16 As a result, Chinese banks charge higher interest rates and are less likely to offer collateral-based financing.17 Blockchain can thwart such scandals.

Blockchain also makes it possible to generate smart (“tagged”) property and control it with smart contracts.18 Examples of such properties include physical property (car, house, container of metal) as well as nonphysical property (shares in a company).19 Blockchain-based smart properties only undergo actions based on the information published in a smart contract.18 If property is being used as collateral, the smart contract might not allow the owner to extend the same property as a collateral or security to another bank. Thus, the process of verifying collateral prior to the loan being made is greatly simplified for custodians.20 Here, a trusted trading system is created for smart properties, making credit more readily available and cheaper.19

DISADVANTAGED GROUPS Blockchain might also help refugees and displaced persons. Current systems that offer aid to refugees and displaced persons suffer from inefficiency, fraud, and gross misallocations of resources. For instance, fees and costs account for up to 3.5 percent of an aid transaction. Moreover, an estimated 30 percent of development funds fail to reach the intended recipients due to third-party theft, mismanagement, and other problems.21

12March/April 2018

Page 31: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

www.computer.org/computingedge 29

IT TRENDS

Various blockchain-based solutions to such problems now exist. For example, blockchain can empower donors by ensuring that their donations reach the intended recipients. For instance, donors can buy electricity for South African schools using bitcoin. A blockchain-enabled smart meter makes it possible to send money directly to the meter, and there are no organizations involved to redistribute funds. Donors can also track the electricity being consumed by schools and calculate the amount of power their donations provide.22 This program was launched by South African bitcoin startup Bankymoon via a crowdfunding platform.23

The UN’s World Food Program (WFP) has used blockchain to help refugees. Money is paid directly to the merchants instead of the recipients. No banks are involved—beneficiaries receive goods directly from the merchants.24 In early 2017, WFP launched the first stage of what it calls Building Blocks, giving food and cash assistance to needy families in Pakistan’s Sindh province. An Internet-connected smartphone authenticates and records payments from the UN agency to food vendors, ensuring the recipients got the expected help, the merchants got paid, and the agency could keep a watchful eye on the money.

Starting in May 2017, WFP started distributing food vouchers in Jordan’s refugee camps by delivering cryptographically unique coupons to participating camp supermarkets. Supermarket cashiers were equipped with iris scanners to identify the beneficiaries and settle payments (UN databases verify biometric data about refugees). Building Blocks’ ledger records the transactions on a private version of ethereum (a cryptocurrency). WFP reported that by October 2017, it had distributed $1.4 million in food vouchers to 10,500 Syrian refugees in Jordan.25 WFP expects blockchain to reduce its overhead costs from 3.5 percent to less than 1 percent and to hasten aid to remote or disaster-struck areas (where ATMs might not exist or banks are not functioning normally). Blockchain currency can even replace scarce local cash, allowing aid organizations, residents, and merchants to exchange money quickly and electronically.

SUMMARY Blockchain will positively affect developing countries: it can help reduce fraud and corruption and increase legal property titles, which provides entrepreneurial initiatives to the world’s poorest. It can also help financial transactions take place more quickly and ensure that aid is distributed with a smaller chance of theft and fraud.

REFERENCES 1. ICT Facts and Figures 2017, report, International Telecommunication Union, 2017;

www.itu.int/en/ITU-D/Statistics/Documents/facts/ICTFactsFigures2017.pdf. 2. Corruption Leading to Unequal Access, Use and Distribution of Land--UN Report,

report, UN News, 2011; https://news.un.org/en/story/2011/12/397982-corruption-leading-unequal-access-use-and-distribution-land-un-report#.WEMpP33QCWl.

3. N. Kshetri, “Fostering Startup Ecosystems in India,” Asian Research Policy, vol. 7, no. 1, 2016, pp. 94–103.

4. T. Hanstand, “The Case for Land Reform in India,” Foreign Affairs, blog, 2013; www.foreignaffairs.com/articles/india/2013-02-19/untitled?cid=soc-twitter-in-snapshots-untitled-022013.

5. USAID Country Profile: Honduras, report, USAID, 2016; https://usaidlandtenure.net/wp-content/uploads/2016/09/USAID_Land_Tenure_Honduras_Profile_0.pdf.

6. T. Puiu, “How Bitcoin’s Blockchain Could Mark an End to Corruption,” ZME Science, blog, 2015; www.zmescience.com/research/technology/bitcoin-blockchain-corruption-04232.

7. J. Jeong, “Bitcoin, Blockchain, and Land,” The Global Anticorruption Blog, blog, 2016; https://globalanticorruptionblog.com/2016/01/08/bitcoin-blockchain-and-land-reform-can-an-incorruptible-technology-cure-corruption.

8. L. Shin, “Republic of Georgia to Pilot Land Titling on Blockchain with Economist Hernando De Soto, BitFury,” Forbes, blog, 2016;

13March/April 2018

IT PROFESSIONAL

Blockchain can reduce friction and conflict, as well as the costs associated with property registration. It is possible to do all or most of the processing using smartphones.8 Given this, it is encouraging that various initiatives have been undertaken. The US-based platform for real-estate registration, Bitland, announced the introduction of a blockchain-based land registry system in Ghana, where 78 percent of land is unregistered.9 There is a long backlog of land-dispute cases in Ghanaian courts.10 Bitland records transactions securely, with GPS coordinates, written descriptions, and satellite photos. This and similar processes are expected to guarantee property rights and reduce corrupt practices. As of mid-2016, 24 communities in Ghana had expressed interest in the project.9 Bitland is planning to expand to Nigeria in collaboration with the OPEC Fund for International Development.11

The bitcoin company BitFury and the Georgian government signed a deal to develop a system for registering land titles using blockchain.12 Currently, to buy or sell land in Georgia, the buyer and the seller must use public registry. They will pay between $50 and $200, depending on the speed with which they want the transaction notarized. This pilot blockchain project will move the registry process to blockchain. The costs for the buyer and the seller is now expected to be in $.05-$.10 range.13

In 2017, India’s Telangana and Andhra Pradesh states announced plans to use blockchain for land registry. Telangana started a land registry pilot project in the capital city of Hyderabad. It was reported in September 2017 that a complete rollout of the program in Hyderabad and nearby areas would take place within a year.14 In October 2017, the Andhra Pradesh government collaborated with a Swedish start-up, ChromaWay, to create a blockchain-based land registry system for the planned city of Amaravati.15

CONTROLLING CORRUPTION Blockchain creates a tamper-proof digital ledger of transactions and shares the ledger, thus offering transparency. Cryptography allows for access to add to the ledger securely. It is extremely difficult—if not impossible—to change or remove data recorded on a ledger. With this feature, blockchain makes it possible to reduce or eliminate integrity violations such as fraud and corruption while also reducing transaction costs.

As an example, the use of fake export invoices to disguise cross-border capital flows has been pervasive in China. During April to September of 2014, $10 billion worth of fake trade transactions were discovered.16 Major fraud cases occurred at the Qingdao port, where companies had used fake receipts to secure multiple loans against a single cargo of metal.17 The Qingdao incident involved 300,000 tons of alumina, 20,000 tons of copper, and 80,000 tons of aluminum ingots.16 As a result, Chinese banks charge higher interest rates and are less likely to offer collateral-based financing.17 Blockchain can thwart such scandals.

Blockchain also makes it possible to generate smart (“tagged”) property and control it with smart contracts.18 Examples of such properties include physical property (car, house, container of metal) as well as nonphysical property (shares in a company).19 Blockchain-based smart properties only undergo actions based on the information published in a smart contract.18 If property is being used as collateral, the smart contract might not allow the owner to extend the same property as a collateral or security to another bank. Thus, the process of verifying collateral prior to the loan being made is greatly simplified for custodians.20 Here, a trusted trading system is created for smart properties, making credit more readily available and cheaper.19

DISADVANTAGED GROUPS Blockchain might also help refugees and displaced persons. Current systems that offer aid to refugees and displaced persons suffer from inefficiency, fraud, and gross misallocations of resources. For instance, fees and costs account for up to 3.5 percent of an aid transaction. Moreover, an estimated 30 percent of development funds fail to reach the intended recipients due to third-party theft, mismanagement, and other problems.21

12March/April 2018

Page 32: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

30 ComputingEdge May 2019

IT PROFESSIONAL

www.forbes.com/sites/laurashin/2016/04/21/republic-of-georgia-to-pilot-land-titling-on-blockchain-with-economist-hernando-de-soto-bitfury.

9. O. Ogundeji, “Land Registry Based on Blockchain for Africa,” IT Web Africa, blog, 2016; www.itwebafrica.com/enterprise-solutions/505-africa/236272-land-registry-based-on-blockchain-for-africa.

10. A. Jones, “How Blockchain Is Impacting Industry,” International Banker, blog, 2016; https://internationalbanker.com/finance/blockchain-impacting-industry.

11. “Bitland Partners with CCEDK to Improve Blockchain Land Registry in West Africa,” EconoTimes, blog, 2016; www.econotimes.com/Bitland-partners-with-CCEDK-to-improve-blockchain-land-registry-in-West-Africa-271517.

12. S. Higgins, “Republic of Georgia to Develop Blockchain Land Registry,” Coindesk, blog, 2016; www.coindesk.com/bitfury-working-with-georgian-government-on-blockchain-land-registry.

13. S. Higgins, “Survey: Blockchain Capital Markets Spending to Reach $1 Billion in 2016,” Coindesk, blog, 2016; www.coindesk.com/capital-markets-1-billion-2016-blockchain.

14. “Indian State Plans to Store Citizen Data on a Blockchain,” CCN, blog, 2017; www.ccn.com/indian-state-plans-blockchain-storage-citizen-data.

15. “Leveraging Blockchain for the Real Estate Industry,” Lawfuel, blog, 2017; www.lawfuel.com/blog/leveraging-blockchain-real-estate-industry.

16. S. Shengxia, “China Uncovers $10b Worth of Falsified Trade,” Global Times, blog, 2014; www.globaltimes.cn/content/883512.shtml.

17. P. Smyth, Blockchain Technology: 7 Ways Blockchain Technology Could Disrupt the Post-Trade Ecosystem, white paper, Kynetix, 2015; www.the-blockchain.com/docs/Seven%20ways%20the%20Blockchain%20can%20change%20the%20trade%20system.pdf.

18. K. Bheemaiah, “Block Chain 2.0: The Renaissance of Money,” Wired, blog, 2015; www.wired.com/insights/2015/01/block-chain-2-0.

19. A. Mizrahi, A Blockchain-Based Property Ownership Recording System, ChromaWay, 2016; https://chromaway.com/papers/A-blockchain-based-property-registry.pdf.

20. M.A. Calandra Jr. et al., Blockchain Technology, Finance and Securitization, blog, Alston & Bird, 2016; www.alston.com/-/media/files/insights/publications/2016/06/ifinance-and-financial-services--products-advisory/files/view-advisory-as-pdf/fileattachment/161075-blockchain-technology2.pdf.

21. B. Paynter, “How Blockchain Could Transform the Way International Aid Is Distributed,” Fast Company, blog, 2017; www.fastcompany.com/40457354/how-blockchain-could-transform-the-way-international-aid-is-distributed.

22. S. Higgins, “How Bitcoin Brought Electricity to a South African School,” Coindesk, blog, 2016; www.coindesk.com/south-african-primary-school-blockchain.

23. G. Mulligan, “5 African Crowdfunding Startups to Watch,” Disrupt Africa, blog, 2015; http://disrupt-africa.com/2015/11/5-african-crowdfunding-startups-to-watch.

24. N. Menezes, “UN Uses Ethereum to Distribute Funds to Jordanians,” BTCManager.com, blog, 2017; https://btcmanager.com/un-uses-ethereum-to-distribute-funds-to-jordanians.

25. J.I. Wong, “The UN Is Using Ethereum’s Technology to Fund Food for Thousands of Refugees,” Quartz, blog, 2017; https://qz.com/1118743/world-food-programmes-ethereum-based-blockchain-for-syrian-refugees-in-jordan.

ABOUT THE AUTHORS Nir Kshetri is a professor of management at the Bryan School of Business and Economics, University of North Carolina at Greensboro. Contact him at [email protected].

Jeffrey Voas is an IEEE Fellow. Contact him at [email protected].

14March/April 2018

This article originally appeared in IT Professional, vol. 20, no. 2, 2018.

Page 33: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

2469-7087/19/$33.00 © 2019 IEEE Published by the IEEE Computer Society May 2019 31

COLUMN: IT TRENDS

Emoji: Lingua Franca or Passing Fancy?

Many express awe over the creative use of emoji. Others

distain the perceived dissolution of proper English.

Yet others fully embrace the free expression of

emotions that emoji enable , while some are infuriated

by the wanton devolution of culture exemplified by

such primitive drawings. Many, however, remain indifferent.

Emoji are not new. The humble emoji, as a pictogram, a pictorial representation of an object, or an ideogram (a symbolic representation of a more abstract concept), enjoys a rather long heritage. One could argue that symbolic visualization extends back to prehistoric cave drawings.1

Legendary tribal norms, however, were mostly conveyed by aural means. Starting around 3200 BC, specially selected and educated scribes began etching Egyptian hieroglyphics into stone depicting nobility, conquests, and mysticism. Around the same time, the Sumerian cuneiform emerged as a pictographic script. It morphed over centuries to a more symbolic form of expression. Chinese calligraphy originated around 1200 BC as pictographic script. Around the same time, early pictograms predated the Aztec culture in Mesoamerica with its distinctive illustrative style of writing. In medieval times, educated monks scribed illuminated manuscripts, combining symbolic visual artistry with the written word to preserve religious history on paper. The hybrid visual rebus, also mixing emoji-like illustration with words, often in the form of visual puzzles, also enjoyed growing popularity.

Along the way, symbolic alphabets eventually enabled printing. Once in print, linear strings of symbols rapidly led to universal literacy-based education. After Gutenberg in 1450, knowledge became reproducible, portable, and essential. Printing, the very notion of linearity as reinforced by Newtonian physics, eventually led to production lines. Industrialized economies followed. Eventually, radio reopened aural space and television re-opened visual kinetics. In a short period of relative time, attention shifted from mass production to mass media starting around 1900 and culminating in the dynamic World Wide Web by 1999.

In response, post-modernism elevated consumerism to artfulness in the later 1900s. The smiley face pin became an overnight cultural icon in 1963. Around 1982, emoticons, the use of fonts to form facsimiles of human expression, became vogue. These font combinations conveyed emotion into otherwise dull texts. Influenced by Japanese graphics, Shigetaka Kurita first created the emoji in 1999. It burst quickly onto the Internet. Figure 1 loosely traces this long tail of visual language in human communications, leading to today’s comic-inspired emoji.

George F. Hurlburt STEMCorp, Inc.

