This study attempted to examine the emerging security risks brought about by the e-hail taxi mode of transportation. It argues that despite the fact that the security risks associated with traditional taxi transportation still apply to e-hail taxi services, there are emergent risks that are unique to the app-based taxi hailing services. It further contends that as evidenced by the reactionary way of addressing security issues arising form usage of the service, it is clear that security was not a factor during conceptualisations, development and operation of the app-based taxi service. The study conducted a survey of uber customers and drivers in Nairobi County Kenya, and data was collected from 400 respondents with 85% response rate. Majority of the respondents indicated that they somewhat often (32.23%), agreed that Uber is more convenient (58.76%), indicated that Uber offers more business and job opportunities (86.46%). Despite the positive opinions by the respondents, 65.31% opined that Uber portend security risks. Majority indicated that the following risks are likely; abductions (40.82%), carjacking (40.82%), sexual harassment (38.14%), murders (35.71%), robbery (41.84%) and burglaries (34.69%). However, a majority of 28.57% thought that hackings into sensitive customer and company data was less likely. Furthermore, 57.14% of the respondents felt that the regulatory framework for appbased taxi hailing system were not sufficient to guarantee safety and security while 75.51% were optimistic that the e-hail transport industry will take meaningful security mitigation measures from the lessons they have learned. Finally, 92.93% of the respondents felt that government authorities should do more in regulating app-based services such Uber while 85.86% opined that founders and managers of ehail taxi services should be held responsible for security lapses. The study recommends that a review of existing traffic laws and criminal laws be done to take care of the emerging security risks associated by app-based service providers.
Autonomous Driving (AD) has been said to be the next big disruptive innovation in the years to come. Considered as being predominantly technology driven, it is supposed to have massive societal impact in areas such as insurance, laws and regulations, logistics, automotive industry as well as all types of transportation methods, not only expected to have an enormous environmental and economic effect but also offer the possibility of saving millions of lives worldwide.
HYVE Science Labs, in cooperation with the Technical University Hamburg-Harburg and INSIUS have developed the unique worldwide study “Autonomous Driving: The User Perspective” focused on the customer view and acceptance of Autonomous Driving. The study analyses 106,305 comments on Autonomous Driving publicly posted in English on the Internet, finding a more positive than negative attitude towards this new technology in contrast to the most renowned surveys in the field. The focus was placed in the understanding of customer acceptance, a topic that until now under an Autonomous Driving context is limited. While a survey with more than 200 experts on autonomous vehicles by the IEEE (2014), the world's largest professional association for the advancement of technology, defines that the three biggest obstacles to reach the mass adoption of driverless cars are legal liability, policymakers and customer acceptance. Therefore it is essential to start understanding and integrating customers in order to build deep and meaningful customer insights which can be used to deliver the products they want and need. Furthermore it is important to understand the wants and needs of future users and who will the early adopters will be. They will influence how technologies evolve and if they provide enough benefits to reach the early majority.
Innovative Web Monitoring Technologies, User Generated Content (UGC) and the method of Innovation Mining were used within an Autonomous Driving context to understand user’s debate on the Internet. UGC is characterized by extensive volunteering effort, lack of central control and freedom of expression, while creating a basis for identifying and understanding opinions, desires, tastes, needs and decision-making influences of customers in a passive non-intrusive manner. UGC is perceived as being impartial and unbiased, while giving the chance to understand needs and doubts of the potential customers, as well as the used language within a certain topic. The method of Innovation Mining presented below reflects the process from the search for the UGC until the possible visualization and interpretation of the gained information.
• Analysis of the users language within an AD context
• Most relevant single sources of discussion
• Topic evolution including most impactful events
• Brand importance in the users perspective
• Most mentioned activities in an AD vehicle
• In depth language analysis of concepts and their drivers
Ericsson ConsumerLab - Commuters expect moreEricsson
Today, commuters are taking advantage of greater connectivity and apps to simplify their daily commute. However, the public transport industry is perceived as lagging behind.
ARTIFICIAL INTELLIGENCE (AI) ENABLED TRANSPORTATION - DISRUPTING AND OPTIMIZI...OliviaThomas57
Transport in developing or emerging markets often faces severe challenges due to growing populations, urbanization, poor infrastructure, and rising prosperity in some regions, increasing cargo volumes, vehicle traffic, and pollution
Cisco Smart Intersections: IoT insights using video analytics and AICarl Jackson
In this trial, IoT, Video Analytics, Deep Learning (DL) and Artificial Intelligence (AI), for the purpose of traffic flow assessment and insights into road user behaviour, were evaluated at an intersection at the AIMES testbed in Melbourne¹ in partnership with: the University of Melbourne, Department of Transport (DOT), IAG and Cisco.
