Factors that Affect Control Valve Pressure Drop

Introduction

A control valve is an important device that regulates the flow rate of fluid that passes through a given pipe or aperture. Depending on the nature of fluid and function, users have to consider numerous attributes of control valves [1]. The association between stem travel and control valves determines flow characteristics and pressure drop [2]. According to Monsen [3], the pressure drop in control valves is dependent on inherent and installed features. Moreover, the pressure drop in a fluid that goes through a control valve is subject to numerous factors, relating to the design of aperture, type of fluid, piping system of fluid, temperature, and pressure. Therefore, it is evident that a combination of characteristics of the control valve, installation system, and attributes of fluid are vital factors that influence pressure drop in control valves.

Inherent Characteristics of Valves

Valves have inherent characteristics that are dependent on the engineering design. Manufacturers incorporate engineering features on valves to ensure that the low rate of fluid has constant pressure and delivers a continuous volume of fluid [3]. Control valves with equal stem travel and uniform flow rate tend to generate constant pressure. However, valves with unequal stem travel and variable flow rate cause a high degree of pressure drop. A control valve with an ideal characteristic assumes constant pressure and uniform flow rate without the influence of systemic effects. Nevertheless, the existence of pressure drop owing to variation in aperture size and flow rate of fluid distorts the ideal characteristic of a pressure valve. A control valve can also cause a non-linear relationship between flow rate and stem travel, owing to different levels of pressure drop. In a non-linear relationship, small changes in stem travel at lower levels cause small rises in the flow rates, while substantial changes in stem travel at higher readings lead to

significant upsurges in the flow rate [2], [3]. In this case, the stem travel of a control valve determines the pressure drop and flow rate increases.

The purpose of engineering design is to ensure that stem travel and changes in the flow rate have a linear relationship with a constant pressure drop. For instance, globe valves exist in designs that allow linear and non-linear relationships in stem travel and the flow rate of fluids (Table 1) [3], [4]. In contrast, rotary valves are available in fixed forms that do not provide for versatility in the regulation of flow rates. Control valves that employ the design of full or segmented balls depict relationships of non-linear, which show an equal percentage increase in the flow rate over stem travel [3]. Additionally, butterfly valves with high performance adopt a moderate relationship that occurs between linear and equal percentage curves [3]. Hence, the design determines the inherent characteristic and influences the pressure drop of control valves.

Table 1: Types of Valves and Their Characteristics

Types of Valves Characteristics
Globe valves Linear and equal percentage trends
Rotary valves Linear trend
Ball valves Equal percentage trend

Installed Characteristic of Valve

Installed characteristic is also another factor that influences the pressure drop in the control valve. During manufacturing, the design features of control valves assume the existence of constant pressure and uniform flow rate of fluid in a system for a linear relationship to occur. However, the functioning of control valves is dependent on their installation in different systems with variable flow rates and pressure drops. Monsen [3] defines installed characteristics as a product of the flow rate, inlet pressure, valve position, centrifugal force, and piping pressure losses of the specific system. A significant pressure drop occurs when the flow rate is low, inlet pressure is small, the valve position is distant, centrifugal force is minimal, and the piping system is extended. In installing control valves, engineers have to consider numerous factors that influence pressure drop. The overall objective of the effective installation of control valves is to optimize pressure by ensuring there are minimal losses for optimal flow rates of fluid within a system.

Stem travel and pressure exhibit negative relationships in a valve with installed characteristics. Pressure in a pipe system has a negative association with the magnitude of the size of the aperture in the control valve. When the control valve is slightly open, the pressure is high, and the flow rate is low. In contrast, when the control valve is wide open, the pressure is low, and the flow is high. Variation in the degree of opening the control valve does influence not only the flow rate but also the pressure drop in a system with a lot of piping. Consequently, the interaction between the piping system and the control valve creates a characteristic of that approaches the linear trend [3]. A comparison of the control valves reveals that those with a lot of piping systems exhibit a pattern of equal percentage, while those with little piping system depict the trend of a linear relationship (Table 2).

Table 2: Installed Valve and Flow Characteristics

Piping System Flow Characteristics
Little piping system Linear relationship
A lot of piping system Equal percentage relationship

Attributes of Fluid

The type of fluid regulated by the control valve affects the pressure drop in various systems. Gas and liquid are two types of fluids that dictate the degree of pressure drop across different types of control valves. Pressure drop is high in liquids than gases owing to their differences in the degree of viscosity [5]. In large volumes, liquids exhibit a trend of equal percentage, while gases depict a linear trend in the flow rate owing to differences in pressure drop (Table 3) [6]. Temperature affects the pressure drop by varying the viscosity and the density of the fluid in the control valve [6]. High temperatures reduce the viscosity and the density of the fluid, and consequently decrease the pressure drop in a flow system. On the other hand, low temperatures increase the thickness and the density of the fluid, leading to an increased pressure drop across the control valve.