Editor: Jeffrey Voas, NIST; [email protected]

Page 34: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

32 ComputingEdge May 2019

IT PROFESSIONAL

Figure 1. A conceptual timeline leading to the emergence of the emoji.

While emoji have a long heritage, they are also clearly a product of the digital age. They are now largely standardized into some 1,644 icons in the Unicode Emoji Version 11.0 released on June 5, 2018 (https://unicode.org/emoji/charts/full-emoji-list.html). Thus, they can be quickly produced via keystroke with no need for hand drawing. Using pictograms and ideograms, they frequently convey both thought and emotion. Emoji even follow loose syntax and grammatical rules. This suggests some degree of competence, perhaps even emoji literacy, to become a truly effective emoji communicator.2 This gives rise to the question: Might emoji become the new lingua franca of the Internet?

A NEW FORM OF EXPRESSION? Some might agree that emoji is becoming the new universal language of Marshall McLuhan’s “global village.” For example, the Oxford Dictionary declared the “face with tears of joy” emoji

as its “Word of the Year” in 2015 (https://en.oxforddictionaries.com/word-of-the-year/word-of-the-year-2015). This is in recognition of the widespread global acceptance of the emoji as a popular means of expressing ideas and sentiment in an otherwise dry world of emotionless technocratic prose. The fact that a robust Unicode standard exists for emoji further reinforces a sense of universality. The need for maximum compression in Tweets, social media, text messages, and other digital media strongly encourages an economy of characters needed to express basic concepts. Whereas alphabets provide a finite set of characters to express any idea, many characters must be combined to do so. Emoji, at 144 pixels and 18 bytes, easily replace costly words with far greater economy.

Advertisers, quick to pick up on trends, regularly target Internet users with hip emoji messages. The level of monetization even extends to the service economy where employees are encouraged to quite literally present a smiley face to their clients, much less to cope emotionally in an otherwise insensitive world.3 Emoji appear to have “staying power” as an enduring visual code. Below is a list of a number of useful emoji-related websites.

• Unicode Emoji Standard V 11.0: https://unicode.org/emoji/charts/full-emoji-list.html • Real-Time Twitter Emoji Usage Tracker: http://emojitracker.com

Page 35: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

www.computer.org/computingedge 33

IT TRENDS

• Real-Time IOS Emoji Usage Tracker: http://www.emojistats.org • Emoji Encyclopedia: https://emojipedia.org • MIT NLP & AI-Based Sentiment Analysis: https://deepmoji.mit.edu • Popular Emoji Grams: https://emojisaurus.com • Personalized Emojis: https://www.bitmoji.com • Moby Dick in Emoji: http://www.emojidick.com • Worldwide Use of Emoji: http://nlp.ffzg.hr/data/emoji-atlas • Emoji Statistics: https://worldemojiday.com/statistics

Intended meanings of many emoji, however, can too easily be misconstrued. While the Unicode standard defines “core emoji,” many more (less well-defined) emoji continue to emerge daily worldwide. Soon a set of scientific emoji are poised to appear. This leads to a bit of a tower of Babel situation, as emoji are often culturally or contextually dependent. In fact, cultures with varying economic descriptors as defined by the Hofstede Culture Index are liable to use emoji differently to describe their particular relationship to the world. For example, people from countries with high uncertainty-avoidance scores tend to disfavor emoji that express positive emotion.4 Moreover, the same emoji might carry different meanings as determined by the culture where it is being used.

While the Unicode standard for emoji tends to reinforce meaning, there are at least 17 different proprietary platform-based fonts in place that significantly render the same Unicode emoji differently. The Unicode site (https://unicode.org/emoji/charts/full-emoji-list.html) shows 11 different platform-based renderings of standard emoji. Thus, a given standard Unicode emoji can appear differently on iOS than it does on an Android device. This leads to statistically different interpretations of both sentiment and meaning when specific standard emoji codes cross platforms. Nonetheless, variation in interpretation also occurs within the same platform, although to a lesser degree.5

The rather generalized lack of commonality in emoji interpretation suggests that emoji are actually less than a universal form of expression. As noted, cultural influences, context, and symbolic variation can potentially compromise intended meaning. Worse, it would appear that emoji are less than a complete form of expression.

Standardized emoji codes do not really exist for personal pronouns or most intransitive verbs. This limits the expressiveness of the language, while simultaneously opening the door for creativity in usage among various user cliques. It is the case, however, that volunteers using Amazon’s Mechanical Turk encoded the entire text of Melville’s Moby Dick into a book entitled Emoji Dick. Moby Dick's iconic first sentence, “Call me Ishmael,” was emoji encoded as follows:

Figure 2. The first sentence of Moby Dick in emoji.

While clearly a period novel, the use of a telephone (a nonexistent item in the time of the novel) induces a form of contextual irony. Likewise, Alice in Wonderland, a rebus-friendly text by the intent of author Lewis Carroll, has also been translated fully into emoji. In both cases, however, the level of effort necessary to successfully navigate these annotated texts exceeds the ability of most readers. Emoji datasets, while highly creative, become highly subjective, induce repetition, and become exceedingly difficult to contextualize.6 In other cases, multiple emoji must be creatively combined to suggest common items. For example, “sweetheart” might be written as a piece of candy next to a heart, hardly a literal translation.

The same emoji

might carry different

meanings as

determined by the

culture where it is

being used.

IT PROFESSIONAL

Figure 1. A conceptual timeline leading to the emergence of the emoji.

While emoji have a long heritage, they are also clearly a product of the digital age. They are now largely standardized into some 1,644 icons in the Unicode Emoji Version 11.0 released on June 5, 2018 (https://unicode.org/emoji/charts/full-emoji-list.html). Thus, they can be quickly produced via keystroke with no need for hand drawing. Using pictograms and ideograms, they frequently convey both thought and emotion. Emoji even follow loose syntax and grammatical rules. This suggests some degree of competence, perhaps even emoji literacy, to become a truly effective emoji communicator.2 This gives rise to the question: Might emoji become the new lingua franca of the Internet?

A NEW FORM OF EXPRESSION? Some might agree that emoji is becoming the new universal language of Marshall McLuhan’s “global village.” For example, the Oxford Dictionary declared the “face with tears of joy” emoji

as its “Word of the Year” in 2015 (https://en.oxforddictionaries.com/word-of-the-year/word-of-the-year-2015). This is in recognition of the widespread global acceptance of the emoji as a popular means of expressing ideas and sentiment in an otherwise dry world of emotionless technocratic prose. The fact that a robust Unicode standard exists for emoji further reinforces a sense of universality. The need for maximum compression in Tweets, social media, text messages, and other digital media strongly encourages an economy of characters needed to express basic concepts. Whereas alphabets provide a finite set of characters to express any idea, many characters must be combined to do so. Emoji, at 144 pixels and 18 bytes, easily replace costly words with far greater economy.

Advertisers, quick to pick up on trends, regularly target Internet users with hip emoji messages. The level of monetization even extends to the service economy where employees are encouraged to quite literally present a smiley face to their clients, much less to cope emotionally in an otherwise insensitive world.3 Emoji appear to have “staying power” as an enduring visual code. Below is a list of a number of useful emoji-related websites.

• Unicode Emoji Standard V 11.0: https://unicode.org/emoji/charts/full-emoji-list.html • Real-Time Twitter Emoji Usage Tracker: http://emojitracker.com

Page 36: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

34 ComputingEdge May 2019

IT PROFESSIONAL

Ultimately, emoji are technically oriented. As such, they are driven by advancing technology. Thus, as natural language processing (NLP) and artificial intelligence (AI) join forces to reinforce the effectiveness of vocal interaction, emoji might give way to vocalized inflections. Moreover, the number of bot-generated emoji could potentially overpower human users, much like spam often overwhelms the inbox. Both trends could signal a setback for emoji advocates.

The notion of emoji as an emergent universal language seems to be limited at best. The use of emoji as a hybrid form of expression to augment regular text, however, appears to be a strong and growing possibility in a world that increasingly demands symbolic economy and some level of personalization. Together with otherwise impersonal texts, selective use of emoji sets the tone for satisfying communication. Emoji tend to defuse what otherwise might be considered offensive messages with a friendly salutation, closing, or strategically placed emoji intended to add a more conciliatory tone.

EMOJI IN A NETWORK AGE Emoji represent a network phenomenon. An analysis of an early August 2018 snapshot of the frequency of emoji usage on Twitter using the website http://emojitracker.com reveals a clear power curve relationship. Figure 3 shows this plot in the form of a vertical bar graph.

Figure 3. Distribution of 846 popular emoji on Twitter in early August 2018.

In this figure, the emoji occupying the top position was the familiar “face with tears of joy.” This emoji was invoked 2,145,510,490 times. The emoji at the last-used position, number 846, was called only 132,848 times. It was an emoji for uppercase Latin letters. The top 10 emoji were: face with tears of joy, a single heart, the recycling symbol, face with hearts for eyes, a slimmer single heart, a sad crying face, a simple happy face, a face with a furrowed brow and frown, a double heart, and a kissing face (see Figure 4).

Figure 4. Top 10 emoji on Twitter in August 2018.

Page 37: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

www.computer.org/computingedge 35

IT TRENDS

It is interesting to note that the majority of the popular emoji are positive in nature, which is in keeping with most research on the use of emoji. Other research shows that applied network science techniques outperform state-of-the art methods, including NLP for sentiment analysis.7

As noted, printing introduced a prevalent linear relationship that helped usher in an industrial age, enhancing the world’s economy. The advent of mass media, especially the Internet, awoke other sensitivities. The rise of the emoji as a popular means of visual expression suggests a return to age-honored visual space. Moreover, despite distinct cultural differences in usage, the world-wide emoji acceptance is itself significant. It represents a broad-based trend toward the reality of networked global sharing. Steeped in older linear technology models, many people fail to appreciate or perhaps even fear such openness. To some, emoji represent nothing short of a tragic fallback to primitive behaviors. Further social research along these attitudinal lines might better help further delineate growing protectionist movements in many nations.

As industrialization engaged, literacy-focused education became indispensable. Now formal education increasingly seeks creative online outlets, and traditional literacy-based instruction seems somehow outdated. Yet computer literacy continually gains credence. Importantly, the growing cost of formal higher education leaves many indebted well beyond any entry-level thresholds. Perhaps it is time to acknowledge the shift from book-borne portable personal knowledge to online networked general knowledge. Such a shift likely has a profound effect on future educational strategies. Here, new forms of digital literacy become prerequisite for future opportunity. The increased and sustained use of emoji might suggest new innovative research initiatives to help identify new educational vectors, perhaps even extending to mathematics.8

Finally, visualization is endemic. For example, most nations regulate driving behavior by varying shapes and color cues. Emoji only represents one form of the resurgence of visualization in the digital world. As a case in point, augmented reality and virtual reality are opening new perceptual doors. Graphical representation of data is also increasingly pressing. Networks of all types frequently involve large sparse matrices. The ability to visualize these diverse datasets be-comes an increasingly critical skill. Conceptualizing and constructing such graphs require new mathematical insights and new means of depicting their hidden realities accurately and convincingly. More importantly, the ability to evaluate and interpret such visual representations on their merit is equally important for an informed citizenry.

To this end, the ability to acquire visual literacy, including the use of emoji, becomes an increasingly important skill—not only for dedicated data scientists, but across virtually all the increasingly entwined domains of human knowledge.

REFERENCES 1. G. Hurlburt and J. Voas, “Storytelling: From Cave Art to Digital Media,” IT

Professional, vol. 13, no. 7, 2011, pp. 4–7. 2. M. Dansi, The Semiotics of Emoji, Bloomsbury Academic, 2017. 3. L. Stark and K. Crawford, “The Conservatism of Emoji: Work, Affect and

Communication,” Social Media + Society, vol. 1, no. 2, 2015; doi.org/10.1177/2056305115604853.

4. X. Lu et al., “Learning from the Ubiquitous Language: an Empirical Analysis of Emoji Usage of Smartphone Users,” Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp), 2015, pp. 770–780.

The increased and

sustained use of

emoji might suggest

new innovative

research initiatives

to help identify new

educational vectors,

perhaps even

extending to

mathematics.

IT PROFESSIONAL

Ultimately, emoji are technically oriented. As such, they are driven by advancing technology. Thus, as natural language processing (NLP) and artificial intelligence (AI) join forces to reinforce the effectiveness of vocal interaction, emoji might give way to vocalized inflections. Moreover, the number of bot-generated emoji could potentially overpower human users, much like spam often overwhelms the inbox. Both trends could signal a setback for emoji advocates.

The notion of emoji as an emergent universal language seems to be limited at best. The use of emoji as a hybrid form of expression to augment regular text, however, appears to be a strong and growing possibility in a world that increasingly demands symbolic economy and some level of personalization. Together with otherwise impersonal texts, selective use of emoji sets the tone for satisfying communication. Emoji tend to defuse what otherwise might be considered offensive messages with a friendly salutation, closing, or strategically placed emoji intended to add a more conciliatory tone.

EMOJI IN A NETWORK AGE Emoji represent a network phenomenon. An analysis of an early August 2018 snapshot of the frequency of emoji usage on Twitter using the website http://emojitracker.com reveals a clear power curve relationship. Figure 3 shows this plot in the form of a vertical bar graph.

Figure 3. Distribution of 846 popular emoji on Twitter in early August 2018.

In this figure, the emoji occupying the top position was the familiar “face with tears of joy.” This emoji was invoked 2,145,510,490 times. The emoji at the last-used position, number 846, was called only 132,848 times. It was an emoji for uppercase Latin letters. The top 10 emoji were: face with tears of joy, a single heart, the recycling symbol, face with hearts for eyes, a slimmer single heart, a sad crying face, a simple happy face, a face with a furrowed brow and frown, a double heart, and a kissing face (see Figure 4).

Figure 4. Top 10 emoji on Twitter in August 2018.

Page 38: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

36 ComputingEdge May 2019

IT PROFESSIONAL

5. H. Miller, J. Thebault, and I. Johnson, “'Blissfully Happy' or 'Ready to Fight': Varying Interpretations of Emoji,” 10th International Conference on Web and Social Media (ICWSM), 2016, pp. 259–268.

6. W. Radford et al., “'Call me Ishmael': How do you Translate Emoji?,” Proceedings of Australasian Language Technology Association Workshop, 2016, pp. 150–154.

7. A. Illendula and R. Yedulla, “Learning Emoji Embedding using Emoji Co-occurrence Network Graph,” International Workshop on Emoji Understanding and Applications in Social Media, pending publication, 2018; https://arxiv.org/abs/1806.07785.

8. T. McCafery and P.G. Mathews, “An Emoji Is Worth a Thousand Variables,” The Mathematics Teacher, vol. 111, no. 2, October 2017, pp. 96–102.