This report looks at the disruptive potential of automated vehicles: their impact on commuters, car companies, vehicle design and urban planning. It warns of the potential dangers of their unbridled proliferation and prerequisites to their effective deployment.
Autonomous Driving (AD) has been said to be the next big disruptive innovation in the years to come. Considered as being predominantly technology driven, it is supposed to have massive societal impact in areas such as insurance, laws and regulations, logistics, automotive industry as well as all types of transportation methods, not only expected to have an enormous environmental and economic effect but also offer the possibility of saving millions of lives worldwide.
HYVE Science Labs, in cooperation with the Technical University Hamburg-Harburg and INSIUS have developed the unique worldwide study “Autonomous Driving: The User Perspective” focused on the customer view and acceptance of Autonomous Driving. The study analyses 106,305 comments on Autonomous Driving publicly posted in English on the Internet, finding a more positive than negative attitude towards this new technology in contrast to the most renowned surveys in the field. The focus was placed in the understanding of customer acceptance, a topic that until now under an Autonomous Driving context is limited. While a survey with more than 200 experts on autonomous vehicles by the IEEE (2014), the world's largest professional association for the advancement of technology, defines that the three biggest obstacles to reach the mass adoption of driverless cars are legal liability, policymakers and customer acceptance. Therefore it is essential to start understanding and integrating customers in order to build deep and meaningful customer insights which can be used to deliver the products they want and need. Furthermore it is important to understand the wants and needs of future users and who will the early adopters will be. They will influence how technologies evolve and if they provide enough benefits to reach the early majority.
Innovative Web Monitoring Technologies, User Generated Content (UGC) and the method of Innovation Mining were used within an Autonomous Driving context to understand user’s debate on the Internet. UGC is characterized by extensive volunteering effort, lack of central control and freedom of expression, while creating a basis for identifying and understanding opinions, desires, tastes, needs and decision-making influences of customers in a passive non-intrusive manner. UGC is perceived as being impartial and unbiased, while giving the chance to understand needs and doubts of the potential customers, as well as the used language within a certain topic. The method of Innovation Mining presented below reflects the process from the search for the UGC until the possible visualization and interpretation of the gained information.
• Analysis of the users language within an AD context
• Most relevant single sources of discussion
• Topic evolution including most impactful events
• Brand importance in the users perspective
• Most mentioned activities in an AD vehicle
• In depth language analysis of concepts and their drivers
Ericsson ConsumerLab - Commuters expect moreEricsson
Today, commuters are taking advantage of greater connectivity and apps to simplify their daily commute. However, the public transport industry is perceived as lagging behind.
ARTIFICIAL INTELLIGENCE (AI) ENABLED TRANSPORTATION - DISRUPTING AND OPTIMIZI...OliviaThomas57
Transport in developing or emerging markets often faces severe challenges due to growing populations, urbanization, poor infrastructure, and rising prosperity in some regions, increasing cargo volumes, vehicle traffic, and pollution
Cisco Smart Intersections: IoT insights using video analytics and AICarl Jackson
In this trial, IoT, Video Analytics, Deep Learning (DL) and Artificial Intelligence (AI), for the purpose of traffic flow assessment and insights into road user behaviour, were evaluated at an intersection at the AIMES testbed in Melbourne¹ in partnership with: the University of Melbourne, Department of Transport (DOT), IAG and Cisco.
This report looks at the disruptive potential of automated vehicles: their impact on commuters, car companies, vehicle design and urban planning. It warns of the potential dangers of their unbridled proliferation and prerequisites to their effective deployment.
Presentation for ASCE's July Branch Luncheon on Autonomous Vehicles by Ryan Snyder, Transportation Planning Expert, of transpogroup. Existing technology, timeline, technological possibilities, and potential benefits.
Problems in Autonomous Driving System of Smart Cities in IoTijtsrd
This paper focuses on the problems and challenges during self driving. In the modern era, technologies are getting advanced day by day. The field of smart city has introduced a new technology called ""Autonomous Driving"". Autonomous driving can be defined as Self Driving, Automated Vehicle. Google has started working on this type of system since 2010 and still in the phase of making changes in this technology to take it to a higher level. Any technology can reach up to an advanced level but it cannot provide a full fledged result. This paper facilitates the researchers to understand the problems, challenges and issues related to this technology. Shweta S. Darekar | Dr. Anandhi Giri ""Problems in Autonomous Driving System of Smart Cities in IoT"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020,
URL: https://www.ijtsrd.com/papers/ijtsrd30079.pdf
Paper Url : https://www.ijtsrd.com/computer-science/other/30079/problems-in-autonomous-driving-system-of-smart-cities-in-iot/shweta-s-darekar
GreenRoad presentation in the future of IoT, connected car and Shared Mobility. Driver Safety and Fleet Management are part of the future of Connected car, Shared Mobility and IoT.