Table 3: Type of Liquid and Flow Characteristics

Type of Fluid Flow Characteristics
Liquid Equal percentage trend
Gas (large volumes and greater pressure drop) Linear trend

Conclusion

A critical examination of the control valve shows that it varies in design, installation, and the nature of fluid it controls. These variable factors affect the pressure drop across a given control valve. Manufacturers design the control valves to ensure that the pressure drop does not influence the flow rate of fluid they regulate. Installation of the control valve in a piping system requires consideration of the size and length of pipes to avert pressure losses and significant pressure drop. The use of liquids and gases as fluids to regulate by the control valve influence the pressure drop. While liquids have a lot of pressure drop due to viscosity and high density, gases tend to have a low level of pressure drop. Therefore, the design features of the control valve, the size of the installation system, and types of fluid are significant factors that affect the pressure drop in control valves.

Reference List

  1. F. Hamad, F. Faraji, C. G. S. Santim, N. Basha, and Z Ali, Investigation of pressure drop in horizontal pipes with different diameters, International Journal of Multiphase Flow. 91, pp. 120-129, 2017.
  2. Engineering ToolBox, , [Online], Web.
  3. J. Monsen,  2015. [Online] Web.
  4. J. Praveen, Flow coefficient analysis for a globe valve by using CFD, International Journal of Science and Research, vol. 6, pp. 757-763, 2015.
  5. D. Hellmann and D. Agar, David, , Chemical Engineering and Technology, vol. 42, no. 10, pp. 2138-2145, 2019. [Online], Web.
  6. D. Harrold, , [Online] Web.

Engineering Hardware Identification

Executive Summary

Construction of structures and technical devices applied in engineering entails the use of different materials. These materials are of different sizes, shapes, textures, and other characteristics, which help in strengthening structures. Selecting the right materials for use in a certain project is essential because they influence the durability, toughness, and hardness of engineering structures. This study explores three hardware materials to understand their characteristics, basic types, and how they are used. The three materials explored are bearings, rivets, and shafts. The report ends with a conclusion and recommendations on what engineers should do to utilize these components fully.

Introduction

There is a wide range of materials available to engineers. Ashby (2010) opined that there are more than 160,000 engineering materials. Therefore, engineers have to understand the best materials suited for their purpose. In such cases, there are various standardization, design rules, as well as previous experiences, applied when selecting materials. Additionally, Ashby (2010) argued that the choice of materials is not independent of the process in which the material is to be shaped, joined, and finished. Other factors involved in selecting the materials include personal preferences such as texture, form, color, and feel, which is evident in automobiles or other appliances used by people.

In the early days, humans used crude materials such as stones, metals, or wood because they were naturally available. However, the growth of innovative design has enabled people to invest in ways of making natural materials stronger quality and in different types, which are used in a wide range of applications like the construction of buildings, bridges, airplanes, automobiles, and home appliances. According to Callister Jr and Rethwisch (2015), solid materials are categorized into six groups that include mechanical, thermal, electrical, deteriorative, and magnetic. For instance, some of the materials, like gears and chains, are linked together to produce the desired motions in rigid structures. This paper examines three engineering hardware components, which include bearings, rivets, and gears. The key characteristics, dimensions, and applications of these materials are analyzed and presented in the subsequent sections.

Bearings

Bearings are commonly used in supporting moving elements in machines known as journals. Bearings permit relative motion between the contact surfaces of the members while carrying the load (Chaudhari et al., 2015). Relative motion between surfaces exposes them to wear and tear because of the present frictional resistance, which can be reduced by applying lubricants. According to Chaudhari et al. (2015), greases, vegetable oils, mineral oil refined from petroleum, and silicon oils are used as lubricants. Lubricants help in reducing friction and improving the rotation of the surface.

The bearings are classified into four main types. Harris and Kotzalas (2006) explained these types as ball bearings, roller bearings, linear motion bearings, and bearings for special applications. Ball bearings comprise outer and inner surfaces with steel balls placed between the two metallic rings. Ball bearings are useful in reducing rotational friction and support both radial and axial loads. The ball bearings are further subdivided into single-row, double-row, double-row self-aligning, as well as single and double-row angular contact bearings. On the other hand, roller bearings are commonly used in industrial bearings because they carry a load by placing the round elements between two surfaces. The movement of the two pieces rolls the round elements, which helps in carrying the load. Additionally, roller bearings have a higher load capacity compared to ball bearings.

All bearings are expected to meet certain standards to be considered fit for use in machinery and appliances. These standards check the size, finish, and diameter requirements in bearings, among other features. Some examples include AFBMA (Anti-Friction Bearing Manufacturers Association) standards 9 and 11 concerned with load ratings and fatigue life for the ball and roller bearings, respectively (Autodesk, 2019). Figure 1 shows the ball and roller bearings.

Gears
Figure 1: Gears

Rivets

Rivets are used in connecting structural elements, and they are preferred in industries because of their low costs. The rivets are designed as a smooth cylindrical shaft with one end as the head. Common rivet heads include a button, flat, truss, pan, and countersunk. They are inserted into predrilled holes, and the tail section is deformed to expand at least 1.5 times the original shaft diameter (Troughton, 2008). The larger the rivet head, the lower the stresses on the surface because the load is distributed over a larger area. The rivets are cost-effective, especially because of the large volume and high-speed assembly. They are also less susceptible to vibrational loosening as experienced by bolts and screws.