ABOUT THE AUTHOR George Hurlburt is chief scientist at STEMCorp, a nonprofit that works to further economic development via adoption of network science and to advance autonomous technologies as useful tools for human use. He is engaged in dynamic, graph-based IoT architecture. Hurlburt is on the editorial board of IT Professional and is a member of the board of governors of the Southern Maryland Higher Education Center. Contact him at [email protected].

This article originally appeared in IT Professional, vol. 20, no. 5, 2018.

From the analytical engine to the supercomputer, from Pascal to von Neumann, from punched cards to CD-ROMs—IEEE Annals of the History of Computing covers the breadth of computer history. � e quarterly publication is an active center for the collection and dissemination of information on historical projects and organizations, oral history activities, and international conferences.

www.computer.org/annals

Page 39: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

COMPSAC 2019 DAT A DRIVEN INTELLIGENCE

FOR A SMARTER WORLD

Hosted by Marquette University, Milwaukee, Wisconsin, USA July 15�19 www.compsac.org

In the era of "big data" there is an unprecedented increase in the amount of data collected in data warehouses. Extracting meaning and knowledge from these data is crucial for governments and businesses to support their strategic and tactical decision making. Furthermore, artificial intelligence (AI) and machine learning (ML) makes it possible for machines, processing large amounts of such data, to learn and execute tasks never before accomplished. Advances in big data-related technologies are increasing rapidly. For example, virtual assistants, smart cars, and smart home devices in the emerging Internet of Things world, can, we think, make our lives easier. But despite perceived benefits of these technologies/methodologies, there are many challenges ahead. What will be the social, cultural, and economic challenges arising from these developments? What are the technical issue related, for example, to the privacy and security of data used by AI/ML systems? How might humans interact with, rely on, or even trust AI predictions or decisions emanating from these technologies? How can we prevent such data-driven intelligence from being used to make malicious decisions?

Authors are invited to submit original, unpublished research work, as well as industrial practice reports. Simultaneous submission to other publication venues is not permitted. All submissions must adhere to IEEE Publishing Policies, and all will be vetted through the IEEE CrossCheck portal. For full CFP and conference information, please visit the conference website at WWW.COMPSAC.ORG

IMPORTANT DATES April 7, 2019: Paper notifications April 15, 2019: Workshop papers due May 1, 2019: Workshop paper notifications May 17, 2019 - Camera ready submissions and advance author registration due

♦ IEEE-�CW£1TE

Be The Difference.

ORGANIZING COMMITTEE General Chairs: Jean-Luc Gaudiot, University of California, Irvine, USA; Vladimir Getov, University of Westminster, UK Program Chairs in Chief: Morris Chang, University of South Florida, USA; Stelvio Cimato, University of Milan, Italy; Nariyoshi Yamai, Tokyo University of Agriculture&: Technology,Japan Workshop Chairs: Hong Va Leong, Hong Kong Polytechnic University, Hong Kong; Yuuichi Teranishi, National Institute of Information and Communications Technology, Japan; Ji-Jiang Yang, Tsinghua University, China Local Organizing Committee Chair: Praveen Madiraju, Marquette University, USA Standing Committee Chair: Sorel Reisman, California State University, USA Standing Committee Vice Chair: Sheikh Iqbal Ahamed, Marquette Universiity, USA

Page 40: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

38 May 2019 Published by the IEEE Computer Society 2469-7087/19/$33.00 © 2019 IEEE44 C O M P U T E R P U B L I S H E D B Y T H E I E E E C O M P U T E R S O C I E T Y 0 0 1 8 - 9 1 6 2 / 1 8 / $ 3 3 . 0 0 © 2 0 1 8 I E E E

AFTERSHOCK

The practice of using disinformation and misin-formation to promote parochial agendas isn’t new. Both have been used by tyrants, dema-gogues, dictators, authoritarians, and manipula-

tors of every stripe for millennia. One thing that’s new to our generation is the digital twist of Internet trolling. The e� ectiveness and increasing use of this tactic, highlighted in the 2016 US presidential election, justi­ es increased at-tention. An earlier Computer column1 encouraged such at-tention, and we elaborate here.

Disinformation and misinformation both involve the distribution of false information, but with di� ering objec-tives. Disinformation involves the intentional planting of false information to conceal truth or deceive the audience, especially by state actors, whereas misinformation is more generic and relaxed regarding intention, concealment, and source. For our purposes, we intend the de­ nition

of disinformation to include not just governments but also political groups, ideological movements, and other social entities. Disinformation is more pernicious, being necessar-ily both intentional and deceptive

in its pursuit of social engineering goals. Although some trolling might be without willful deception (as in the case of mistaken “true believers”), disinformation is the more natural ally of trolling and is thus our focus.

The topic of disinformation is both complex and varied: it’s complex owing to its convoluted methods; it’s varied because of its di� erent practitioners and contexts. It can be used to enlist support, confuse, de-legitimize, defame, intimidate, confound, escape detection or blame, avoid prosecution, and on and on. The public relations strate-gist uses disinformation in di� erent ways than the tyrant owing to the latter’s assumed greater imperviousness to punishment or retribution. Similarly, the ideologue’s use of disinformation is di� erent from that of the corrupt pol-itician. Disinformation techniques and content vary with the purpose, targeted demographic, medium, and social networking platform.

The Online Trolling EcosystemHal Berghel, University of Nevada, Las Vegas

Daniel Berleant, University of Arkansas at Little Rock

As trolling becomes inseparable from modern

social media, a renewed effort is needed to

unmask and abate the risks of this reality. A

proposed taxonomy offers useful clarifi cation.

r8aft.indd 44 7/31/18 11:16 AM

Page 41: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

www.computer.org/computingedge 39A U G U S T 2 0 1 8 45

EDITORSHAL BERGHEL University of Nevada, Las Vegas; [email protected]

ROBERT N. CHARETTE ITABHI Corp.; [email protected]

JOHN L. KING University of Michigan; [email protected]

These issues apply to trolling as well. Consequently, we’ve developed a partial taxonomy to better charac-terize trolling’s many manifestations. This is an appropriate time for a tax-onomy, for trolling is mature enough now to reveal interesting patterns and suggest future trends and defenses.

ROOTS AND MISSING LINKSTrolling is con� rmation, in a sense, of a fundamental � aw in the notional roots of the modern Internet-enabled Web. Those roots are typi� ed by, for example, Paul Otlet’s Mundaneum system, imple-mented in 1910 to collect and categorize all of the world’s important knowledge (www.mundaneum.org/en); H.G. Wells’s notion of a World Brain, outlined in a 1938 collection of essays and addresses with that title; and Vannevar Bush’s Me-mex system, described in his in� uential 1945 article “As We May Think.”2 Bush envisioned a collective memory sys-tem that would advance a knowledge explosion by serving up the corpus to anyone on demand through associa-tive indexing and browser history-like “paths” not unlike the use of hypertext to organize the Web. As was custom-ary in the early information age, Bush was driven by the simultaneous de-sire for ease of information access and avoidance of information overload. He wasn’t concerned about data reliabil-ity and source authentication.

As it turns out, this overly simplis-tic and naive view of the information access challenge has been perpetuated ever since on the Web. To wit, subse-quent work on metadata standards, including the Dublin Core elements (http://dublincore.org/documents/dces; https://tools.ietf.org/html/rfc5013), completely ignore any measure of au-thenticity and reliability. The closest metadata elements would include oblique terms such as “provenance,” “conforms to,” and “is referenced by.” This de� ciency has been carried

forward in such subsequent document type de� nitions as the Open Source Metadata Framework and the Resource Description Framework. To overcome this de� ciency, more user control is needed—perhaps a user-driven meta-data insertion tool for elements like “suspect,” “disproved,” and “content warning,” or some sort of Bayesian trig-ger to deal with today’s fake news and alt-facts. Otherwise, the 21st century’s spin on Bush’s vision might progres-sively become “As We May Deceive.”

The study of disinformation, from an information-theoretic point of view, has thus far regrettably been at best occasional and informal. We have in mind, for example, contribu-tions by David Martin and H. Michael

Sweeney on disinformation3,4 and traits of disinformationists.5 While informative, especially with respect to the current political landscape, these works are largely anecdotal, lack ex-amples, and aren’t directly related to trolling. Spy the Lie6 provides a prac-tical guide, with examples, for detect-ing deception, including an analysis of behavioral cues that might betray the act. A rough equivalent for social media deceptions is sorely needed. Alas, self-published contributions on the Web, and those from the popular press, fail to do justice to the full im-pact of disinformation generally7 and trolling in particular.1

TROLLING AS AN IDEOLOGICAL WEAPONOnline trolling as a form of commu-nication is readily weaponized. Its

ease of use and accessibility to anyone with an Internet connection virtually eliminates entry barriers. Its appeal as a communication tactic to tyrants, demagogues, and manipulators of all kinds is obvious. It thus � ts comfort-ably within such models as pathocracy (rule by the maladjusted, psychopaths, narcissists, and the like)8 and kakis-tocracy (rule by the least competent)9

as an e¢ ective tool of online manipu-lation, obfuscation, and deceit. It’s no surprise that trolling has become in-creasingly popular.

The relationship of trolling to dis-information and politics has reached a modern zenith owing to the current US administration’s relaxation of the norms and expectations of veridical

communication and the Russian gov-ernment’s embrace of trolling. That said, the White House’s proneness to misinformation and even outright disinformation is a symptom of a more general social problem—namely, polit-ical emotionalism, in which facts are too often considered less of a founda-tion and more of a hindrance.10,11 That trend manifests itself in a tolerance of falsehoods under the guise of alt-facts, the inability to distinguish con-� rmable statements from beliefs and opinions, and an unre� ective commit-ment to ideology-based and simplistic slogans, catch phrases, sound bites, formulas, and beliefs. Social scien-tists have developed theories of social dominance, authoritarianism, and in-stability that explain some these char-acteristics in terms of group behavior, economics, and social hierarchy.11–14

Online trolling is readily weaponized—it fi ts comfortably within pathocracy and kakistocracy

as an e� ective tool of online manipulation, obfuscation, and deceit.

r8aft.indd 45 7/31/18 11:16 AM

44 C O M P U T E R P U B L I S H E D B Y T H E I E E E C O M P U T E R S O C I E T Y 0 0 1 8 - 9 1 6 2 / 1 8 / $ 3 3 . 0 0 © 2 0 1 8 I E E E

AFTERSHOCK

The practice of using disinformation and misin-formation to promote parochial agendas isn’t new. Both have been used by tyrants, dema-gogues, dictators, authoritarians, and manipula-

tors of every stripe for millennia. One thing that’s new to our generation is the digital twist of Internet trolling. The e� ectiveness and increasing use of this tactic, highlighted in the 2016 US presidential election, justi­ es increased at-tention. An earlier Computer column1 encouraged such at-tention, and we elaborate here.

Disinformation and misinformation both involve the distribution of false information, but with di� ering objec-tives. Disinformation involves the intentional planting of false information to conceal truth or deceive the audience, especially by state actors, whereas misinformation is more generic and relaxed regarding intention, concealment, and source. For our purposes, we intend the de­ nition

of disinformation to include not just governments but also political groups, ideological movements, and other social entities. Disinformation is more pernicious, being necessar-ily both intentional and deceptive

in its pursuit of social engineering goals. Although some trolling might be without willful deception (as in the case of mistaken “true believers”), disinformation is the more natural ally of trolling and is thus our focus.

The topic of disinformation is both complex and varied: it’s complex owing to its convoluted methods; it’s varied because of its di� erent practitioners and contexts. It can be used to enlist support, confuse, de-legitimize, defame, intimidate, confound, escape detection or blame, avoid prosecution, and on and on. The public relations strate-gist uses disinformation in di� erent ways than the tyrant owing to the latter’s assumed greater imperviousness to punishment or retribution. Similarly, the ideologue’s use of disinformation is di� erent from that of the corrupt pol-itician. Disinformation techniques and content vary with the purpose, targeted demographic, medium, and social networking platform.

The Online Trolling EcosystemHal Berghel, University of Nevada, Las Vegas

Daniel Berleant, University of Arkansas at Little Rock

As trolling becomes inseparable from modern

social media, a renewed effort is needed to

unmask and abate the risks of this reality. A

proposed taxonomy offers useful clarifi cation.

r8aft.indd 44 7/31/18 11:16 AM

Page 42: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

40 ComputingEdge May 201946 C O M P U T E R W W W . C O M P U T E R . O R G / C O M P U T E R

AFTERSHOCK

WHY DISINFORMATION? WHY TROLLING?Disinformation generally and troll-ing specifically are expedient ways to manipulate public opinion. Authori-tarians of all generations understood that sound and reasoned argument isn’t sufficient to exercise control over others. Something more powerful but short of force is needed. Such machina-tions, to be effective, must be carefully engineered and targeted, an objective often unachievable through reasoned public debate. If politicians were to rely on logical debate, free of manip-ulative rhetorical devices, public con-sensus might be influenced by the merits of the arguments themselves when interests, often authoritarian or domineering, wish to avoid this.

Carefully crafted disinformation campaigns and trolling efforts can be instrumental in achieving the desired effect. They can artificially polarize issues to exploit a human bias toward binary choices—seeing the world in black and white, big and small, rich and poor. This is related to what Hans Ros-ling calls the gap instinct.15 Its appeal must follow in part from the cognitive simplicity of binary distinctions, much as we experience with true/false ques-tions on exams. Other things being equal, cognitive effort is lower on true/false than multiple-choice questions because there’s less to think about.

Disinformationists and trolls seek to create a sense of extremes where the extreme they tout is cast in a more appealing way than the alternative. In order to force the information con-sumer to the desired extreme, they use lies, prevarications, untruths, alt-facts, unlikely theories, distortions, ad ho-minem attacks, and other rhetorical

devices as part of a Machiavellian pro-paganda or “messaging” campaign to create the desired artificial duality in lieu of the more nuanced and reality-based presentation that would result from clear-headed analysis. Modern online disinformation and trolling campaigns functionally resemble phishing at-tacks in combining a modest amount of computing and networking skill to cloak the real goal and lure the target using perception management (manip-ulating the public into thinking they perceive something they don’t, or vice versa) and social engineering (moti-vating the public to do something they otherwise wouldn’t have done).

In his book Factfulness,15 Rosling describes how evolutionary traits like hard-wired fast-response brains

produce simplistic world views that discourage adequate reflection and deliberation for decision making. He identifies 10 evolutionary “instincts” that no longer serve humanity well in separating truth from predatory fiction. Such instincts should be criti-cally discussed as part of college-level general education, if not in high school. Primary education should provide practical skill in BS detection, right along with the 3 Rs. Call it the 4th R: reality checking.