Interview: What is the main security and privacy risks associated with the ad...Ersin KARA
worldautomotiveconference.co.uk
"The methods of artificial intelligence and augmented reality have always been the substance of rumination and speculation since very recently, where they’ve started to take very a central role in our lives.
Intelligent technologies today are computer-aided systems that completely control all industrial pipelines. They can operate autonomously and on this account all processes can be managed independently.
Today’s logistics do not resemble one-way storage of goods seen up to a few years ago. This is due to new web technologies that allow an entirely new level of interaction within the moving parts of a given logistics eco-system. As these technologies continue developing at a rapid pace, several partially and fully automated logistic frameworks are already readying for deployment."
"When we compare Industry 4.0 advantages and classic ERP programs advantages We see below points ;
- Space-efficient storage. This will save in warehouse areas and volumes. Ex. Kardex Remstar applications, vertical storage solutions
- ERP’s are integrated warehouse management software.
So the error will be absolutely minimal. Prevention of losses due to lack of communication in monolithic systems that have one point of failure.
- Automatic and controlled product circulation. This will allow for increased work safety and fewer work accidents. This will naturally result in risk reduction resulting from controllability, especially in hazardous material logistics.
- Line feed, standby modules. So perfect stock management, “0” inventory loss.
- Automatic finished product warehouses. This will allow for unmanned warehouses, fast vehicle loading and unloading systems that can work 24 hours a day, 365 days a year. Cellular transfer storage systems.
For distribution centers and warehouse management systems that implement Industry 4.0 technologies, data needs to be collected, analyzed, acted on, and secured in order to partake in the data driven decision-making Industry 4.0 advertises."
The future of the connected vehicle - 29 July 2015Future Agenda
As part of the future agenda programme we are running an event in Munich on July 29th hosted by Nokia. Focused on developments in and around the connected vehicle, the will explore how changes we can see on and beyond the horizon will impact the world of cars, trucks and other vehicles over the next decade. This material is the starting point for the discussion.
This report explores the strategic issues that will have to be considered by authorities as more fully automated and ultimately autonomous vehicles arrive on our streets and roads. It was drafted on the basis of expert input and discussions amongst project partners in addition to a review of relevant published research and position papers.
Key Success Factors for Connected Vehicle, Ride-share and Multi-Modal Transpo...Covisint
Tim Evavold, Covisint's Director of Connected Car and Dealer Ecosystems covers the technical, security and privacy considerations of ridesharing and multi-modal transportation when using connected vehicles.
Autonomous cars, car sharing and electric vehiclesAnandRaoPwC
Talk presented at the second Autonomous Cars conference hosted by SwissRe in Armonk, NY on September 24, 2015. The talk covers the interaction between car sharing, autonomous cars and electric vehicles and how the feedback between these three areas will propel greater consumer adoption.
5 Autonomous Cars Trends Everyone Should Know About In 2019Bernard Marr
Autonomous cars are coming. Even if we might not have completely self-driving cars on all our roads by 2019, there are some important trends that map out the path of autonomous driving. Here we look at the key ones.
Future of autonomous vehicles final report ppt - may 2020Future Agenda
The Future of Autonomous Vehicles
The dream of self-driving vehicles has been a long time coming. It is however now within reach and the pressure is on the deliver on the vision. With sustained technology development, increased investment and raising public awareness, there is enormous interest in the imminent mainstream use of autonomous vehicles on the streets.
Although approaches vary from around the world, policy makers and urban planners in leading locations are now seeking to collaborate more with manufacturers, mobility providers, tech suppliers, logistics operators in order to align regulation for testing and mass deployment. And it goes both ways.
The investments being made in autonomy have rapidly shifted from millions to billions, so unsurprisingly those public and private organisations that are providing the funds are keen to ensure that the ROI is credible. There is much to play for and, although there has been substantial progress over recent years, significant questions on safety, social impact, business models and performance are still unanswered.
The Future of Autonomous Vehicles project was undertaken to canvas the views of a wide range of experts from around the world in order to create a clearer, informed global perspective of how autonomy will evolve over the next decade. Beginning with a discussion with government officials just outside Shanghai in July 2018 and ending with leaders from across the US autonomous vehicle community in the hills above Silicon Valley in February of 2020, this project has covered a lot of ground. In all, eight workshops and six additional discussions have engaged with hundreds of different opinions, shared perspectives and built considered future pathways.
This presentation of the final report is a synthesis of many voices and opinions on the likely future of autonomous vehicles. We hope that is useful.