There are several types of rivets each used in different areas. According to Universal Rivets (2020), roller assembly rivets are suited for high-speed assembly operations, and they fasten two or more pieces. Solid rivets are easily deformed with a hammer, and they have used indoor hinges and pulley applications. Structural steel rivets are used in fastening metal structures like aircraft, ships, and buildings. Other types include collar rivets, shoulder rivets, and cross-drilled rivets. Rivets are governed by several standards, such as the ISO/TR 12198:1998, which defines the rivet materials used in aerospace. The ISO 10299:2000 defines the material and metric series on solid rivets in aerospace construction (ANSI 2020). Figure 2 shows a rivet before and after the tail is deformed.

Rivets
Figure 2: Rivets

Gears

Gears are machine elements that transmit rotary motion using successively engaging teeth, usually at constant speeds. They are of different shapes and sizes and are classified into three categories. The first category is parallel shaft gears with examples such as spur, helical, herringbone, as well as rack and pinion gears. Spur gears consist of two shafts in parallel with straight teeth that are parallel to the axes of rotation of the shaft (Uicker et al., 2011). They are used in clocks, power plants, clothes washing and drying machines, aircraft, and trains. The second type is intersecting shaft gears that include straight bevel and spiral bevel gears. Bevel gears are used to transmit force between two shafts that intersect at one point. The third type is neither parallel nor interesting shafts consists of crossed-helical, hypoid, as well as worms and worm gears (Zhang et al., 2003). The design, building, and maintenance of gears are governed by certain international standards. The American Gear Manufacturers Association (AGMA) standards specify the tooth thickness and size, relationships between dedendum and addendum, fillet radius, and shapes, among others. Figure 3 shows different examples of gears.

Different gear types
Figure 3: Different gear types

Conclusion

In conclusion, this paper shows that all three hardware are essential materials in the engineering and construction industries. The paper shows different types of these materials and where they can be applied efficiently in different areas, especially in the transportation sector. I would recommend the engineers and contractors to read widely on these three hardware materials because they each provide unique advantages and limitations as compared to their alternatives.

References List

ANSI (2020) .

Ashby, M. (2010) Materials Selection in Mechanical Design. Butterworth-Heinemann.

Autodesk (2019) .

Callister Jr, W.D. and Rethwisch, D.G. (2015) Fundamentals of materials science and engineering: an integrated approach. John Wiley & Sons.

Chaudhari, C.P., Thakare, B.B., Patil, S.R. and Gunjal, S.U. (2015), International Journal of Advance Research in Science and Engineering, vol.4, no.1.

Harris, T.A. and Kotzalas, M.N. (2006) Essential concepts of bearing technology. CRC press.

Troughton, M.J., (2008) Handbook of plastics joining: A practical guide. William Andrew.

Uicker, J. J., Pennock, G. R., & Shigley, J. E. (2011) Theory of machines and mechanisms (Vol. 1). New York: Oxford University Press.

Universal Rivet (2020) .

Zhang, Y., Finger, S. and Behrens, S. (2003) Introduction to mechanisms (pp. 39-245). Carnegie Mellon University.

Electronic Monitorin

Electronic monitoring is an intermediate sanction that applies to offenders as an alternative to incarceration. Electronic monitoring can be used as a pretrial or post-trial measure depending on the circumstances. This sanction is used for offenders in all fifty states and can monitor location, blood alcohol level, or breath (Electronic Frontier Foundation, 2019). The sanction is used for mild offenders, such as drunk drivers (Homant, 2013). The sanction usually monitors the location of an offender using GPS and Secure Continuous Remote Alcohol Monitoring (SCRAM) to make sure that the offender stays away from restricted areas and does not take any alcohol (Electronic Frontier Foundation, 2019). The benefits of the sanction are evident, as the offenders have a chance to stay with family members, continue working, and be a part of the community (Electronic Frontier Foundation, 2019). Electronic monitoring helps to avoid the stigma associated with incarceration and helps to control the population of prisons. However, there are some controversial situations where a person may need to enter a restricted area to perform his or her job duties, pick up an elderly relative during bad weather, or take a sick child to the hospital. Moreover, electronic monitoring may impede a convicts ability to go to job interviews, access employment and education, receive medical treatment, and participate in family or community life (Electronic Frontier Foundation, 2019).

I believe that benefits outweigh the drawbacks as electronic monitoring is associated with fewer expenses to the government and less restriction to the offender in comparison with incarceration. Technology plays the central part in supervising drunk drivers, as electronic monitoring would be impossible without GPS and SCRAM technologies. Even though in this case, technology does lead to better outcomes in comparison with incarceration, technology does not always lead to better community supervision outcomes. In particular, monitoring offenders locations requires the close attention of the supervisors. However, supervisors do not always have enough time due to increased workload.

References

Electronic Frontier Foundation. (2019). . EFF.

Homant, R. (2013). . The Encyclopedia of Criminology and Criminal Justice, 1-5.

The Affect of the New Technologies on the Tourism and Hospitality Industries

Introduction

It seems reasonable to state that nowadays, the tourism and hospitality industries are being affected by new technologies to a significant extent. For instance, virtual reality (VR) is playing an important role in luring customers, managing employees, and promoting. Hence, it might be relevant to design a novel application of VR within the mentioned industry, utilizing the theory of telepresence, as well as to compare it to the related currently available opportunities.