A TAXONOMY OF TROLLINGOnline trolling has matured to the point that we can discern some evolu-tionary patterns and future directions. The value proposition is obvious from the 2016 US presidential election: low-cost, potentially high-impact voter ma-nipulation through micro-targeting. Political scientists and others continue to study the degree to which trolling in-fluenced the vote. UK-based Cambridge

Analytica executive Mark Turnbull took credit for playing a key role in Donald Trump’s win,16 and there’s now sufficient concern over the use of troll-ing by foreign governments to under-mine US federal elections that, as part of the Mueller probe, the US Depart-ment of Justice indicted the Russian trolling factory, the Internet Research Agency, for 8 federal crimes17 as well as 13 Russians and 3 Russian compa-nies for attempting to subvert the 2016 election.18

One thing is certain: online trolling is here to stay. Even if federal legislation were passed to outlaw it, problems like reliable cyber-attribution19—at least that which is admissible in court—will provide trolls many avenues to circum-vent whatever laws might be enacted.

So what’s the future of online troll-ing and its containment? We offer the following informal taxonomy as a means to focus our response.

Provocation trolling. To elicit a par-ticular response, such as hostility, from participants of an online forum. For example, in the “Reactions” section of a Yahoo! article about a 20-year-old Guatemalan woman shot dead in Texas by a US border agent, many top comments seemed intended to spark a flame rather than shed light. For ex-ample, the first comment was “Medal of Honor!!!” (http://www.webcitation .org/710m5n0WF). Similarly, in an online discussion, blaming liberals or conservatives for a tragic or contro-versial incident will likely cause some offended readers to lunge for the bait.

Social-engineering trolling. To incite participants to activities they normally wouldn’t have undertaken—convince readers to join an organization, send a donation, observe a boycott, vote for/against a candidate, and so on.

Grooming trolling. Sending mes-sages intended to insinuate the sender into the mind of the recipient as a slippery slope to further persuasion. Radical organizations are notorious for

Disinformation and trolling are expedient ways to manipulate public opinion. They can

polarize issues to exploit a human bias toward binary choices.

r8aft.indd 46 7/31/18 11:16 AM

Page 43: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

www.computer.org/computingedge 41 A U G U S T 2 0 1 8 47

using this variant of social-engineering trolling to recruit members: ISIS was widely noted for “fishing” for new members on Twitter this way, and US extremist groups are frequently noted for using this tactic.

Partisan trolling. To use social me-dia surreptitiously to achieve political ends. Here’s where the heavyweights really get involved. For example, troll-ing has been exposed as an import-ant component of Russia’s “firehose of falsehood” (see below) propaganda strategy, especially in the recent US presidential race.20

Firehose trolling. High-volume, rapid, continuous trolling without concern for consistency. Apparently a favorite of Russia, it focuses not on promoting a particular position or viewpoint but on divisiveness for its own sake. For example, according to Charles Clover, Aleksandr Dugin’s book The Founda-tions of Geopolitics is influential at the highest levels of the Russian govern-ment and “assigned as a textbook at the General Staff Academy and other mil-itary universities in Russia.”21 (A good English translation of the entire book isn’t yet available.) Clover quotes Dugin as writing, “It is especially important to introduce geopolitical disorder into internal American activity, encourag-ing all kinds of separatism and ethnic, social and racial conflicts, actively supporting all dissident movements—extremist, racist, and sectarian groups, thus destabilizing internal political processes in the U.S.” Trolling is cer-tainly well suited to this activity. And it can be tough to counter. Christopher Paul22 recommends against trying “to fight the firehose of falsehood with the squirt gun of truth,” but fails to provide fully satisfying alternatives.

Ad hominem trolling. Defaming or discrediting individuals or groups to delegitimize their positions without engaging them on their merits. The following snippet from an exchange on an email list exemplifies this.

ML: [Controversial claim] Any-body who claims otherwise is ignorant, uninformed, or lying.

A naive respondent might be whip-lashed at this point because a counter-argument, reasoned or not, has already been pre-characterized as ignorant, uninformed, or a lie. The best response is probably to simply point out the rhe-torical device used here, as respondent PD does next.

PD: Ooh—is this the choose-your-own-ad-homi-nem part of the show?

Yet even this response is hobbled be-cause the discussion has now been di-verted into a rhetorical cul-de-sac that saves ML from losing the argument.

Jam trolling. Disrupting a discussion or communication channel with high message volume (the trolling equiva-lent to a DOS attack). Technologically, automated trollbots will make this an increasing problem.

Sport trolling. Trolling for the self- gratification of the troll (just for the fun of it).

Snag trolling. Evoking responses to satisfy curiosity. One of the less toxic varieties, this nevertheless tends to di-vert and obscure.

Nuisance trolling. Derailing the thread of an online forum (blog, cha-troom, and so on) for no other reason than to irritate other participants. A variant of sport trolling.

Diversion trolling. An insidious tactic for blocking legitimate communi cation

by diverting a thread in a direction that’s misleading, irrelevant, false, and so on. Thus, a discussion about rising crime rates could be diverted by citing a small community that hasn’t had a murder in 20 years, or a discussion about falling crime rates could be di-verted by mentioning a recent crime.

False-flag trolling. Pretending to be of a group or hold an opinion that the troll actually opposes, and present-ing a message intended to make that group or opinion look bad. This is one of the harder forms of trolling to de-tect, because the writer could in the-ory really have the opinion claimed but not realize how his obnoxiousness is creating the opposite of the desired effect. For example, a type of robocall used in political campaigns pretends

to support one candidate but is so an-noying that it actually helps the oppos-ing candidate.

Huckster trolling. The online world’s equivalent to street vendors. A typical example: “Loved your insightful post! Smash financial barriers with our per-sonalized method. Click now to unlock YOUR potential!” Here’s where adver-tising meets trolling.

Amplification/relay trolling. This occurs when one trolling venue is used to amplify the message of some other source—for example, a politician us-ing Twitter to repeat something re-ported on Fox & Friends or Morning Joe.

Rehearsal trolling. Baiting opponents to respond in order to reel in the “fish,” or victim, to practice arguing with. The more annoyed the respondent, the more energy that person will expend

Problems like reliable cyber-attribution will provide trolls many avenues to circumvent

whatever laws might be enacted against trolling.

r8aft.indd 47 7/31/18 11:16 AM

Page 44: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

42 ComputingEdge May 201948 C O M P U T E R W W W . C O M P U T E R . O R G / C O M P U T E R

AFTERSHOCK

providing the spirited practice the troll wants. The troll thus hones debate skills for uses like higher-stakes troll-ing later.

Proxy trolling. Using intermediary trolls to do the heavy lifting. De ri-gueur for large organizations, which hire people to do it.23 One application is astroturfing: promoting a position, product, person, and so on for which there’s little awareness or support by making it look like that entity is widely approved of. Websites and organiza-tions set up by special interests but given names like “Citizens for X” are standard examples. Proxy trolling pro-vides rich opportunities for all manner of resource-rich, unscrupulous actors.

Faux-facts trolling. Deliberate spread-ing of fake news, alt-facts, and other lies under the guise of truth. To fight

this type of trolling, refereeing organi-zations, typified by the well-regarded Snopes (https://www.snopes.com/about -snopes), are a socially valuable, even essential institution. We can expect large organizational trolls to sow chaos and confusion with fake fact-checking organizations of their own.

Insult trolling. Insults spark re-sponses that drain the target’s energy. They also make the target look bad and are demoralizing.

PR trolling. Making the troll or the views the troll is promulgating look good rather than attacking others. For example, the troll could make a claim and unverifiably cite a brother-in-law “who was there.” But the most com-mon example is to state approval of an-other text. It’s easy to upvote another troll’s message, or respond to a posting

with “Right on!” or “Thank you for say-ing what so many know but are afraid to say.” This boosts persuasiveness via a bandwagon effect.

Chaff trolling. Sending messages that are essentially content free and thus vacuous. For example, on social me-dia platform Quora someone claimed that a relative assigned to help guard former president Obama said that the president was “… fake as [expletive de-leted].” One might well question if this relative really existed, and if he did, whether the quote was accurate. Yet consider also the word “fake”: here it carries little if any information about its subject but is an effective insult for the many unsavvy readers.

Wheat trolling. High-quality trolling using content that’s hard or impossi-ble to refute—for example, a cleverly

doctored photo or text incorporating seemingly well-sourced “facts.” Some lies contain their own logical incon-sistencies; others smell bad only to a domain expert.

Satire trolling. Good satire cuts deep. It’s hard to create and even harder to generate automatically. Thus, effec-tive as it is, satire trolling will likely remain a relatively small player in the trolling world.

TURING TROLLBOTSA trollbot is simply an automated troll. Like a chatbot, it generates texts com-putationally. Unlike chatbot texts, trollbot output possesses markedly weaker requirements for coherence and continuity from its context. Con-sider, for example, a program that uses a simple bag-of-words algorithm to detect tweets or other posts critical of

a particular position or public figure. It then posts replies randomly picked from a set of stock replies like “You tell’em baby!” and “That’s SO right.”

Informally, let’s refer to a trollbot that’s indistinguishable from a hu-man troll as a Turing trollbot—one that has passed the trolling equiva-lent of the Turing test. A computer- controlled chatbot passes the tradi-tional Turing test if and only if the human tester cannot distinguish the chatbot from a human. Compared to a chatbot, a trollbot has a much easier time passing—the weaker constraints on trolling make it so. Sure, there are human trolls for whom sophisti-cated trolling is an unsavory art form that would be hard to imitate, but a Turing trollbot need only mimic the lowest-common-denominator human troll to masquerade as a real person.

The concept of the Turing troll-bot is increasingly recognized.24 The hardest technical aspect of primitive Turing trollbot design is sneaking through smart filters like CAPTCHA. In fact, such trollbots could soon emerge as easily downloaded freeware apps. But primitive Turing trollbots are just a start. As we were writing this article, IBM unveiled its Debater system,25 which successfully took on a college debate champion. This is a much greater challenge than deploy-ing successful trollbots, which can be ever so much more efficient and eco-nomical than a paid human.

With armies of well-nigh unde-tectable trollbots on the horizon, what’s one to do against this threat? One approach is to simply ignore out-right all controversial social media comments—that might protect indi-vidual readers. Another approach is mass immunization. The simplest way to ensure public health is for enough people to reply to suspected troll messages by shining a light on them. “Are you a troll?” might serve not just as a comment but as a warning and reminder to readers who otherwise might have overlooked the possibility. But one way or another, society must

A trollbot has a much easier time passing a Turing test than a chatbot.

r8aft.indd 48 7/31/18 11:16 AM

Page 45: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

www.computer.org/computingedge 43 A U G U S T 2 0 1 8 49

develop strategies to reduce trolling and trollbot effectiveness.

Research is also needed to investi-gate the potential for automatic troll-ing detection software. What kinds of trolling are undetectable? What kinds have already been detected, and who are their sponsors? We also need to educate the public. An increasingly necessary goal of primary education is training people to approach social media statements with suspicion, es-pecially when it comes to bias and mis-information. The Internet—through social media and fake news outlets—has saddled us with the biases of those seeking to manipulate others through new forms of information corruption such as source displacement/conceal-ment, decontextualization, and the like. Where the traditional measures of networks were in terms of value,26,27 a new and useful measure of networks is their potential for abuse.28

POLITICAL TROLLINGIn addition to the computer and net-working context, online trolling must be understood in a geopolitical con-text,29,30 especially with respect to its utility in international competition and rivalry. For example, a measur-able amount of the identified external political trolling used to influence the outcome of the 2016 US election ap-pears to have been either sponsored or inspired by Russia. China certainly has the capability for effective political trolling as well. As time passes, more countries will inevitably engage in it as a useful and cost-effective way to project influence. Free societies are the most susceptible to political trolling because in those countries mass opin-ion is a strong driver of national policy.

Moreover, polarization and par-tisanship have been increasing for decades.11,31–33 Trolling’s utility is re-lated to the political divisiveness of the target society. As trolling and other ways of abusing social media and net-works evolve, the current deficiencies in teaching disinformation tactics widely as an important civic skill will

become more apparent. Our children, like all too many adults, lack the basic skills to look upon divisive, emotive communication critically. This is a severe educational shortcoming that promises to exact a considerable toll on democratic systems.

Society needs to understand why people troll. It seems to be one of many addictive behav-

iors mostly afflicting alienated young males and enabled by the anonymity and easy accessibility of the Internet, much like overindulging in online porn or videogames (https://www .quora.com/ Whats-it-like-to-be-an -Internet-troll). But perhaps it’s not as important to understand the psychol-ogy underlying trolling as it is to avoid being manipulated by it. As Lee Edwin Coursey34 advises,

The next time you see a hyperbolic social media post that confirms your worst fears about people of a particular race, gender, religion, or political affiliation, your first reac-tion should be, “nice try, Russian troll,” rather than “OMG I MUST REPOST THIS EVERYWHERE!!!” Learn to take a breath and pause before you immediately like, retweet, or share divisive messages from obscure sources. Be especially wary of emotional manipulation. Most importantly, fact check yourself be-fore spreading information designed to foment outrage and factionalism. Remember that the phrase “Russian disinformation campaign” does not describe some outdated method from a bygone era, but instead represents an active, effective tool being used against you right now.

The cognitive load for detection and prevention is considerable, even for a coalition of the willing to do so. There’s little cognitive load for tribal-ists because of illusory feelings of su-periority, anosognosia (critical lack of self-awareness), and other cognitive biases. Part of the threat (and hence the value) of trolling is that so many independent-minded people don’t have the time and energy to check facts or verify claims, while tribalists and authoritarianist followers don’t feel the need.

As a consequence, trolling is con-venient fodder for the gullible. It’s free, self-reinforcing propaganda that unifies true believers and confuses or obfuscates issues sufficiently to manipulate fence-sitters. The game changing potential lies with the lat-ter (for example, the 40,000 votes in three states that effected the Electoral

College outcome of the 2016 US presi-dential election). This is where trolls and other social media manipulators see the real payoff. It’s for this reason that so much trolling content tends to be shocking, distressing, offensive, and the like—it’s designed to arouse the passions of the recipient while not lending itself easily to deliberation. The more independent fence-sitters can thus be stimulated to action or opinion without benefit of the reflec-tion that would call into question the validity of the message or stimulate thoughtful evaluation. Fact check-ing, introspection, and analysis work against the interests of trolls. In this way, trolling is similar to a military campaign where the goal is action without debate.

We might take a lesson from Winn Schwartau’s Time-Based Security Model

Free societies are the most susceptible to political trolling because in those countries mass

opinion is a strong driver of national policy.

r8aft.indd 49 7/31/18 11:16 AM

48 C O M P U T E R W W W . C O M P U T E R . O R G / C O M P U T E R

AFTERSHOCK

providing the spirited practice the troll wants. The troll thus hones debate skills for uses like higher-stakes troll-ing later.