Full project details are available on the dedicated mini site www.futureautonomous.org
Thoughts on the Future of Mobility (Dec 2016)Cornel Chiriac
In Dec 2016 I took a deeper dive into the mobility space and synthesized some thoughts in the following presentation. It covers the drivers for change, a view on the future state, and who will be the winners and losers. The presentation includes thoughts on how the world is changing, what does the future hold for how people will move around and fulfil their needs for transportation and mobility.
The presentation is built upon research by leading consultancies, aggregated and augmented with my thoughts on the topic. The presentation is high-level and is meant to be presented in-person rather than read as a stand-alone, exhaustive paper. It is meant as starting point — see the list of sources for in-depth reading.
Future of autonomous vehicles interim report summary - 29 august 2019-compr...Future Agenda
The Future of Autonomous Vehicles
Throughout 2019 we are undertaking a series of expert workshops around the world exploring the future of autonomous vehicles. To date 5 discussions have taken place in Los Angeles, Frankfurt, Singapore, Wellington and Melbourne.
This is the summary of a detailed interim report which is being shared from September 8th on www.futureautonomous.org
Additional events are taking place during Q4 of 2019 ahead of the release of a final report.
White Paper on Transport Safety in the Era of Digital MobilityCarl Jackson
While remarkable progress has been made with technological, operational and behavioral improvements in the century-old, automotive-based transport systems used around the world, rapid technological changes are occurring that could amount to a reset in outcomes for transport users.
The technology is in place to build more efficient, convenient and safer transport solutions. But there will be challenges to overcome, in terms of industry cooperation and trust on a sharing ecosystem.
Connectivity is causing a shift in business models from products to services, with data being the key asset affecting this change. As such, the transport industry is experiencing a seismic shift in technology, regulation and user behavior, which will force all key actors to reassess their business models.
Connectivity has already started to make an impact in the world of transport. The first phase focused on transactional connectivity, where data would be sent in the case of a traffic incident. Now, the focus of the second phase is on being connected, including sending and receiving data, and the ability to share it between companies and industries.
The technology is in place to build more efficient, convenient and safer transport solutions based on passenger vehicle-centric ecosystems. But there will be challenges to overcome, in terms of cooperating with new partners from different industries, gaining user trust, ensuring quality, reliability and security of data and controlling its flow in a highly shared environment. This paper takes a closer look at these challenges, and what will be required to move past them.
Presentation for ASCE's July Branch Luncheon on Autonomous Vehicles by Ryan Snyder, Transportation Planning Expert, of transpogroup. Existing technology, timeline, technological possibilities, and potential benefits.
Problems in Autonomous Driving System of Smart Cities in IoTijtsrd
This paper focuses on the problems and challenges during self driving. In the modern era, technologies are getting advanced day by day. The field of smart city has introduced a new technology called ""Autonomous Driving"". Autonomous driving can be defined as Self Driving, Automated Vehicle. Google has started working on this type of system since 2010 and still in the phase of making changes in this technology to take it to a higher level. Any technology can reach up to an advanced level but it cannot provide a full fledged result. This paper facilitates the researchers to understand the problems, challenges and issues related to this technology. Shweta S. Darekar | Dr. Anandhi Giri ""Problems in Autonomous Driving System of Smart Cities in IoT"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020,
URL: https://www.ijtsrd.com/papers/ijtsrd30079.pdf
Paper Url : https://www.ijtsrd.com/computer-science/other/30079/problems-in-autonomous-driving-system-of-smart-cities-in-iot/shweta-s-darekar
GreenRoad presentation in the future of IoT, connected car and Shared Mobility. Driver Safety and Fleet Management are part of the future of Connected car, Shared Mobility and IoT.
Interview: What is the main security and privacy risks associated with the ad...Ersin KARA
worldautomotiveconference.co.uk
"The methods of artificial intelligence and augmented reality have always been the substance of rumination and speculation since very recently, where they’ve started to take very a central role in our lives.
Intelligent technologies today are computer-aided systems that completely control all industrial pipelines. They can operate autonomously and on this account all processes can be managed independently.
Today’s logistics do not resemble one-way storage of goods seen up to a few years ago. This is due to new web technologies that allow an entirely new level of interaction within the moving parts of a given logistics eco-system. As these technologies continue developing at a rapid pace, several partially and fully automated logistic frameworks are already readying for deployment."
"When we compare Industry 4.0 advantages and classic ERP programs advantages We see below points ;
- Space-efficient storage. This will save in warehouse areas and volumes. Ex. Kardex Remstar applications, vertical storage solutions
- ERP’s are integrated warehouse management software.
So the error will be absolutely minimal. Prevention of losses due to lack of communication in monolithic systems that have one point of failure.