Main text

Customers always want to be sure that they will be provided with services of the highest quality. What is more, they tend to explore hotel properties via the Internet before booking. It might be assumed that the use of virtual reality to meet the above requirements is appropriate. A hotel chain may design a virtual environment (VE) that will follow the daily routine of a hotel employee  for example, a manager. This manager will fulfill his or her everyday duties significantly so that clients could fully realize the level of the chain. Then, he or she will visit all the places that customers will be allowed to attend. Such an approach will contribute to an in-depth understanding of what to expect from the hotel. A client will watch all the managers actions from the first person, being provided with a great extent of presence. The described virtual tour will be available via YouTube and the chains official website  it will promote the services to a broad range of potential customers.

It should be emphasized that the above application aligns with the telepresence theory. The latter implies the presence in an environment with the help of means of communication facilities. It is apparent that within the scope of the provided design, clients will be virtually present at the hotel, and these means of communication here are the platforms of YouTube and the official website. Moreover, this design beneficially distinguishes it from the ones available today. Usually, they provide virtual hotel tours and tourism plans (Refine, no date; Guttentag, 2010 (cited in Tussyadiah et al., 2018, p. 142))  without including the element of a managers perspective from the first person. Thus, the presented application of VR might be considered innovative.

Conclusion

In conclusion, the above design is founded on the essence of the telepresence theory. This approach made it simple to create the proper and progressive utilization of VR in the hotel industry. The core of this design is that a virtual hotel tour and the quality of services are presented from the first person and in conjunction. The latter crucial peculiarity differs it from the other ones beneficially.

Reference List

Guttentag, D. A. (2010) Virtual reality: Applications and implications for tourism, Tourism Management, 31(5), pp. 637651.

Revfine. How virtual reality is transforming the travel industry. Web.

Tussyadiah, I. P., Wang, D., Jung, T. H. and Dieck, M. C. (2018) Virtual reality, presence, and attitude change: empirical evidence from tourism, Tourism Management, 66(1), 140154.

Introduction to Information System

Introduction

Considering the fact that the modern world is the world of computes, television, mobile phones, and other devices, information technology and system is a rather crucial field. In order for ordinary people to keep up with the times and for various companies to stay competitive, it is of vital importance to know why and how to use electronic devices, as well as be aware of the advantages and disadvantages. The purpose of this paper is to briefly discuss data, information, and knowledge. Then, the pros and cons of a leader being always available for his or her employees and clients will be addressed. Finally, some facts about robots replacing human labor in the future will be provided.

Data, Information, and Knowledge

First of all, it is necessary to differentiate the concepts of data, information, and knowledge. According to the DIK pyramid, data are characteristics, most often numerical, collected through observation (Defining Knowledge, Information, Data). It is the lowest part of the pyramid, followed by information, which is actually processed data that became meaningful to the receiver or user (Defining Knowledge, Information, Data). Finally, the highest part is the knowledge that consists of data and/or information that have been organized and processed to convey understanding, experience, accumulated learning, and expertise as they apply to a current business problem (Rainer and Prince 10). Hence, these concepts are different though connected to each other.

Pros of Always Staying in Touch

Informational technologies have become an integral part of modern businesses and provided them with some crucial benefits. There are certain pros and cons of a companys leader to always be in touch with the employees and customers. The advantages include that the organizations workers feel more secured if their manager is available all the time and can help them whenever they need it. Moreover, the leader is able to solve severe problems as soon as they emerge because he or she is immediately notified by the employees. Finally, if the manager is constantly in touch with the clients, it increases their trust and desire to use this companys services.

Cons of Always Staying in Touch

As mentioned above, there are also disadvantages both for the leader and employees. First of all, if workers know that they can rely on their manager and call him or her every time something severe happens, they become less responsible and independent. Hence, if they suddenly cannot reach their leader, they may not be able to solve the problem by themselves. Second of all, if the manager states he or she is always available but does not get in touch when needed, this may ruin his or her as well as the companys reputation. Finally, the leader will not be able to live his or her own life and enjoy entirely free from work time and personal space.

Robots in Business Organizations

Since technologies are entering all the spheres of life, it becomes both easier and harder for people to manage the business on their own. That is why robots are entering various organizations, starting from farms, where they grow lettuce, and finishing with clothes and shoe shops like Adidas (Sharp). For example, Sberbank, which is one of the most significant Russian financial and tech organizations, uses robots not only for serving customers and helping employees but also for disinfecting the banks (Sberbank Combats COVID-19 with Disinfection Robots). It provides proper disinfection, lets other workers manage the banks other tasks, and guarantees employees and visitors safety.

Some people are against robots in business organizations because of being afraid they will replace human labor in the future. According to Nichols, jobs lost to robots have not been adequately replaced by new opportunities brought by robots. It means that robots are indeed occupying jobs and increase the level of unemployment. By the early 2030s, about thirty-eight percent of American jobs can be lost to automation (Nichols). Maybe not in the nearest one, but in the future, robots are likely to replace human labor.

Works Cited

Knowledge Management Tools, 2018.

Nichols, Greg. ZD Net, 2018.

Rainer, Kelly, and Brad Prince. Introduction to Information Systems. John Wiley & Sons, 2016.

East-West Digital News, 2020.

Sharp, Callum. Turbine, 2017.