Proxy trolling. Using intermediary trolls to do the heavy lifting. De ri-gueur for large organizations, which hire people to do it.23 One application is astroturfing: promoting a position, product, person, and so on for which there’s little awareness or support by making it look like that entity is widely approved of. Websites and organiza-tions set up by special interests but given names like “Citizens for X” are standard examples. Proxy trolling pro-vides rich opportunities for all manner of resource-rich, unscrupulous actors.

Faux-facts trolling. Deliberate spread-ing of fake news, alt-facts, and other lies under the guise of truth. To fight

this type of trolling, refereeing organi-zations, typified by the well-regarded Snopes (https://www.snopes.com/about -snopes), are a socially valuable, even essential institution. We can expect large organizational trolls to sow chaos and confusion with fake fact-checking organizations of their own.

Insult trolling. Insults spark re-sponses that drain the target’s energy. They also make the target look bad and are demoralizing.

PR trolling. Making the troll or the views the troll is promulgating look good rather than attacking others. For example, the troll could make a claim and unverifiably cite a brother-in-law “who was there.” But the most com-mon example is to state approval of an-other text. It’s easy to upvote another troll’s message, or respond to a posting

with “Right on!” or “Thank you for say-ing what so many know but are afraid to say.” This boosts persuasiveness via a bandwagon effect.

Chaff trolling. Sending messages that are essentially content free and thus vacuous. For example, on social me-dia platform Quora someone claimed that a relative assigned to help guard former president Obama said that the president was “… fake as [expletive de-leted].” One might well question if this relative really existed, and if he did, whether the quote was accurate. Yet consider also the word “fake”: here it carries little if any information about its subject but is an effective insult for the many unsavvy readers.

Wheat trolling. High-quality trolling using content that’s hard or impossi-ble to refute—for example, a cleverly

doctored photo or text incorporating seemingly well-sourced “facts.” Some lies contain their own logical incon-sistencies; others smell bad only to a domain expert.

Satire trolling. Good satire cuts deep. It’s hard to create and even harder to generate automatically. Thus, effec-tive as it is, satire trolling will likely remain a relatively small player in the trolling world.

TURING TROLLBOTSA trollbot is simply an automated troll. Like a chatbot, it generates texts com-putationally. Unlike chatbot texts, trollbot output possesses markedly weaker requirements for coherence and continuity from its context. Con-sider, for example, a program that uses a simple bag-of-words algorithm to detect tweets or other posts critical of

a particular position or public figure. It then posts replies randomly picked from a set of stock replies like “You tell’em baby!” and “That’s SO right.”

Informally, let’s refer to a trollbot that’s indistinguishable from a hu-man troll as a Turing trollbot—one that has passed the trolling equiva-lent of the Turing test. A computer- controlled chatbot passes the tradi-tional Turing test if and only if the human tester cannot distinguish the chatbot from a human. Compared to a chatbot, a trollbot has a much easier time passing—the weaker constraints on trolling make it so. Sure, there are human trolls for whom sophisti-cated trolling is an unsavory art form that would be hard to imitate, but a Turing trollbot need only mimic the lowest-common-denominator human troll to masquerade as a real person.

The concept of the Turing troll-bot is increasingly recognized.24 The hardest technical aspect of primitive Turing trollbot design is sneaking through smart filters like CAPTCHA. In fact, such trollbots could soon emerge as easily downloaded freeware apps. But primitive Turing trollbots are just a start. As we were writing this article, IBM unveiled its Debater system,25 which successfully took on a college debate champion. This is a much greater challenge than deploy-ing successful trollbots, which can be ever so much more efficient and eco-nomical than a paid human.

With armies of well-nigh unde-tectable trollbots on the horizon, what’s one to do against this threat? One approach is to simply ignore out-right all controversial social media comments—that might protect indi-vidual readers. Another approach is mass immunization. The simplest way to ensure public health is for enough people to reply to suspected troll messages by shining a light on them. “Are you a troll?” might serve not just as a comment but as a warning and reminder to readers who otherwise might have overlooked the possibility. But one way or another, society must

A trollbot has a much easier time passing a Turing test than a chatbot.

r8aft.indd 48 7/31/18 11:16 AM

Page 46: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

44 ComputingEdge May 201950 C O M P U T E R W W W . C O M P U T E R . O R G / C O M P U T E R

AFTERSHOCK

in this regard.35 The model posits that a security system can be effective only when the time it takes to detect a se-curity breach and mitigate against the threat is less than the time it takes for the security breach to achieve its objective. There’s a parallel when it comes to mitigating against the effects of abusive social media. For it to be effective, the detection time must be near zero because the reaction time re-quired to re-tweet, forward, and so on is negligible. The parallel with trolling is that the troll is focused on achieving quick results before second thoughts might be raised.

It’s worth adding that trolling’s ability to promote division can also be used to nurture social reform and is thus a doubled-edged sword for au-thoritarian and totalitarian states. For that reason, such states must carefully monitor and control trolling and re-lated digital media manipulation tools within their borders.

New though it is in the toolbox of Machiavellian kingpins and social misfits alike, the effectiveness of troll-ing ensures that it’ll continue to play an important role in future politics.

REFERENCES1. H. Berghel, “Trolling Pathologies,”

Computer, vol. 51, no. 3, 2018, pp. 66–69. 2. V. Bush, “As We May Think,” The

Atlantic Monthly, vol. 176, no. 1, 1945, pp. 101–108.

3. D. Martin, “Thirteen Techniques for Truth Suppression,” http://www .brasscheck.com/martin.html.

4. H.M. Sweeney, “Twenty-Five Ways to Suppress Truth: The Rules of Disin-formation,” Apr. 2000; http://whale .to/m/disin.html.

5. H.M. Sweeney, “Eight Traits of the Disinformationalist,” Apr. 2000; http://whale.to/b/sweeney.html.

6. P. Houston et al., Spy the Lie: Former CIA Officers Teach You How to Detect Deception, reprint ed., St. Martin’s Griffin, 2013.

7. H. Berghel, “Disinformatics: The Discipline behind Grand Decep-tions,” Computer, vol. 51, no. 1, 2018,

pp. 89–93.8. E. Mika, “Who Goes Trump? Tyr-

anny as a Triumph of Narcissism,” The Dangerous Case of Donald Trump: 27 Psychiatrists and Mental Health Experts Assess a President, B. Lee, ed., St. Martin’s Press, 2017, pp. 298–318.

9. E.J. Dionne Jr., N.J. Ornstein, and T.E. Mann, One Nation after Trump: A Guide for the Perplexed, the Disillu-sioned, the Desperate, and the Not-Yet Deported, St. Martin’s Press, 2017.

10. M. Stewart, “The 9.9 Percent Is the New American Aristocracy,” The Atlantic, June 2018; https://www .theatlantic.com/magazine/archive /2018/06/the-birth-of-a-new -american-aristocracy/559130.

11. P. Turchin, Ages of Discord: A Struc-tural-Demographic Analysis of Ameri-can History, Beresta Books, 2016.

12. T.W. Adorno et al., The Authoritarian Personality, Harper & Row, 1950.

13. B. Altemeyer, Right-Wing Authoritari-anism, Univ. of Manitoba Press, 1981.

14. J. Duckitt and C. Sibley, “Right Wing Authoritarianism, Social Dominance Orientation and the Dimensions of Generalized Prejudice,” European J. of Personality, vol. 21, no. 2, 2007, pp. 113–130.

15. H. Rosling, O. Rosling, and A.R. Ronnlund, Factfulness: Ten Reasons We’re Wrong about the World—and Why Things Are Better than You Think, Flatiron Books, 2018.

16. E. Graham-Harrison and C. Cadwal-ladr, “Cambridge Analytica Execs Boast of Role in getting Donald Trump Elected,” The Guardian, 21 Mar. 2018; https://www.theguardian .com/uk-news/2018/mar/20 /cambridge-analytica-execs-boast -of-role-in-getting-trump-elected.

17. M. Wheeler, “What Did Mueller Achieve with the Internet Research Agency Indictment?,” blog, 17 Feb. 2018; http://www.emptywheel.net /2018/02/17/what-did-mueller -achieve-with-the-internet-research -agency-indictment.

18. M. Apuzzo and S. LaFraniere, “13 Russians Indicted as Mueller Reveals

Effort to Aid Trump Campaign,” The New York Times, 16 Feb. 2018; https:// www.nytimes.com/2018/02/16 /us/politics/russians-indicted -mueller-election-interference.html.

19. H. Berghel, “On the Problem of (Cy-ber) Attribution,” Computer, vol. 50, no. 3, 2017, pp. 84–89.

20. C. Paul and M. Matthews, “The Russian ‘Firehose of Falsehood’ Propaganda Model: Why It Might Work and Options to Counter It,” RAND Corp., 2016; https://www .rand.org/content/dam/rand /pubs/perspectives/PE100/PE198 /RAND_PE198.pdf.

21. C. Clover, “The Unlikely Origins of Russia’s Manifest Destiny,” Foreign Policy, 27 July 2016; https:// foreignpolicy.com/2016/07/27 /geopolitics-russia-mackinder -eurasia-heartland-dugin-ukraine -eurasianism-manifest-destiny -putin.

22. S. Bennett, “Beyond the Headlines: RAND’s Christopher Paul Discusses the Russian ‘Firehose of Falsehood,’” blog, 13 Dec. 2016; https://www.rand .org/blog/2016/12/beyond-the -headlines-rands-christopher-paul -discusses.html.

23. S. Shuster and S. Ifraimova, “A Former Russian Troll Explains How to Spread Fake News,” Time, 14 Mar. 2018, http://time.com/5168202 /russia-troll-internet-research -agency.

24. E. Ferrara et al., “The Rise of Social Bots,” Comm. ACM, vol. 59, no. 7, 2016, pp. 96–104.

25. C. Metz and S. Lohr, “IBM Unveils System That ‘Debates’ with Hu-mans,” The New York Times, 18 June 2018; https://www.nytimes .com/2018/06/18/technology/ibm -debater-artificial-intelligence.html.

26. R. Metcalf, “Metcalf’s Law after 40 Years of Ethernet,” Computer, vol. 46, no. 12, 2013, pp. 26–31.

27. D.P. Reed, “That Sneaky Exponen-tial—Beyond Metcalfe’s Law to the Power of Community Building,” 1999; https://www.deepplum.com /dpr/locus/gfn/reedslaw.html.

r8aft.indd 50 7/31/18 11:16 AM

Page 47: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

www.computer.org/computingedge 45A U G U S T 2 0 1 8 51

28. H. Berghel, “Weaponizing Twitter Litter: Abuse-Forming Networks and Social Media,” Computer, vol. 51, no. 4, 2018, pp. 70–75.

29. W. Blum, Killing Hope: US Military and CIA Interventions since World War II, updated and rev. ed., Zed Books, 2014.

30. S. Kinzer, Overthrow: America’s Cen-tury of Regime Change from Hawaii to Iraq, Times Books, 2007.

31. E. Klein, ed., “What Is Political Polar-ization?,” Vox, 15 May 2015; https://www.vox.com/cards/congressional-dysfunction/what-is-political-polarization.

32. E. Voeten, “Polarization and In-equality,” blog, 18 Oct. 2011; http://themonkeycage.org/2011/10/polarization-and-inequality.

33. K.T. Poole, “The Polarization of the Congressional Parties,” 21 Mar. 2015; https://legacy.voteview.com/political_polarization_2014.htm.

34. L.E. Coursey, “Russia’s Plan for World Domination—and America’s Unwit-ting Cooperation with It,” blog, 7 Jan. 2018; http://www.leecoweb.com/russian_plan.

35. W. Schwartau, Time Based Security, Interpact Press, 1999.

HAL BERGHEL is an IEEE and ACM

Fellow and a professor of computer

science at the University of Nevada,

Las Vegas. Contact him at hlb@

computer.org.

DANIEL BERLEANT is a professor of

information science at the University

of Arkansas at Little Rock and author

of the book The Human Race to the

Future (4th ed., Lifeboat Foundation,

2017). Contact him at berleant@

gmail.com.

Affective computing is the � eld of study concerned with understanding, recognizing, and utilizing human emotions in the design of computational systems. IEEE Transactions on Affective Computing (TAC) is intended to be a cross-disciplinary and international archive journal aimed at disseminating results of research on the design of systems that can recognize, interpret, and simulate human emotions and related affective phenomena.

Subscribe today or submit your manuscript at:www.computer.org/tac

IEEE T R A N S A C T I O N S O N

AFFECTIVE COMPUTINGA publication of the IEEE Computer Society

Read your subscriptions through the myCS publications portal at

http://mycs.computer.org

WWW.COMPUTER.ORG

/COMPUTER

r8aft.indd 51 7/31/18 11:16 AM

50 C O M P U T E R W W W . C O M P U T E R . O R G / C O M P U T E R

AFTERSHOCK

in this regard.35 The model posits that a security system can be effective only when the time it takes to detect a se-curity breach and mitigate against the threat is less than the time it takes for the security breach to achieve its objective. There’s a parallel when it comes to mitigating against the effects of abusive social media. For it to be effective, the detection time must be near zero because the reaction time re-quired to re-tweet, forward, and so on is negligible. The parallel with trolling is that the troll is focused on achieving quick results before second thoughts might be raised.

It’s worth adding that trolling’s ability to promote division can also be used to nurture social reform and is thus a doubled-edged sword for au-thoritarian and totalitarian states. For that reason, such states must carefully monitor and control trolling and re-lated digital media manipulation tools within their borders.

New though it is in the toolbox of Machiavellian kingpins and social misfits alike, the effectiveness of troll-ing ensures that it’ll continue to play an important role in future politics.

REFERENCES1. H. Berghel, “Trolling Pathologies,”

Computer, vol. 51, no. 3, 2018, pp. 66–69. 2. V. Bush, “As We May Think,” The

Atlantic Monthly, vol. 176, no. 1, 1945, pp. 101–108.

3. D. Martin, “Thirteen Techniques for Truth Suppression,” http://www .brasscheck.com/martin.html.

4. H.M. Sweeney, “Twenty-Five Ways to Suppress Truth: The Rules of Disin-formation,” Apr. 2000; http://whale .to/m/disin.html.

5. H.M. Sweeney, “Eight Traits of the Disinformationalist,” Apr. 2000; http://whale.to/b/sweeney.html.

6. P. Houston et al., Spy the Lie: Former CIA Officers Teach You How to Detect Deception, reprint ed., St. Martin’s Griffin, 2013.

7. H. Berghel, “Disinformatics: The Discipline behind Grand Decep-tions,” Computer, vol. 51, no. 1, 2018,

pp. 89–93.8. E. Mika, “Who Goes Trump? Tyr-

anny as a Triumph of Narcissism,” The Dangerous Case of Donald Trump: 27 Psychiatrists and Mental Health Experts Assess a President, B. Lee, ed., St. Martin’s Press, 2017, pp. 298–318.

9. E.J. Dionne Jr., N.J. Ornstein, and T.E. Mann, One Nation after Trump: A Guide for the Perplexed, the Disillu-sioned, the Desperate, and the Not-Yet Deported, St. Martin’s Press, 2017.