- Automatic and controlled product circulation. This will allow for increased work safety and fewer work accidents. This will naturally result in risk reduction resulting from controllability, especially in hazardous material logistics.
- Line feed, standby modules. So perfect stock management, “0” inventory loss.
- Automatic finished product warehouses. This will allow for unmanned warehouses, fast vehicle loading and unloading systems that can work 24 hours a day, 365 days a year. Cellular transfer storage systems.
For distribution centers and warehouse management systems that implement Industry 4.0 technologies, data needs to be collected, analyzed, acted on, and secured in order to partake in the data driven decision-making Industry 4.0 advertises."
The future of the connected vehicle - 29 July 2015Future Agenda
As part of the future agenda programme we are running an event in Munich on July 29th hosted by Nokia. Focused on developments in and around the connected vehicle, the will explore how changes we can see on and beyond the horizon will impact the world of cars, trucks and other vehicles over the next decade. This material is the starting point for the discussion.
This report explores the strategic issues that will have to be considered by authorities as more fully automated and ultimately autonomous vehicles arrive on our streets and roads. It was drafted on the basis of expert input and discussions amongst project partners in addition to a review of relevant published research and position papers.
Key Success Factors for Connected Vehicle, Ride-share and Multi-Modal Transpo...Covisint
Tim Evavold, Covisint's Director of Connected Car and Dealer Ecosystems covers the technical, security and privacy considerations of ridesharing and multi-modal transportation when using connected vehicles.
Autonomous cars, car sharing and electric vehiclesAnandRaoPwC
Talk presented at the second Autonomous Cars conference hosted by SwissRe in Armonk, NY on September 24, 2015. The talk covers the interaction between car sharing, autonomous cars and electric vehicles and how the feedback between these three areas will propel greater consumer adoption.
5 Autonomous Cars Trends Everyone Should Know About In 2019Bernard Marr
Autonomous cars are coming. Even if we might not have completely self-driving cars on all our roads by 2019, there are some important trends that map out the path of autonomous driving. Here we look at the key ones.
Future of autonomous vehicles final report ppt - may 2020Future Agenda
The Future of Autonomous Vehicles
The dream of self-driving vehicles has been a long time coming. It is however now within reach and the pressure is on the deliver on the vision. With sustained technology development, increased investment and raising public awareness, there is enormous interest in the imminent mainstream use of autonomous vehicles on the streets.
Although approaches vary from around the world, policy makers and urban planners in leading locations are now seeking to collaborate more with manufacturers, mobility providers, tech suppliers, logistics operators in order to align regulation for testing and mass deployment. And it goes both ways.
The investments being made in autonomy have rapidly shifted from millions to billions, so unsurprisingly those public and private organisations that are providing the funds are keen to ensure that the ROI is credible. There is much to play for and, although there has been substantial progress over recent years, significant questions on safety, social impact, business models and performance are still unanswered.
The Future of Autonomous Vehicles project was undertaken to canvas the views of a wide range of experts from around the world in order to create a clearer, informed global perspective of how autonomy will evolve over the next decade. Beginning with a discussion with government officials just outside Shanghai in July 2018 and ending with leaders from across the US autonomous vehicle community in the hills above Silicon Valley in February of 2020, this project has covered a lot of ground. In all, eight workshops and six additional discussions have engaged with hundreds of different opinions, shared perspectives and built considered future pathways.
This presentation of the final report is a synthesis of many voices and opinions on the likely future of autonomous vehicles. We hope that is useful.
Full project details are available on the dedicated mini site www.futureautonomous.org
Thoughts on the Future of Mobility (Dec 2016)Cornel Chiriac
In Dec 2016 I took a deeper dive into the mobility space and synthesized some thoughts in the following presentation. It covers the drivers for change, a view on the future state, and who will be the winners and losers. The presentation includes thoughts on how the world is changing, what does the future hold for how people will move around and fulfil their needs for transportation and mobility.
The presentation is built upon research by leading consultancies, aggregated and augmented with my thoughts on the topic. The presentation is high-level and is meant to be presented in-person rather than read as a stand-alone, exhaustive paper. It is meant as starting point — see the list of sources for in-depth reading.
Future of autonomous vehicles interim report summary - 29 august 2019-compr...Future Agenda
The Future of Autonomous Vehicles
Throughout 2019 we are undertaking a series of expert workshops around the world exploring the future of autonomous vehicles. To date 5 discussions have taken place in Los Angeles, Frankfurt, Singapore, Wellington and Melbourne.
This is the summary of a detailed interim report which is being shared from September 8th on www.futureautonomous.org
Additional events are taking place during Q4 of 2019 ahead of the release of a final report.