Digital Divide: Homework Gap in Societys 21st Century

Currently, information and computer technology are considered to be the primary means of production. Computer literacy and ICT (information and communications technology skills) are often critical to an individuals ability to improve their social standing through education or employment. Despite the near-complete Internet penetration of some countries, not all social groups have the chance to equally enjoy the opportunities that the rise of the digital age presents. One of the aspects that require closer research is the impact of access to the Internet on academic performance. Today, homework assignments often require collecting information from the web or submitting tasks online, which can be impeded if a students family cannot afford a computer.

Rogers (2016) introduces the term digital divide to denote the new type of inequality that has emerged in the digital age. The researcher opines that technology has an ambiguous impact on todays society. On the one hand, it encourages creativity and propels individuals efforts to change their lives and the lives of others for the best. On the other hand, the lack of access to technology can be detrimental to the already marginalized groups and disenfranchise them from more privileged, tech-savvy peers. For instance, Jackson et al. (2006) found that children who do not have access to the Internet at home show worse academic results as compared to those who do.

Hill and Lawton (2018) state that while the poverty rates around the world are declining, the inequality between and within many countries is exacerbating. Hill and Lawton (2018) specifically draw attention to the purpose of education in the modern world. The researchers point out that governments are still primarily financially incentivized to support education. Since preparing cadres is seen as an international competitive advantage, these countries represent the model where inequality is the norm. Hill and Lawton (2018) are skeptical about the power of online education to tip the balance: its accessibility is contingent on the use of technology, which is again, a privilege.

References

Hill, C., & Lawton, W. (2018). Universities, the digital divide and global inequality. Journal of Higher Education Policy and Management, 40(6), 598-610.

Jackson, L. A., Von Eye, A., Biocca, F. A., Barbatsis, G., Zhao, Y., & Fitzgerald, H. E. (2006). Does home internet use influence the academic performance of low-income children?. Developmental Psychology, 42(3), 429.

Rogers, S. E. (2016). Bridging the 21st century digital divide. TechTrends, 60(3), 197-199.

Shaping the Future of UAE Through Digital Tools

Background

In this paper, the focus is on the digital transformation in the United Arab Emirates (UAE). This is seen as a pathway to the achievement of sustainability development goals (SDGs). The discussion presented adopts a sustainability perspective. The definition for the term sustainability is the efforts to reduce the environmental and other risks that seriously jeopardize the human species and to ensure the survival of future generations (Geissdoerfer, et al., 2017). In the UAE, technological advances are spearheaded by the government. Investments through UAEs digital hubs such as Dubai as seen the region achieve remarkable success in the digitization efforts.

The figure above summarizes the current trends and interests in digital transformation in the UAE (Business Transformation, 2019). The graph indicates the major areas of concern among the UAE citizens. It presents evidence that the UAE population is willing to embrace the changes. Their interest in technological changes highlights the areas with which they are most concerned. These areas are digital security and digital marketing showing a mix of both precaution and innovation. The pioneers of digital transformation in the UAE need, therefore, to assure the residents that they can benefit from the change and those precautions are taken to protect their interests. Issues like privacy and security are the major determinants of successful implementation of the digital transformation.

Impacts of COVID-19

To start the discussion about digital transformation in the UAE, it is important to acknowledge that COVID-19 has shown why digitization is vital. The pandemic has forced world economies to a standstill due to the disruptions of economic activities. Other effects felt in the UAE and across the world include lockdowns and social distancing. All aspects of human life, including education and healthcare, have had to adapt, showing how the post-COVID-19 world will look like.

The UAE has had to fast-track the pursuit of 2030 digital goals to try and achieve them in 2020 (Nair, 2020). Businesses and other public services such as health and education are adversely affected. This means there is a need to create a future that prevents such levels of vulnerability is to be avoided. New policies are needed to facilitate recovery from the pandemic.

Education is one of the major considerations in both the SDGs and UAEs digital transformation. COVID-19 has led to the closure of schools meaning the country has to halt the implementation of education policies. New methodologies and approaches are emerging in education, including online classes and virtual reality. Emerging literature on the innovative technologies for deployment in schools includes 4IR, a synonym for the Fourth Industrial Revolution. 4IR is defined as the cyber-physical systems that involve wholly new capabilities for people and machines (Mhlanga and Moloi, 2020).

Current Policies and Digital Optimization

The current policies in UAE have been founded on a number of Sustainable Development Goals (SDGs). These SDGs include quality education, affordable and clean energy, clean water and sanitation, industry, innovation, and infrastructure. Vision 2021 discussed is based on the SDG of clean energy. This is achieved by diversifies its income resources by switching from oil to cleaner energy. Vision 2030 achieves the SDG of industry, innovation, and infrastructure where the digital future is the key objective. Vision 2030 is the overarching policy guiding the countrys journey towards a digital future. The UAE needs to prepare for a future with no dependence on natural resources. This future is outlined in Vision 2030, whose pillars include sustainable knowledge economy, large and empowered private sector, and premium health care and education among others. ICTs are also integrated into these policies with digital goals, including financial technology and e-commerce (Smith, 2020).

Online classes are the major forms of digitization in education. The current and future generations are keen on adapting to the new norm. Online classes and courses can be taken remotely and thus allow education to continue despite the pandemic. The future, however, should involve complete digitization so the country will not endure such challenges as presented by the pandemic.