10. M. Stewart, “The 9.9 Percent Is the New American Aristocracy,” The Atlantic, June 2018; https://www .theatlantic.com/magazine/archive /2018/06/the-birth-of-a-new -american-aristocracy/559130.

11. P. Turchin, Ages of Discord: A Struc-tural-Demographic Analysis of Ameri-can History, Beresta Books, 2016.

12. T.W. Adorno et al., The Authoritarian Personality, Harper & Row, 1950.

13. B. Altemeyer, Right-Wing Authoritari-anism, Univ. of Manitoba Press, 1981.

14. J. Duckitt and C. Sibley, “Right Wing Authoritarianism, Social Dominance Orientation and the Dimensions of Generalized Prejudice,” European J. of Personality, vol. 21, no. 2, 2007, pp. 113–130.

15. H. Rosling, O. Rosling, and A.R. Ronnlund, Factfulness: Ten Reasons We’re Wrong about the World—and Why Things Are Better than You Think, Flatiron Books, 2018.

16. E. Graham-Harrison and C. Cadwal-ladr, “Cambridge Analytica Execs Boast of Role in getting Donald Trump Elected,” The Guardian, 21 Mar. 2018; https://www.theguardian .com/uk-news/2018/mar/20 /cambridge-analytica-execs-boast -of-role-in-getting-trump-elected.

17. M. Wheeler, “What Did Mueller Achieve with the Internet Research Agency Indictment?,” blog, 17 Feb. 2018; http://www.emptywheel.net /2018/02/17/what-did-mueller -achieve-with-the-internet-research -agency-indictment.

18. M. Apuzzo and S. LaFraniere, “13 Russians Indicted as Mueller Reveals

Effort to Aid Trump Campaign,” The New York Times, 16 Feb. 2018; https:// www.nytimes.com/2018/02/16 /us/politics/russians-indicted -mueller-election-interference.html.

19. H. Berghel, “On the Problem of (Cy-ber) Attribution,” Computer, vol. 50, no. 3, 2017, pp. 84–89.

20. C. Paul and M. Matthews, “The Russian ‘Firehose of Falsehood’ Propaganda Model: Why It Might Work and Options to Counter It,” RAND Corp., 2016; https://www .rand.org/content/dam/rand /pubs/perspectives/PE100/PE198 /RAND_PE198.pdf.

21. C. Clover, “The Unlikely Origins of Russia’s Manifest Destiny,” Foreign Policy, 27 July 2016; https:// foreignpolicy.com/2016/07/27 /geopolitics-russia-mackinder -eurasia-heartland-dugin-ukraine -eurasianism-manifest-destiny -putin.

22. S. Bennett, “Beyond the Headlines: RAND’s Christopher Paul Discusses the Russian ‘Firehose of Falsehood,’” blog, 13 Dec. 2016; https://www.rand .org/blog/2016/12/beyond-the -headlines-rands-christopher-paul -discusses.html.

23. S. Shuster and S. Ifraimova, “A Former Russian Troll Explains How to Spread Fake News,” Time, 14 Mar. 2018, http://time.com/5168202 /russia-troll-internet-research -agency.

24. E. Ferrara et al., “The Rise of Social Bots,” Comm. ACM, vol. 59, no. 7, 2016, pp. 96–104.

25. C. Metz and S. Lohr, “IBM Unveils System That ‘Debates’ with Hu-mans,” The New York Times, 18 June 2018; https://www.nytimes .com/2018/06/18/technology/ibm -debater-artificial-intelligence.html.

26. R. Metcalf, “Metcalf’s Law after 40 Years of Ethernet,” Computer, vol. 46, no. 12, 2013, pp. 26–31.

27. D.P. Reed, “That Sneaky Exponen-tial—Beyond Metcalfe’s Law to the Power of Community Building,” 1999; https://www.deepplum.com /dpr/locus/gfn/reedslaw.html.

r8aft.indd 50 7/31/18 11:16 AM

This article originally appeared in Computer, vol. 51, no. 8, 2018.

@s e cur it ypr ivac y

FOLLOW US

Page 48: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

46 May 2019 Published by the IEEE Computer Society 2469-7087/19/$33.00 © 2019 IEEE

38mcg06-li-2874514.3d (Style 4) 26-03-2019 19:51

CareerVis: HierarchicalVisualization of CareerPathway Data

We present our CareerVis system, an interactive

visualization tool to aid career education for high school

and freshman college students. In additional to its

practical use, we believe our design approach has

potential to inspire the design community to develop

simple visualizations that convey complex information

to novice users.

To help students prepare for success in college, career, and life,education stakeholders have a long-term commitment todeveloping curriculum that allows students to explore theircollege and career options as well as their aptitudes andemployability (www.doe.in.gov/sites/default/files/standards/cte-family-and-consumer-sciences/cf-busfacs-preparingcc_7-11-14.pdf). Studies have shown that the right kinds of educationcan help people ease their transition into the job market.1 Stu-

dents should be able to plan for college and career pathways that are suitable for their interests, abili-ties, and lifelong goals.2

Within this context, the community needs efficient tools to help students better prepare fortheir careers after graduation.3 Based on a synthesized dataset from Purdue graduates’ jobplacement survey data and a national survey database (www.onetonline.org; www.mynextmove.org), we developed CareerVis, a visualization system aimed to help youngstudents comprehend the broad range of educational and occupational paths as part of thecollege-career selection process.

In order to improve the efficiency of decisions made by students, parents, and other career educationstakeholders, we need to anticipate the following frequently-asked questions:

Mingran Li1

Wenjie Wu1

Junhan Zhao1

Keyuan Zhou1

David Perkis2

Timothy N. Bond2

Kevin Mumford2

David Hummels2

Yingjie Victor Chen1,21Department of ComputerGraphics Technology,Purdue University.,

2Krannert SchoolManagement,Purdue University

Editor:Mike [email protected]

DEPARTMENT: Applications

IEEE Computer Graphics and ApplicationsNovember/December 2018 96

Published by the IEEE Computer Society0272-1716/19/$33.00 �2019 IEEE

Page 49: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

www.computer.org/computingedge 47

38mcg06-li-2874514.3d (Style 4) 26-03-2019 19:51

1) Which major should I choose? Which occupation should I pursue?2) What majors can help me pursue this occupation?3) What occupations am I qualified for with this major?4) What are the characteristics of these majors and occupations?

THE DATA AND MESSAGEOur underlying dataset contained flow information with hierarchical structure and multidimensionalcharacteristics, which could be decomposed into several typical data structures in informationvisualization design.4 Particularly, the dataset was composed of college majors, occupations, flows ofstudents from majors to their first jobs, 12 numeric measurements for majors (e.g., GPA and SATscores), and 12 measurements for occupations (e.g., salaries and future trends in globalization andautomation). The dataset presented the following challenges on visualization:

1) three different types of data formed a more complex data structure;2) the relatively large amount of data;3) the data would be presented for the general public, who have little experience with reading

and understanding visualization applications; and4) the visualization would also be published on a relatively small screen (e.g., a tablet or

smartphone).

The data is inherently hierarchical. Purdue University’s West Lafayette campus houses 145departments within the 10 colleges: Agriculture, Education, Engineering, Health and Human Sciences,Liberal Arts, Management, Pharmacy, Science, Technology, and Veterinary Medicine. Students’occupations were aggregated into 130 specific job positions and put into occupation groups by thestandard occupational classification system (www.bls.gov/soc). Moreover, the data containsproportions of the student body enrolled in majors or landed in a different job.

There are multiple pathways for students to pursue their ideal occupations from majors. For instance,among students who received accounting degrees, 70% secured accountant and auditor positions,while 17% worked as financial analysts, and 1%–3% worked in 8 other occupations. Vice versa, otherthan two majors (Accounting and General Management) under Management, about 10% of accountscome from majors under six different colleges which range from Agriculture to Science. There areabout one thousand possible major-to-occupation pathways.

College majors and occupations have many numerical measurements that can offer students insightinto the requirements of certain majors (e.g., GPA, SAT scores required for enrollment), importantmeasurements for jobs (e.g., salary and work hours), characteristics of certain majors and occupations(e.g., percentage of Indiana students, percentage of domestic/international students, and diversitystatus of minorities), and future trends that could be affected by automation and globalization. Thesecharacteristics are complementary descriptions of majors and jobs necessary to guide students’decision making. People may find certain jobs are better suited for family-oriented employees sincetheir percentage of married workers is higher than other professions (e.g., engineering andconstruction). Some job opportunities may increase (or decrease) with the development of automationand globalization. Some characteristics have single percentage values (e.g., the percentage of theworkforce from various ethnic groups), while others have percentile values of 10%, 25%, median,75%, and 90%, such as salary, GPA, and SAT scores.

DESIGN EXPLORATION AND ITERATIONSOur team conducted several iterative designs and involved users in the design processes. From morethan ten design ideas [e.g., Figure 1(a)], we selected the one with the most simple and intuitive form todevelop. Figure 1(b) shows our first formal design in horizontal layout. Characters are visualized asheat maps. Flows are presented in a hierarchical Sankey diagram. Our testing showed that the majorityof users fully comprehended the hierarchies between the colleges and majors, as well as the

APPLICATIONS

November/December 2018 97 www.computer.org/cga

38mcg06-li-2874514.3d (Style 4) 26-03-2019 19:51

CareerVis: HierarchicalVisualization of CareerPathway Data

We present our CareerVis system, an interactive

visualization tool to aid career education for high school

and freshman college students. In additional to its

practical use, we believe our design approach has

potential to inspire the design community to develop

simple visualizations that convey complex information

to novice users.

To help students prepare for success in college, career, and life,education stakeholders have a long-term commitment todeveloping curriculum that allows students to explore theircollege and career options as well as their aptitudes andemployability (www.doe.in.gov/sites/default/files/standards/cte-family-and-consumer-sciences/cf-busfacs-preparingcc_7-11-14.pdf). Studies have shown that the right kinds of educationcan help people ease their transition into the job market.1 Stu-

dents should be able to plan for college and career pathways that are suitable for their interests, abili-ties, and lifelong goals.2

Within this context, the community needs efficient tools to help students better prepare fortheir careers after graduation.3 Based on a synthesized dataset from Purdue graduates’ jobplacement survey data and a national survey database (www.onetonline.org; www.mynextmove.org), we developed CareerVis, a visualization system aimed to help youngstudents comprehend the broad range of educational and occupational paths as part of thecollege-career selection process.

In order to improve the efficiency of decisions made by students, parents, and other career educationstakeholders, we need to anticipate the following frequently-asked questions:

Mingran Li1

Wenjie Wu1

Junhan Zhao1

Keyuan Zhou1

David Perkis2

Timothy N. Bond2

Kevin Mumford2

David Hummels2

Yingjie Victor Chen1,21Department of ComputerGraphics Technology,Purdue University.,

2Krannert SchoolManagement,Purdue University

Editor:Mike [email protected]

DEPARTMENT: Applications

IEEE Computer Graphics and ApplicationsNovember/December 2018 96

Published by the IEEE Computer Society0272-1716/19/$33.00 �2019 IEEE

Page 50: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

48 ComputingEdge May 2019

38mcg06-li-2874514.3d (Style 4) 26-03-2019 19:51

occupational groups and occupations. However, the horizontal design presented several problems suchas the interface layout generated unnecessary information overlap.

To better utilize screen space and represent characteristics, we developed another version.The main design idea of hierarchical flow remains but was rotated into a vertical presentation.To improve the design of side characteristics, we brainstormed many solutions [Figure 1(c)].Ultimately, we selected a relatively intuitive option that featured the direct relationship betweenthe line and value to show the characteristics of verbal, quantitative, and reasoning skills[Figure 1(d)]. The straight line would be highlighted with bright red when hovering on aparticular major or occupation. Additionally, we presented other characteristics by bar graphs.Based on interviews with 64 participants, 90% of users were more satisfied with the verticaldesign. We further enhanced this design to address some remaining problems with theimplementation of interactions, mainly the lack of a comparison function and the fact that once auser clicked on a college or an occupation group, the block expanded suddenly, which causedthe user to lose visual momentum due to a sudden change of the visualization.

VISUAL COMPONENTSOur resulting CareerVis user interface provided multiple views for data exploration [Figure (2)]. Thecentral flow view displayed the hierarchical levels of colleges, majors, occupational groups, andoccupations, as well as the one-to-one relationship between major and occupation. Each particularmajor or occupation featured a complete description. All relevant characteristics of majors andoccupations were presented by scatter plots, box plots, and bar charts.5 In the top view, the systemprovided a guide and a search function. The system is developed using d3 (d3js.org).

Figure 2(a) shows the breadth of occupations chosen by students after graduating from college. In thecentral section, our team combined three essential visual components:

1) the rectangular blocks of the Purdue colleges and majors on the left side, where lengths ofblocks represent the number of students that have graduated;

2) the similar visual element of the occupational groups and occupations on the right side,where lengths represented the number of students in the occupational group; and

3) the connection paths in the central region.

Figure 1. CareerVis’s early design concepts and iteration: (a) several concept designs;(b) horizontal layout; (c) better solutions for characteristic plots of vertical design;(d) vertical layout.

IEEE COMPUTER GRAPHICS AND APPLICATIONS

November/December 2018 98 www.computer.org/cga

Page 51: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

www.computer.org/computingedge 49

38mcg06-li-2874514.3d (Style 4) 26-03-2019 19:51

The paths that connected both sides show the percentages of students who graduated with a particularcollege major(s) and obtained a specific job position(s). The college/major and occupation/occupational group were embodied in the two content-rich side bars. Clicking on a college expand thecollege into majors.

Characteristics plots [Figures 2(b), 2(c), 2(d), and 2(e)] provide users with detailed information aboutthe colleges, majors, occupational groups, and occupations. For the verbal and quantitative scores, weuse scatter plots, one for the college side and another for the occupational side. Dots in the plotrepresent majors or occupations. The color of a dot is based on the major/occupation’s requirement ofverbal and quantitative skills. For characteristics like salary, SAT score, and GPA, we took advantageof their 10th, 25th, 50th, 75th, and 90th percentile data and use the box plot for their visualization.Users can not only compare the differences between majors and occupations, but they can also viewthe data distribution within the major or occupation.

The accordion6 [Figure 2(f)] was introduced to represent many characteristics of majors andoccupations. With the accordion, the system can contain numerous characteristics’ charts within arelatively small space. Users can expand the characteristics they want and fold those in which theyhave no interest. An ordinary PC or laptop screen can hold four characteristics charts at the same time.The most important characteristics are opened by default on top of the list when users enter the system.If a user opens several charts that extended beyond the screen, they can scroll down the screen. Thesystem automatically adjusts the position of the central flow visualization part and keep it centered inthe current window.