White Paper on Transport Safety in the Era of Digital MobilityCarl Jackson
While remarkable progress has been made with technological, operational and behavioral improvements in the century-old, automotive-based transport systems used around the world, rapid technological changes are occurring that could amount to a reset in outcomes for transport users.
The technology is in place to build more efficient, convenient and safer transport solutions. But there will be challenges to overcome, in terms of industry cooperation and trust on a sharing ecosystem.
Connectivity is causing a shift in business models from products to services, with data being the key asset affecting this change. As such, the transport industry is experiencing a seismic shift in technology, regulation and user behavior, which will force all key actors to reassess their business models.
Connectivity has already started to make an impact in the world of transport. The first phase focused on transactional connectivity, where data would be sent in the case of a traffic incident. Now, the focus of the second phase is on being connected, including sending and receiving data, and the ability to share it between companies and industries.
The technology is in place to build more efficient, convenient and safer transport solutions based on passenger vehicle-centric ecosystems. But there will be challenges to overcome, in terms of cooperating with new partners from different industries, gaining user trust, ensuring quality, reliability and security of data and controlling its flow in a highly shared environment. This paper takes a closer look at these challenges, and what will be required to move past them.
Autonomous vehicles: A study of implementation and security IJECEIAES
Autonomous vehicles have been invented to increase the safety of transportation users. These vehicles can sense their environment and make decisions without any external aid to produce an optimal route to reach a destination. Even though the idea sounds futuristic and if implemented successfully, many current issues related to transportation will be solved, care needs to be taken before implementing the solution. This paper will look at the pros and cons of implementation of autonomous vehicles. The vehicles depend highly on the sensors present on the vehicles and any tampering or manipulation of the data generated and transmitted by these can have disastrous consequences, as human lives are at stake here. Various attacks against the different type of sensors on-board an autonomous vehicle are covered.
This research aims to study consumer’s behavior on buying online car casualty insurance. The sample group was 400 respondents which were selected by convenience sampling method. Questionnaires were used as a research instrument while chi square was used as a statistical tool for the hypothesis testing.The research revealed two major findings which were 1)there were significant differences between customer’s technological acceptance and consumer’s behavior on buying online car casualty insurance and 2) there were significant differences between customer’s trust and consumer’s behavior as well.
The governance of risks in ridesharing a revelatory case from singaporeAraz Taeihagh
Recently we have witnessed the worldwide adoption of many different types of innovative technologies, such as crowdsourcing, ridesharing, open and big data, aiming at delivering public services more efficiently and effectively. Among them, ridesharing has received substantial attention from decision-makers around the world. Because of the multitude of currently understood or potentially unknown risks associated with ridesharing (unemployment, insurance, information privacy, and environmental risk), governments in different countries apply different strategies to address such risks. Some governments prohibit the adoption of ridesharing altogether, while other governments promote it. In this article, we address the question of how risks involved in ridesharing are governed over time. We present an in-depth single case study on Singapore and examine how the Singaporean government has addressed risks in ridesharing over time. The Singaporean government has a strong ambition to become an innovation hub, and many innovative technologies have been adopted and promoted to that end. At the same time, decision-makers in Singapore are reputed for their proactive style of social governance. The example of Singapore can be regarded as a revelatory case study, helping us further to explore governance practices in other countries.
White Paper: Innovation in TransportationIdeaScale
In this white paper, we discuss the four most pressing areas in transportation that require industry-wide innovation and how the crowd can be a resource to solve concerns in these areas:
- Traveler Experience
- Costs
- Security and Safety
- Technology
Submitted Publication in the Transportation Research Record
November 23, 2015
ABSTRACT
A pilot program in Austin, Texas, tested the practicality of integrating a real-time ridesharing application with a toll operator to process toll discounts for carpools. The toll discounts appeared on monthly toll transaction statements. The program lasted for almost a year on the 183A Toll Road and the US 290 Manor Expressway. Travelers used a smartphone application to track, record, and submit their trips for discounts. Two-person carpools that used the application received a 50 percent discount, and carpools of three or more people could travel toll-free. The program was a partnership between the Central Texas Regional Mobility Authority, the local toll systems operator, and a private ridesharing vendor. Back-office processes matched trip data from the smartphone application to transactions recorded by the toll systems. A total of 95 unique drivers were provided toll rebates for 2,213 trips during the 10.5-month pilot period. Most trips during the pilot program were rebated for two-person carpools. Individual driver behavior varied considerably. A select few drivers had a high number of carpool trips, while others took a sporadic or infrequent trip. Drivers took a median of 7 trips during the pilot. Future rideshare programs should consider showing higher-dollar rebates that represent annual savings to incentivize behavior. Timely feedback was found to be an important factor for success. Additionally, program sponsors should provide positive customer service and engage users when problems exist that are not under their direct purview.