Remote Working

Remote working is another aspect of the digital transformation, whose importance is illustrated by the pandemic. ICTs have allowed many businesses today to consider the possibilities and benefits of remote working (Deloitte, 2020). In the UAE, the interests in remote working as the future of work emerged even before the pandemic. The commitment and investments in innovation, local talent, and entrepreneurship initiatives have been embedded in the 4IR as a response to these changes. Disruptive technologies like blockchain and big data are the major drivers of workplace changes.

The above graph indicates that remote working was already practiced before COVID-19. However, the pandemic has forced many to start working from home, with the percentage rising dramatically from 12% to 51%. It is assumed that after the crisis ends, more people will be left working remotely than before the crisis. Remote working can be a solution where everyone benefits for both the employees and employers. Additionally, the COVID-19 pandemic has seen countries try to facilitate remote working as a measure to prevent businesses from shutting down completely.

References

Business Transformation, (2019). UAE and Saudi Arabia businesses most interested in digital transformation. Web.

Deloitte. (2020). COVID-19: workfirce strategies for a post-COVID-19 recovery. Deloitte: London.

Geissdoerfer, M., Savaget, P., Bocken, N. and Hultink, E., 2017. The circular economy  a new sustainability paradigm?. Journal of Cleaner Production, 143, p. 757-768.

Mhlanga, D., and Moloi, T. (2020). COVID-19 and the digital transformation of education: what are we learning on 4IR in South Africa?, Education Sciences, 10(7), pp. 1-11.

Nair, M. (2020). . Web.

Smith, S. (2020). Digital transformation in the GCC. Web.

Highs and Lows of the COVIDSafe App in Australia

Introduction

The onset of COVID-19 was unexpected and as a result, has led to the death of millions of people across the world. Consequently, the Australian government introduced the COVIDSafe mobile application to help control the pandemic. Its success relies on the citizens rational decisions in supporting the government towards containing the virus.

Issue, Facts, and Context

Closing of schools, businesses, medical facilities, and borders are a few impacts of the COVID-19 pandemic that have contributed to public health challenges in Australia. The government was not prepared for the pandemic; consequently, the health system cannot effectively control the current situation. The main challenge experienced in the sector is the limited distribution of Personal Protective Equipment (PPEs), medical supplies, and testing kits, critical in managing the pandemic (Hunt, 2020). Similarly, public hospitals lack enough isolation wards and Intensive Care Unit facilities to treat infected individuals.

Consequently, the national government has been forced to introduce a total lockdown to reduce the pandemics spread and utilize the limited public health resources. However, this decision has negatively impacted the economy, and the government has opted for the COVIDSafe app meant to speed up the process of locating exposed and infected individuals. This approachs benefit is that it helps ease restrictions and improve the economy gradually (Hunt, 2020). The only challenge is that the apps use is voluntary, and the rate of downloading and utilizing it is low. Furthermore, not all Australians have smartphones, and some might adamantly reject the COVIDSafe app. To liberate the economy and the country, the government is exposing its citizens to more risk. It should have considered the mentioned factors before implementing the applications use.

Economic Model of Individual Decision-Making and The Use of The COVIDSafe App

Citizens are at the center of the contact tracing app and therefore determine its success or failure, and the economic model of individual decision-making can be used to analyze their attitudes towards the software. According to Alvino and Franco (2017), people make decisions that earn the greatest satisfaction, and this concept is equally applied to the economics of decision-making. When humans are given a variety of options to pick from in a scarce environment, they settle on the one that meets individual needs. The economic ideology is based on the assumption that individuals can make sensible choices by comparing the costs and benefits of the presented options (Nguyen & Wait, 2015). A rational human exercises self-control and is not influenced by feelings and, therefore, makes wise individual decisions.

However, behavioral economics contradicts the practicality of the concept and cites that humans cannot make the right choices. This model of individual decision-making applies to the use of the COVIDSafe app by Australians and its effectiveness in contact tracing. Whereas the correct choice would be to download the app voluntarily and utilize it diligently, very few individuals will do that, and this is evident in the current statistics regarding the technologys application (Alvino & Franco, 2017). The best decision for most individuals, based on the economic model, would be to download the app but still to avoid using it because contact tracing would mean social interactions are limited. For instance, 24 hours after introducing the app, 2 million Australians had downloaded the COVIDSafe mobile software, but months later, the government still has not hit its 40% target, which equals 10 million of the entire Australian population (Hunt, 2020). This is a clear indication that to most citizens, the app denies them the desire to live normally without government restrictions.

Unintended Consequences of the Apps use and Availability

The goal of the COVIDSafe app is to minimize the infection rate within the Australian borders, but there are unforeseen repercussions of the softwares availability that limits its effectiveness. Whereas the technology helps in tracking exposed individuals efficiently, there is the danger of infringing the citizens right to information privacy as indicated in the Privacy Amendment Act (1990) (Hunt, 2020). Granting the government full access to peoples phones gives it a chance to collect personal data not associated with controlling the pandemic. Since the Australian law protects its citizens from such violations, some people might challenge the countrys move in courts and as a result, slow down the implementation of the COVIDSafe app.