Color is used to encode the two basic skills—quantitative skills and verbal skills—required byeach occupation and major. If one major/occupation requires more quantitative skills, its color is

Figure 2. Overview of CareerVis system with the following six sections: (a) career flow;(b) major quantitative/verbal; (c) occupation quantitative/verbal; (d) major characteristics;(e) occupation characteristics; (f) accordion of characteristic plots.

APPLICATIONS

November/December 2018 99 www.computer.org/cga

38mcg06-li-2874514.3d (Style 4) 26-03-2019 19:51

occupational groups and occupations. However, the horizontal design presented several problems suchas the interface layout generated unnecessary information overlap.

To better utilize screen space and represent characteristics, we developed another version.The main design idea of hierarchical flow remains but was rotated into a vertical presentation.To improve the design of side characteristics, we brainstormed many solutions [Figure 1(c)].Ultimately, we selected a relatively intuitive option that featured the direct relationship betweenthe line and value to show the characteristics of verbal, quantitative, and reasoning skills[Figure 1(d)]. The straight line would be highlighted with bright red when hovering on aparticular major or occupation. Additionally, we presented other characteristics by bar graphs.Based on interviews with 64 participants, 90% of users were more satisfied with the verticaldesign. We further enhanced this design to address some remaining problems with theimplementation of interactions, mainly the lack of a comparison function and the fact that once auser clicked on a college or an occupation group, the block expanded suddenly, which causedthe user to lose visual momentum due to a sudden change of the visualization.

VISUAL COMPONENTSOur resulting CareerVis user interface provided multiple views for data exploration [Figure (2)]. Thecentral flow view displayed the hierarchical levels of colleges, majors, occupational groups, andoccupations, as well as the one-to-one relationship between major and occupation. Each particularmajor or occupation featured a complete description. All relevant characteristics of majors andoccupations were presented by scatter plots, box plots, and bar charts.5 In the top view, the systemprovided a guide and a search function. The system is developed using d3 (d3js.org).

Figure 2(a) shows the breadth of occupations chosen by students after graduating from college. In thecentral section, our team combined three essential visual components:

1) the rectangular blocks of the Purdue colleges and majors on the left side, where lengths ofblocks represent the number of students that have graduated;

2) the similar visual element of the occupational groups and occupations on the right side,where lengths represented the number of students in the occupational group; and

3) the connection paths in the central region.

Figure 1. CareerVis’s early design concepts and iteration: (a) several concept designs;(b) horizontal layout; (c) better solutions for characteristic plots of vertical design;(d) vertical layout.

IEEE COMPUTER GRAPHICS AND APPLICATIONS

November/December 2018 98 www.computer.org/cga

Page 52: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

50 ComputingEdge May 2019

38mcg06-li-2874514.3d (Style 4) 26-03-2019 19:51

bluer. Yellow means the major/occupation requires balanced quantitative and verbal skills,whereas red means the major/occupation requires more verbal skills. The saturation of colorrepresents the strength of skills these majors/occupations required. The quantitative/verbalCartesian coordinate system is mapped into a hue (blue to yellow to red) saturation polarcoordinate system. The radius (saturation) is computed by the distance of the quantitative/verbal(X/Y) to the origin (0, 0). The hue is computed by the angle of the quantitative/verbal point tothe X-axis (verbal). Colors are featured consistently across all sections of the quantitative/verbalscatter plot, characteristic graphs, and center major/occupation flows.

INTERACTION AND ANIMATION

Brushing and LinkingBrushing and linking allow users to locate a major or occupation from the side charts and verifythe corresponding values.7,8 The system’s brushing and linking occur when users hover over abar in the center diagram, and the corresponding side chart elements are highlighted. When usershover over the College of Engineering in the center diagram, for example, the circle of majors inthe corresponding scatter plot are highlighted by a thin black stroke and other circles fade[Figure 3(a)], and the bars of the College of Engineering are highlighted in every openedcharacteristic chart by a gray line. The values of each characteristic are shown at the top of eachgray line [Figure 3(b)], which allows users to easily confirm the exact values. Brushing andlinking are active within both levels of the chart, which means that when hovering over acollege, occupation, or major with an open center chart, the corresponding elements are all behighlighted in the charts of the corresponding sides.

Figure 3. Brushing and linking of (a) scatter plot; (b) other characteristics charts.

IEEE COMPUTER GRAPHICS AND APPLICATIONS

November/December 2018 100 www.computer.org/cga

Page 53: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

www.computer.org/computingedge 51

38mcg06-li-2874514.3d (Style 4) 26-03-2019 19:51

FocusA focus stage was added to the bars for when users hover over the parallel sets. When a bar isfocused, the transparency of the paths linked to this bar increases, and the transparency of theother paths decreases to the extent that users can easily distinguish the focused paths from otherpaths and distributions. There are some differences in the interactions between the first andsecond hierarchies, depending on which one becomes focused, but the percentage of each pathwill be displayed.

Contexts and DetailsThe system constantly locates users and compares the current focus with related information.8

There are two categories of context maintenance. The first is used in the flow path of theSankey diagram [Figure 4(a)] and the scatter plot [Figure 4(b)]; the second is applied to thebar set of the Sankey diagram [Figure 4(c)], box plots, and bar charts of the second-leveldisplay [Figure 4(d)]. For the flow path, as mentioned above, when a bar set is focused, thetransparency of the connected paths increases, and the other paths become transparent. Wemaintain the paths as light background context elements. We use the same strategy ofhighlighting the selected circles and fade the others within the scatterplot. As for the twolevels, we keep the first level elements displayed when the second level is opened. In thecenter Sankey diagram, the unselected first-level bars are shrunk and faded. In the box plotsand bar charts, the unselected first-level bars are shrunk and moved to the left or right basedon their position relative to the selected bar.

Figure 4. Zoom in for contextual details: (a) central flow of majors in one college tooccupations in a group; (b) scatter plot highlighting focused majors and occupations;(c) context of other college and occupation groups; (d) detailed characteristics of occupationswithin the context of all other groups.

APPLICATIONS

November/December 2018 101 www.computer.org/cga

38mcg06-li-2874514.3d (Style 4) 26-03-2019 19:51

bluer. Yellow means the major/occupation requires balanced quantitative and verbal skills,whereas red means the major/occupation requires more verbal skills. The saturation of colorrepresents the strength of skills these majors/occupations required. The quantitative/verbalCartesian coordinate system is mapped into a hue (blue to yellow to red) saturation polarcoordinate system. The radius (saturation) is computed by the distance of the quantitative/verbal(X/Y) to the origin (0, 0). The hue is computed by the angle of the quantitative/verbal point tothe X-axis (verbal). Colors are featured consistently across all sections of the quantitative/verbalscatter plot, characteristic graphs, and center major/occupation flows.

INTERACTION AND ANIMATION

Brushing and LinkingBrushing and linking allow users to locate a major or occupation from the side charts and verifythe corresponding values.7,8 The system’s brushing and linking occur when users hover over abar in the center diagram, and the corresponding side chart elements are highlighted. When usershover over the College of Engineering in the center diagram, for example, the circle of majors inthe corresponding scatter plot are highlighted by a thin black stroke and other circles fade[Figure 3(a)], and the bars of the College of Engineering are highlighted in every openedcharacteristic chart by a gray line. The values of each characteristic are shown at the top of eachgray line [Figure 3(b)], which allows users to easily confirm the exact values. Brushing andlinking are active within both levels of the chart, which means that when hovering over acollege, occupation, or major with an open center chart, the corresponding elements are all behighlighted in the charts of the corresponding sides.

Figure 3. Brushing and linking of (a) scatter plot; (b) other characteristics charts.

IEEE COMPUTER GRAPHICS AND APPLICATIONS

November/December 2018 100 www.computer.org/cga

Page 54: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

52 ComputingEdge May 2019

38mcg06-li-2874514.3d (Style 4) 26-03-2019 19:52

Animated TransitionThe system’s animated transitions help the users understand the relationships between the two levels.9

The rich interaction causes the system to change its visual elements significantly. To maintain thecognitive coupling of the user with the system, we reinforce visual momentum by incorporatinganimated transitions in both the center diagram and the characteristic charts.10 For the center Sankeydiagram, when a college bar is opened, the college bar gradually expands to a settled length, and thesecond college bar levels, which are the majors within this college, gradually expand and occupy thecollege bar area. At the same time, other college bars shrink to the same smaller size for readability[Figure 5(a)]. The occupation side applies the same rule. The transitional animations of the characteristiccharts follow the same rule: the selected bar gradually expands and disappears, the correspondingsecond level bars gradually appear and expand, and the other first level bars shrink [Figure 5(b)]. All ofthese animations take 0.5 s, a value selected after user testing of different animation lengths.

General Information Query With the Central FlowAssume a user is a student from mechanical engineering (ME) and they want to find out whatoccupations they may have in the future. The user should first open the college ofEngineering, mouse-over to ME to see connections to occupations several occupation groups[Figure 6(a)], then open the major occupation group of Engineers [Figure 6(b)] to see the most

Figure 5. Animation design context details of the (a) central flow and (b) two-sidecharacteristics.

Figure 6. Flow of interaction in the center graph.

IEEE COMPUTER GRAPHICS AND APPLICATIONS

November/December 2018 102 www.computer.org/cga

Page 55: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

www.computer.org/computingedge 53

38mcg06-li-2874514.3d (Style 4) 26-03-2019 19:52

frequent occupations from ME. The user can then close both sides to return to the initial flowview [Figure 6(c)].

CharacteristicsAssuming a user is interested in the engineering major, they can compare the differences in verbal andquantitative skills required for the major. When they open the College of Engineering chart, severalconverging points, 0.65–0.9 verbal and 0.6–0.9 quantitative, are highlighted. When hovering on ME,the dots of 0.9 verbal and 0.9 quantitative are highlighted with a red stroke [Figure 7(a)]. Comparedwith ME, computer engineering requires on average 0.65 verbal and 0.8 quantitative [Figure 7(b)].

Moreover, when the user moves on to electrical engineering, they find that this major requires 0.75verbal and 0.8 quantitative. They decide the best possible occupation for their major is ElectricalEngineer based on these statistics [Figure 7(c)]. Furthermore, the user proceeds to the side box salaryplot and notices that the median earnings for that occupation are $65k [Figure 8(a)]. They learn theaverage hours of work per week by an electrical engineer is 43 [Figure 8(b)], and the occupation’svalue of automation sensitivity is 10 [Figure 8(c)], which means it is very sensitive to the developmentof automation. They can open up different characteristic tabs to develop their overall knowledge of thepathway. Instead of clicking on a college/occupation group in the center flow bar to see all detailedmajors and occupations, the user can click on a box or a bar in the characteristic graphs to open up thecollege/occupation in the center graph.

USER FEEDBACKIn our usability testing, we designed quantitative and qualitative questions to compareparticipants’ understandings and expectations toward the relationship between college majors andoccupations. The number of the valid participants was 68, all of whom were first-year studentswho came from Purdue University. We recorded their mouse activities during the experimentsand only nominated the participants who spent more than one minute actively in our system,while the average spending time was more than 30 min. As the result, the overall compatibility

Figure 8. Hypothetical user’s CareerVis interface flow, including the corresponding bargraphs and box plots. Characteristics of the focused element marked by gray bars(a, b, and c).

Figure 7. Hypothetical user’s CareerVis interface flow with the corresponding scatter plots.Explore and compare the values of quantitative and verbal skills between different collegemajors/ occupations (a, b, and c).

APPLICATIONS

November/December 2018 103 www.computer.org/cga

38mcg06-li-2874514.3d (Style 4) 26-03-2019 19:52

Animated TransitionThe system’s animated transitions help the users understand the relationships between the two levels.9

The rich interaction causes the system to change its visual elements significantly. To maintain thecognitive coupling of the user with the system, we reinforce visual momentum by incorporatinganimated transitions in both the center diagram and the characteristic charts.10 For the center Sankeydiagram, when a college bar is opened, the college bar gradually expands to a settled length, and thesecond college bar levels, which are the majors within this college, gradually expand and occupy thecollege bar area. At the same time, other college bars shrink to the same smaller size for readability[Figure 5(a)]. The occupation side applies the same rule. The transitional animations of the characteristiccharts follow the same rule: the selected bar gradually expands and disappears, the correspondingsecond level bars gradually appear and expand, and the other first level bars shrink [Figure 5(b)]. All ofthese animations take 0.5 s, a value selected after user testing of different animation lengths.

General Information Query With the Central FlowAssume a user is a student from mechanical engineering (ME) and they want to find out whatoccupations they may have in the future. The user should first open the college ofEngineering, mouse-over to ME to see connections to occupations several occupation groups[Figure 6(a)], then open the major occupation group of Engineers [Figure 6(b)] to see the most

Figure 5. Animation design context details of the (a) central flow and (b) two-sidecharacteristics.

Figure 6. Flow of interaction in the center graph.

IEEE COMPUTER GRAPHICS AND APPLICATIONS

November/December 2018 102 www.computer.org/cga

Page 56: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

54 ComputingEdge May 2019

38mcg06-li-2874514.3d (Style 4) 26-03-2019 19:52

of participants’ selected majors and occupations increased from 79% to 91% after using oursystem. Additionally, 13 changed their primary major selection, and 30 changed their primaryoccupation selection. They further provided feedback about how they evaluated this applicationby ranking from best to worst various aspects of this application: attractiveness, clearness,colorfulness, helpfulness, difficulties, effectiveness, and efficiency. Their responses indicated thatthis application received the highest scores in being helpful, colorful, and attractive, withdifficulty and efficiency being areas for improvement.

In 2017, the Indiana Department of Education proposed a set of learning objectives for the curriculumto prepare students for college and careers (www.doe.in.gov/sites/default/files/standards/cf-bus-facs-pcc-01-2016.pdf). Purdue curriculum specialists examined our CareerVis tool and found that the toolcould help achieve these learning objectives and that the tool would be useful to integrate into thecourse curricula to improve college and career teaching and learning.

CONCLUSIONBased on recent years’ job placement data from Purdue students, we designed and developed ourvisualization system, CareerVis, to represent the vast choices of education and pathways to theoccupation. Using innovative yet simple visual forms, we believe we solved two big challenges in thevisualization. First, our system is able to deal effectively with hundreds of majors and occupations, anda thousand possible pathways. Second, our system has proven to be easily comprehensible by ageneral audience, such as high school students, parents, and educators. Collaborating with experts ineducation, we are now working toward integrating this system with curriculum to address the IndianaDepartment of Education’s high school academic standards for Preparing for College and Careers.

ACKNOWLEDGMENTSThis work was supported by a grant to Purdue University from the Lilly Endowment Inc.The grant is part of the Lilly Endowment’s “Round III: Initiative to Promote Opportunitiesthrough Educational Collaborations.” Access the CareerVis visualization system at:va.tech.purdue.edu/careerVis.