The full potential of insurance telematicsMatteo Carbone
Auto telematics represents the most mature insurtech use case, as it has already passed the test and experimentation phase within the innovation unit. It is currently being used an instrument for daily work within motor insurance business units. In this domain, Italy is an international best practice example
The Future of Ride-Hailing_ Trends in Taxi Booking App Development.pptxZoeDaniel5
Embark on a Journey into the Future of Ride-Hailing: Uncover the Latest Trends in Taxi Booking App Development!
In the rapidly evolving world of transportation, the future is here, and it's filled with innovation, convenience, and transformation. Join us for an insightful presentation on 'The Future of Ride-Hailing: Trends in Taxi Booking App Development.
Discover how the landscape of ride-hailing services is being revolutionized by cutting-edge trends. From enhanced user experiences and AI integration to sustainable transportation options and data privacy regulations, this presentation delves into the driving forces shaping the industry.
1
Transportation Security Proposal
Student’s Name
Institutional Affiliation
Course
Instructor’s Name
Date
Abstract
In order to maintain social and economic equilibrium, day-to-day operations must make use of other modes of transportation, such as buses, trains, and ferries. These intricate and interconnected transit systems need to make use of the proper technology to avoid disruptions in their operations, which would be detrimental to the inhabitants, users, data, and assets they serve. At every stage of the journey, the passengers, the crew, the equipment, and the cargo all need to be safeguarded and protected. This is because of the very complicated and frequently vast landscapes. Transportation routes, such as those found in airports and seaports, need to be routinely examined to verify that they are not only free of obstructions but also that they are operating as smoothly as possible. In addition to the risks posed by other dangers and vulnerabilities, the potential for terrorist attacks is an inherent risk at these transportation facilities; as a result, they require the necessary measures to protect what is most important. In addition to issues regarding the environment and the structure, maintaining the integrity of information technology systems is a consistent focus. In each of these situations, a comprehensive and well-thought-out security solution is necessary, even though the particular needs may vary.
Transportation Security Proposal
Introduction
One of the organizations that have successfully ensured the safety of the nation's transportation system is the Transportation Security Administration (TSA). The transportation business is unique in that it has an impact not only on the specifics of daily living but also on the state of the economy as a whole. When it comes to providing transportation services in a fast and effective manner, the dependability and safety of the organizations providing those services are quite necessary. The transportation industry faces a wide range of issues that get more complex as the market matures. These challenges are exacerbated by the large number of people who use transit stations and the high value of the items that are transported on ships and ferries. Transportation Security in the United States employs a variety of strategies to defend the country, some of which may be covert while others may be obvious to the general public. These strategies are implemented in varying degrees depending on the severity of the threats. This division makes use of tactics such as canine-team airport searches and randomized data collecting and analysis to accomplish its goals. In addition, it works in conjunction with the United States Federal Air Marshals and checks passenger manifests to watch lists. According to Palmer (2020), the Transportation Security Administration (TSA) uses a variety of screening measures to ensure the safety of American citizens. These screening methods might r ...
A survey on security and privacy issues in IoV IJECEIAES
As an up-and-coming branch of the Internet of things, internet of vehicles (IoV) is imagined to fill in as a fundamental information detecting and processing platform for astute transportation frameworks. Today, vehicles are progressively being associated with the Internet of Things which empower them to give pervasive access to data to drivers and travelers while moving. Be that as it may, as the quantity of associated vehicles continues expanding, new prerequisites, (for example, consistent, secure, vigorous, versatile data trade among vehicles, people, and side of the road frameworks) of vehicular systems are developing. Right now, the unique idea of vehicular specially appointed systems is being changed into another idea called the internet of vehicles (IoV). We talk about the issues faced in implementing a secure IoV architecture. We examine the various challenges in implementing security and privacy in IoV by reviewing past papers along with pointing out research gaps and possible future work and putting forth our on inferences relating to each paper.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Water Industry Process Automation and Control Monthly - May 2024.pdf
EMERGING SECURITY RISKS OF E-HAIL TRANSPORT SERVICES: FOCUS ON UBER TAXI IN NAIROBI, KENYA
1. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 8, No 3, August 2019
DOI : 10.5121/ijsptm.2019.8301 1
EMERGING SECURITY RISKS OF E-HAIL
TRANSPORT SERVICES: FOCUS ON UBER TAXI IN
NAIROBI, KENYA
Cosmas Ekwom Kamais1
1
Department of Peace, Security and Social Studies, Egerton University, Kenya
ABSTRACT
This study attempted to examine the emerging security risks brought about by the e-hail taxi mode of
transportation. It argues that despite the fact that the security risks associated with traditional taxi
transportation still apply to e-hail taxi services, there are emergent risks that are unique to the app-based