Furthermore, the fact that the application of COVIDSafe is voluntary implies that there are citizens who will not download or use it. The software is meant to aid in contact tracing, which tracks individuals who have been exposed to the virus and isolates them for testing and treatment (Hunt, 2020). However, the thought of isolation instills fear in most people who will opt not to report through the app whenever they are exposed to the virus. Consequently, the number of infections are will increase because the application is not achieving its purpose.

Consequences of Making the Use of the App Mandatory and the Use of Criminal Sanctions

Whereas the introduction of regulations to be followed while using the COVIDSafe app for contact tracing might be beneficial, making it mandatory, on the other hand, has consequences. Mobile phones carry personal data, and forcing people to download mobile applications will trigger opposition from human rights activists. Countries in the Middle East and Asia such as Kuwait have made it mandatory to download the application and further enacted fines on individuals who will not accept the online contact tracing approach. The country is already in a crisis characterized by panic and forcing citizens to adopt the technological approach might trigger civil unrest.

Beckers model of crime can be used in predicting the consequences of forcing citizens to download the COVIDSafe app. The theory illustrates that potential offenders are economically rational and agree to deter incentives such as the risk of punishment imposed by the criminal justice system (Garoupa, 2014). Criminals make their decisions after comparing the costs and benefits of committing an offense. Consequently, the majority of the citizens will not download the app because to them it is not a crime that deserves punishment. The solution to this issue is to make installation and use of COVIDSafe mandatory only to identify individuals who have been infected by the virus. In this case, the health risks supersede the right to information privacy, making it acceptable to enact the policy.

Conclusion

The COVID-19 pandemic has negatively impacted the Australian government and its citizens alike. Even though the COVIDSafe app can improve contact tracing and gift Australians social and economic freedom, its success depends on the citizens rational decision-making which can be influenced by considerate government policies that will not infringe privacy laws.

References

Alvino, L., & Franco, M. (2017). The decision-making process between rationality and emotions. International Journal of Scientific Research and Management.

Garoupa, N. (2014). . Encyclopedia of Criminology and Criminal Justice, 1280-1286. Web.

Hunt, D. (2020). Contact tracing apps: A behavioral economists guide to improving uptake. Web.

Nguyen, B., & Wait, A. (2015). Essentials of Microeconomics [Ebook] (1st Ed.). Routledge. Web.

Visa Tap to Phone Program Overall Review

Visa Tap to Phone Program

After trials over the last year, the tool is now live in several countries in Europe, the Middle East, Africa, Asia Pacific, and Latin America. Brazil, Italy, United Arab Emirates, and the UK will follow shortly. Visa says that with the world increasingly turning to digital payments amidst Covid-19, Tap to Phone can help millions of small and micro businesses quickly access the digital economy, prevent lost sales, and improve cash flow (Visa Tap to Phone contactless payments program goes global, 2020). To help support safe transactions, Visa has introduced a Ready for Tap to Phone program, enabling technology companies to become Visa Ready certified, ensuring security standards.

Sellers download an app, supported by their acquirer, and after registering and selecting their participating bank, can start accepting contactless payments in minutes. The technology builds on top of the security of an EMV chip transaction, in which each transaction contains a dynamic cryptogram that cannot be reused. Therefore, the program offers a unique approach that assures consumers of the safety and security of their payment details.

Contactless Payment

It is powered by Near field communication technology over a specific radio frequency. It facilitates the communication between the smartphone or the credit card with the payment reader when they are close together, around 0.1 meters.

RFID has been used for decades, for example, for scanning items in grocery stores and luggage on baggage claims and tagging cattle. It is now increasingly being used to enable contactless mobile payments and also in video game technology.

How NFC Works

NFC (near field communication) is what enables two devices to communicate wirelessly when theyre close together. NFC, which was introduced in the early 2000s, uses a specific RFID frequency (13.56MHz, to be exact) for close-range communications (NFC Guide: All You Need to Know About Near Field Communication, 2020). To date, one of the more common uses for NFC is identification cards to gain access to places such as office buildings and private garages. But increasingly, NFC is being used to power contactless payments.

A person who has stood in line at large retailers such as Whole Foods, Walgreens, or Office Depot recently, has probably already seen contactless payment in action. Contactless payment is a transaction that requires no physical contact between devices, which is the smartphone or tablet, and the payment terminal. Hence, people hold up their mobile gadgets to pay for goods or services.

Contactless payments are, in fact, much more secure than magnetic-stripe cards, whose incredibly outdated technology makes them relatively easy to clone. This means that one can become the victim of fraudulent charges and identity theft. Contactless payments are authenticated, meaning they are extremely hard to hack. In contactless payment, the data associated with a persons credit card on file is encrypted and constantly changing. Thus, even if fraudsters were to hack a system, the data they found there would be useless.

Advantages of the program

The idea of paying through a mobile device can make some people uneasy, especially because they are so accustomed to keeping their wallets close to the vest. But NFC payments are extremely secure compared to magnetic-stripe cards. As opposed to the data on a magnetic-stripe card, the data involved in an NFC transaction is encrypted and dynamic, meaning its constantly changing.

People are getting used to doing everything on their phones. It is to the point where some people feel the need to ensure they have their devices everywhere. The fact that increasingly more people now have their phones at the ready makes NFC-enabled contactless payments the most convenient way to pay.