REFERENCES1. F. A. Levy, The New Division of Labor: How Computers are Creating the Next Job Market.

Princeton, NJ, USA: Princeton Univ. Press, 2005.2. N. J. Evans, D. S. Forney, F. M. Guido, L. D. Patton, and K. A. Renn, Student Development

in College: Theory, Research, and Practice. Hoboken, NJ, USA: Wiley, 2009.3. W. A. Anderson, “Important events in career counseling: Client and counselor descriptions,”

Career Dev. Quarter., vol. 48, pp. 251–263, 2000.4. B. Lee, C. Plaisant, C. S. Parr, J. D. Fekete, and N. Henry, “Task taxonomy for graph

visualization,” in Proc. AVI Workshop Beyond Time Errors: Novel Eval. Methods Inf. Vis.,May 2006, pp. 1–5.

5. J. Heer, M. Bostock, and V. Ogievetsky, “A tour through the visualization zoo,” Queue,vol. 8, no. 5, p. 20, 2010.

6. A. A. Cooper, About Face: The Essentials of Interaction Design. Hoboken, NJ, USA: Wiley,2014.

7. A. Buja, D. Cook, and D. F. Swayne, “Interactive high-dimensional data visualization,”J. Comput. Graph. Statist., vol. 5, no. 1, pp. 78–99, 1996.

8. J. S. Yi, Y. ah Kang, and J. Stasko, “Toward a deeper understanding of the role ofinteraction in information visualization,” IEEE Trans. Vis. Comput. Graph., vol. 13, no. 6,pp. 1224–1231, Nov./Dec. 2007.

9. J. Stasko and E. Zhang, “Focusþ context display and navigation techniques for enhancingradial, space-filling hierarchy visualizations,” in Proc. IEEE Symp. Inf. Vis., 2000, pp. 57–65.

10. D. D. Woods, “Visual momentum: A concept to improve the cognitive coupling of personand computer,” Int. J. Man-Mach. Studies, vol. 21, no. 3, pp. 229–244, 1984.

IEEE COMPUTER GRAPHICS AND APPLICATIONS

November/December 2018 104 www.computer.org/cga

Page 57: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

www.computer.org/computingedge 55

38mcg06-li-2874514.3d (Style 4) 26-03-2019 19:52

ABOUT THE AUTHORS

Mingran Li is currently working toward the Ph.D. degree with the research focus oninformation visualization design at Purdue University, West Lafayette, IN, USA. Contacther at [email protected].

Wenjie Wu is a User Experience Designer. She received the Master of Science degreefrom Purdue University, West Lafayette, IN, USA. Contact her at [email protected].

Junhan Zhao is currently working toward the Ph.D. degree at Polytechnic Institute,Purdue University, West Lafayette, IN, USA. Contact him at [email protected].

Keyuan Zhou is a Research Assistant with the Polytechnic Institute, Purdue University,West Lafayette, IN, USA. Contact him at [email protected].

David Perkis is Director of the Purdue Center for Economics, Purdue University, WestLafayette, IN, USA. Contact him at [email protected].

Timothy N. Bond is an Assistant Professor with the Economics Krannert School ofManagement, Purdue University, West Lafayette, IN, USA. Contact him [email protected].

Kevin Mumford is Director of the Purdue University Research Center in Economics(PURCE) , West Lafayette, IN, USA. Contact him at [email protected].

David Hummels is Dean and Professor of economics with Purdue University, WestLafayette, IN, USA. Contact him at [email protected].

Yingjie Victor Chen is an Associate Professor with the Department of ComputerGraphics Technology, Purdue University, West Lafayette, IN, USA. Contact him [email protected].

Contact department editor Mike Potel at [email protected].

November/December 2018 105 www.computer.org/cga

APPLICATIONS

38mcg06-li-2874514.3d (Style 4) 26-03-2019 19:52

of participants’ selected majors and occupations increased from 79% to 91% after using oursystem. Additionally, 13 changed their primary major selection, and 30 changed their primaryoccupation selection. They further provided feedback about how they evaluated this applicationby ranking from best to worst various aspects of this application: attractiveness, clearness,colorfulness, helpfulness, difficulties, effectiveness, and efficiency. Their responses indicated thatthis application received the highest scores in being helpful, colorful, and attractive, withdifficulty and efficiency being areas for improvement.

In 2017, the Indiana Department of Education proposed a set of learning objectives for the curriculumto prepare students for college and careers (www.doe.in.gov/sites/default/files/standards/cf-bus-facs-pcc-01-2016.pdf). Purdue curriculum specialists examined our CareerVis tool and found that the toolcould help achieve these learning objectives and that the tool would be useful to integrate into thecourse curricula to improve college and career teaching and learning.

CONCLUSIONBased on recent years’ job placement data from Purdue students, we designed and developed ourvisualization system, CareerVis, to represent the vast choices of education and pathways to theoccupation. Using innovative yet simple visual forms, we believe we solved two big challenges in thevisualization. First, our system is able to deal effectively with hundreds of majors and occupations, anda thousand possible pathways. Second, our system has proven to be easily comprehensible by ageneral audience, such as high school students, parents, and educators. Collaborating with experts ineducation, we are now working toward integrating this system with curriculum to address the IndianaDepartment of Education’s high school academic standards for Preparing for College and Careers.

ACKNOWLEDGMENTSThis work was supported by a grant to Purdue University from the Lilly Endowment Inc.The grant is part of the Lilly Endowment’s “Round III: Initiative to Promote Opportunitiesthrough Educational Collaborations.” Access the CareerVis visualization system at:va.tech.purdue.edu/careerVis.

REFERENCES1. F. A. Levy, The New Division of Labor: How Computers are Creating the Next Job Market.

Princeton, NJ, USA: Princeton Univ. Press, 2005.2. N. J. Evans, D. S. Forney, F. M. Guido, L. D. Patton, and K. A. Renn, Student Development

in College: Theory, Research, and Practice. Hoboken, NJ, USA: Wiley, 2009.3. W. A. Anderson, “Important events in career counseling: Client and counselor descriptions,”

Career Dev. Quarter., vol. 48, pp. 251–263, 2000.4. B. Lee, C. Plaisant, C. S. Parr, J. D. Fekete, and N. Henry, “Task taxonomy for graph

visualization,” in Proc. AVI Workshop Beyond Time Errors: Novel Eval. Methods Inf. Vis.,May 2006, pp. 1–5.

5. J. Heer, M. Bostock, and V. Ogievetsky, “A tour through the visualization zoo,” Queue,vol. 8, no. 5, p. 20, 2010.

6. A. A. Cooper, About Face: The Essentials of Interaction Design. Hoboken, NJ, USA: Wiley,2014.

7. A. Buja, D. Cook, and D. F. Swayne, “Interactive high-dimensional data visualization,”J. Comput. Graph. Statist., vol. 5, no. 1, pp. 78–99, 1996.

8. J. S. Yi, Y. ah Kang, and J. Stasko, “Toward a deeper understanding of the role ofinteraction in information visualization,” IEEE Trans. Vis. Comput. Graph., vol. 13, no. 6,pp. 1224–1231, Nov./Dec. 2007.

9. J. Stasko and E. Zhang, “Focusþ context display and navigation techniques for enhancingradial, space-filling hierarchy visualizations,” in Proc. IEEE Symp. Inf. Vis., 2000, pp. 57–65.

10. D. D. Woods, “Visual momentum: A concept to improve the cognitive coupling of personand computer,” Int. J. Man-Mach. Studies, vol. 21, no. 3, pp. 229–244, 1984.

IEEE COMPUTER GRAPHICS AND APPLICATIONS

November/December 2018 104 www.computer.org/cga

This article originally appeared in IEEE Computer Graphics and Applications, vol. 38, no. 6, 2018.

Page 58: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

72 May 2019 Published by the IEEE Computer Society 2469-7087/19/$33.00 © 2019 IEEE

I EEE Computer Society conferences are valuable forums for learning on broad and dynamically shifting topics from within the computing profession. With over 200 conferences featuring leading

experts and thought leaders, we have an event that is right for you.

JUNE2 June

• ICESS (IEEE Int’l Conf. on Embedded Soft-ware and Systems) ◗

• JCDL (ACM/IEEE Joint Conf. on Digital Libraries) ◗

3 June• AIKE (IEEE Second Int’l Conf. on Artifi cial

Intelligence and Knowledge Eng.) ●5 June

• CBMS (IEEE 32nd Int’l Symposium on Com-puter-Based Medical Systems) ●

9 June• WoWMoM (IEEE 20th Int’l Symposium on

“A World of Wireless, Mobile and Multime-dia Networks”) ◗

10 June• ARITH (IEEE 26th Symposium on Computer

Arithmetic) ▲• ICHI (IEEE Int’l Conf. on Healthcare Infor-

matics) ▲• MDM (20th IEEE Int’l Conf. on Mobile Data

Management) ▲12 June

• ICIS (IEEE/ACIS 18th Int’l Conf. on Computer and Information Science) ▲

• SMARTCOMP (IEEE Int’l Conf. on Smart Computing) ◗

• WETICE (IEEE 28th Int’l Conf. on Enabling Technologies: Infrastructure for Collaborative Enterprises) ●

15 June• CVPR (IEEE/CVF Conf. on Computer Vision

and Pattern Recognition) ◗16 June

• SASO (IEEE 13th Int’l Conf. on Self-Adaptive and Self-Organizing Systems) ●

17 June• EuroS&P (IEEE European Symposium on

Security and Privacy) ●21 June

• CSCloud (6th IEEE Int’l Conf. on Cyber Secu-rity and Cloud Computing) ●

• EdgeCom (5th IEEE Int’l Conf. on Edge Com-puting and Scalable Cloud) ●

22 June• ISCA (ACM/IEEE 46th Annual Int’l Sympo-

sium on Computer Architecture) ◗24 June

• DSN (2019 49th Annual IEEE/IFIP Int’l Conf. on Dependable Systems and Networks) ◗

• ECMSM (IEEE Int’l Workshop of Electron-ics, Control, Measurement, Signals and their application to Mechatronics) ●

• IC2E (IEEE Int’l Conf. on Cloud Eng.) ●• LICS (2019 34th Annual ACM/IEEE

Conference CalendarQuestions? Contact [email protected]

Find a region: Africa ■Asia ▲

Australia ◆Europe ●

North America ◗South America ★

Page 59: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

www.computer.org/computingedge 73

Learn more about IEEE Computer Society Conferenceswww.computer.org/conferences

Symposium on Logic in Computer Science) ◗25 June

• CSF (IEEE 32nd Computer Security Founda-tions Symposium) ◗

JULY 8 July

• ICME (IEEE Int’l Conf. on Multimedia and Expo) ▲

• ICMEW (IEEE Int’l Conf. on Multimedia & Expo Workshops) ▲

• SERVICES (IEEE World Congress on Ser-vices) ●

• SNPD (20th IEEE/ACIS Int’l Conf. on Soft-ware Eng., Artificial Intelligence, Networking and Parallel/Distributed Computing) ▲

15 July • ASAP (IEEE 30th Int’l Conf. on Application-specific Systems, Architectures and Proces-sors) ◗

• CBI (IEEE 21st Int’l Conf. on Business Infor-matics) ▲

• COMPSAC (IEEE 43rd Annual Computer Soft-ware and Applications Conf.) ◗

• ICALT (19th IEEE Int’l Conf. on Advanced Learning Technologies) ★

• ISVLSI (IEEE Computer Society Annual Sym-posium on VLSI) ◗

23 July • ICCI*CC (IEEE 18th Int’l Conf. on Cognitive Informatics & Cognitive Computing) ●

30 July • IRI (IEEE 20th Int’l Conf. on Information Reuse and Integration for Data Science) ◗

• SMC-IT (IEEE Int’l Conf. on Space Mission Challenges for Information Technology) ◗

AUGUST1 August

• CSE (IEEE Int’l Conf. on Computational Sci-ence and Eng.) ◗

• EUC (IEEE Int’l Conf. on Embedded and Ubiq-uitous Computing) ◗

5 August • TrustCom (IEEE Int’l Conf. on Trust, Security and Privacy in Computing and

Communications) ◆8 August

• 2019 Cloud Summit ◗9 August

• SmartIoT (IEEE Int’l Conf. on Smart Internet of Things) ▲

10 August • HPCC (IEEE 21st Int’l Conf. on High Perfor-mance Computing and Communications) ▲

• SmartCity (IEEE 17th Int’l Conf. on Smart City) ▲

• DSS (IEEE 5th Int’l Conf. on Data Science and Systems) ▲

15 August • NAS (IEEE Int’l Conf. on Networking, Architec-ture and Storage) ▲

18 August • HCS (IEEE Hot Chips 31 Symposium) ◗ • RTCSA (IEEE 25th Int’l Conf. on Embedded and Real-Time Computing Systems and Appli-cations) ▲

27 August • ASONAM (IEEE/ACM Int’l Conf. on Advances in Social Networks Analysis and Mining) ◗

SEPTEMBER13 September

• EWDTS (IEEE East-West Design & Test Sym-posium) ◗

19 September • AVSS (16th IEEE Int’l Conf. on Advanced Video and Signal Based Surveillance) ▲

• ESEM (ACM/IEEE Int’l Symposium on Empir-ical Software Eng. and Measurement) ★

ce4con.indd 73 4/23/19 10:18 AM

Page 60: > Internet of Things > Blockchain > Social Media · an Internet of Things (IoT) deploy-ment in a tomato greenhouse in Russia. The IoT-enabling tech-nologies in this deployment are

Canadian IEEE members can visit www.ieeeinsurance.com/canadapl for more information about the insurance program brokered by Marsh Canada Limited and underwritten by Certain Underwriters at Lloyd’s of London.

* The IEEE Member Professional Liability Insurance Program with the Choice Platform is available to active IEEE members who reside in the U.S. IEEE members in Canada (excluding Quebec) have access to the IEEE Member Professional Liability Insurance Plan through Marsh Canada Limited. Coverage options may vary or may not be available in all states. Not all plan features will be available under all carriers or plan options.

Program Administered by Mercer Health & Benefits Administration LLC

In CA d/b/a Mercer Health & Benefits Insurance Services LLC AR Insurance License #100102691 | CA Insurance License #0G39709

85777 (5/19) Copyright 2019 Mercer LLC. All rights reserved.

IEEE Member Professional Liability Insurance Plan.Protect what you’ve worked so hard to achieve.

To learn more*,

call 1-800-375-0775 or visit IEEEinsurance.com/IEEEPL

Preserve your good name.

Mind your business.

85777 IEEE Computing Edge Professional Liability Ad (5/19) Trim Size: 7.875” x 10.75”; Bleeds: .125, Bleed: 8.125” x 11” Live Area: 7x10”; 4 color process, cmyk

85777 IEEE Even If-PL Computing.indd 1 4/4/19 4:37 PM