EMV transactions are slow to process. They are much slower than magstripe transactions. What happens during an EMV transaction is that the chip in the card sends a message to the processor to make sure everything is functioning well. However, the lag time is quite noticeable, especially if the seller has a line waiting. NFC transactions, on the other hand, are much faster than EMV transactions since they take seconds to complete a transaction.

Tap to Phone Program Benefits

  • The program offers several benefits to sellers such as easier accounting, increased customer access, more ticket sizes, and secure and reliable sales. Most of the customers nowadays carry less cash hence availability of a payment system that does not require cash transactions is more convenient. Since less cash is involved, accounting for sales becomes easier because all the data is generated within a single system as the money is remitted directly into the sellers account, hence less risk.
  • Solution providers are able to access Visas specifications and requirements to create an approved option. Visa guides them through the certification process after which, upon approval, they will partner with Visa clients to go to market and make the program available worldwide.
  • Since cash is more vulnerable to theft, loss, and difficult to reference initial payments compared to card payments, fewer consumers are carrying it. Moreover, the transactions lack reward upon payment such as the bonus points accrued upon using the credit card. Therefore, tap to phone solutions offer consumers increased payment abilities in a quick, secure, and convenient way.
  • Users acquiring the Visa program can opt to build and certify the tap to phone model individually or partner with existing third-party providers making it easy to empower more sellers. As a result, the company decentralizes the program making its availability easier and faster among businesses.

Visa Tap to Phone Partnerships

Visa is helping business innovations by enabling the sellers to turn their NFC enabled devices into contactless point of sale terminals with no additional hardware. The circumstances for one to work with a tap to phone partner include:

  1. Small merchants or startups who want to enable payments through mobile devices but cannot develop them on their own.
  2. Need for a ready-made solution one can add to their consumer-facing experience.
  3. Need for help from solution providers with ready solutions ready to launch.

One can also become a partner if they:

  1. Are a financial developer, payment facilitator, or a financial institution.
  2. Have solutions that can accept and process contactless visa payment in a mobile device.
  3. Want Visas Ready certification.
  4. Need access to standards and specifications for certification.

References

NFC guide: All you need to know about Near Field Communication. Square. (2020). Web.

Visa Tap to Phone contactless payments programme goes global. Finextra Research. (2020). Web.

Are Digital Natives a Myth or Reality?

Social media and rapidly developing technology do not appear to surprise anyone nowadays. Not updating an Instagram page is considered strange, and not having a PC is hardly imaginable. However, the world was completely different just 50 years ago when computers first appeared. The tremendous change with the appearance of progressive technology is believed to give birth to inherently new technological and cognitive skills in people born in the era of technology. Nevertheless, the absence of empirical data finding an entirely different nature of how natives acquire the technological skills and many contextual factors affecting cognition prove that digital natives may, after all, be only a myth.

The digital natives are determined as the generation born after 1980 with the appearance and popularization of computer technology (Margaryan et al., 2011). This generation, known as millennials, was subject to an increasingly technologized era, making them inherently savvy in it. The prominent features of natives are often believed to go beyond sophisticated digital skills to radically different cognitive abilities and learning skills (Margaryan et al., 2011). The immigrants, on the other hand, did not get the technological background from birth. They had to learn their ways around the computerized world, and not many immigrants adapted to the change well.

However, such claims do not appear to have a clear empirical basis. The generation born in the era after the appearance of computers is believed to be technologically savvy (Margaryan et al., 2011). The use of various technological tools may be more comfortable for the so-called digital natives, but the newly evolved critical cognitive skills remain questionable. Generation Zs are more likely to use computers better and be more accustomed to them, but not possess radically different learning styles. Since the first introduction of the personal computer (PC) in 1975, the world has indeed radically changed at a fast pace, but not everyone was accustomed to the new technology. Even the fact the PCs broad distribution in different areas of the world happened much later, the division between different generations is necessary. People born in 2000 and 2010 would have a much deeper computer usage gap, even with the difference in 10 years (Margaryan et al., 2011). Nowadays, children are brought up with almost limitless access to computers and are surrounded by technology from the day they are born, which contributes to the belief that they are more technologically intelligent.

Even in the era after the appearance of computers, the overall users utilize social media on a standard level. The amount of time spent online does not define the savviness in technology as well as different critical skills. The majors in technical disciplines appear to be more technologically intelligent, but that proves the necessity of more intensive and extensive use of technology apart from basic understanding to be a digital native. The typical internet users may use virtual worlds and spend hours chatting online but not understanding its founding principles. The nature of technology usage should be entirely different from being considered technologically native. Moreover, many other factors, such as socio-economic background, geographical location, and personal peculiarities, come in place and affect the persons ability to be technologically savvy much more than the generation they were born in (Margaryan et al., 2011).

One day, humankind would reach the point to rely on technology entirely, but people are still on the way towards it. The new technological breakthroughs and the all-pervasive internet create a new environment for the population, but it does not change the cognitive skills of people who are more accustomed to it. The system slowly starts to transform but still heavily relies on physical presence with its traditional learning and even technological practices. Being a digital native may present a utopian belief about the technologically advanced species, but it has not come to life yet.

Reference

Margaryan, A., Littlejohn, A., & Vojt, G. (2011). Are digital natives a myth or reality? University students use of digital technologies. Computers & Education, 56(2), 429-440. Web.