taxi hailing services. It further contends that as evidenced by the reactionary way of addressing security
issues arising form usage of the service, it is clear that security was not a factor during
conceptualisations, development and operation of the app-based taxi service. The study conducted a
survey of uber customers and drivers in Nairobi County Kenya, and data was collected from 400
respondents with 85% response rate. Majority of the respondents indicated that they somewhat often
(32.23%), agreed that Uber is more convenient (58.76%), indicated that Uber offers more business and
job opportunities (86.46%). Despite the positive opinions by the respondents, 65.31% opined that Uber
portend security risks. Majority indicated that the following risks are likely; abductions (40.82%),
carjacking (40.82%), sexual harassment (38.14%), murders (35.71%), robbery (41.84%) and burglaries
(34.69%). However, a majority of 28.57% thought that hackings into sensitive customer and company
data was less likely. Furthermore, 57.14% of the respondents felt that the regulatory framework for app-
based taxi hailing system were not sufficient to guarantee safety and security while 75.51% were
optimistic that the e-hail transport industry will take meaningful security mitigation measures from the
lessons they have learned. Finally, 92.93% of the respondents felt that government authorities should do
more in regulating app-based services such Uber while 85.86% opined that founders and managers of e-
hail taxi services should be held responsible for security lapses. The study recommends that a review of
existing traffic laws and criminal laws be done to take care of the emerging security risks associated by
app-based service providers.
Keywords
e-hail Taxi, app-based, Uber, Transport, Security Risks, Convenience, Information Technology,
collaborative economy.
1. BACKGROUND
Developments in the transport sector has greatly improved the travelling experience and
enhanced convenience. Integration of technology has revolutionized how transport, especially
Taxi, is operated and experienced. The customer can order a ride and be picked and a place of
choice. With such advancements, scholars and pundits have tended to focus on economic
potential with a cursory glance at the regulatory framework as a reaction to disputes [1].
Unfortunately, this has left the security aspects almost completely ignored despite the various
reported security incidences related to transport access systems like Uber, Lyft among others
[2]. Security risks include sexual harassments, murder, kidnappings, hate crimes hacking into
sensitive customer and organisation information among others.
2. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 8, No 3, August 2019
2
Advancements developments in the transport sector has made life easier in terms of accessing
locations for various reasons ranging from business to leisure. Over the years, innovation has
sought to further improve this convenience. Evolution of information technology has
tremendously enhanced such innovation for convenience in the world transportation sector.
From the from trekking and use of animals or dhows to the invention of the first car by Daimler,
transport means has undergone tremendous development [3]. The need to have transport vessels
control by use of information technology has exceedingly taken precedence over the need to
develop faster cars for instance. With these developments come great potential for economic
growth, convenience and luxury. However, challenges also abound with each improvement
towards advancements in the transport sector.
The world is becoming accustomed to breath-taking technological advancements in the in
transportation. Some companies are even experimenting with self-driving cars and prototypes
are already being tested despite various setbacks. Environmental conservation has required that
vehicles are modified to emit less carbon or even eliminate carbon emissions. This has seen
innovations of electric engines, gas engines, and even thoughts of making engines that can run
onoxygen are being explored. These innovations will surely make a contribution in reducing
carbon emissions and the impact of global warming. However, the problem is a wider than
vehicular carbon emissions and it spans to other large emitters in sea transport, air transport and
even the industries.
Besides the innovations in the vehicular contraptions, service providers have seen the need to
make their services easily available to the consumers in a business model termed as ‘sharing’, or
‘collaborative’ economy, which is typified by new app-enabled business enterprises linking up
consumers with service providers of many kind [4]. To facilitate this booking services have
crossed from the traditional office visit and receipting system to the online booking and
payment platforms in the various service providers’ websites and portals in what some scholars
have referred to as crowd capitalism or platform-based capitalism [5]. The competition in the
taxi transportation sector has made innovation move a notch higher in terms of availing booking
services to the customer. Development of applications such as Uber, Lyt, Taxify and others
have facilitated taxi service providers achieve this through a system of e-Commerce/
collaborative sharing in which people with surplus energy or assets can make money by
assisting others with their skills through an app based intermediary for a commission [4].
1.1. Statement of the problem
Developments in the transport sector has led to tremendous benefits in the transport sector itself
as well in industry, business and world economy a whole. Technology is becoming more
integrated into innovations in the sector. With this integration comes risks of various nature
critical of which is security risk. As in any business undertaking, security is central to all
activities and if not considered well leads to devastating losses in business bottom line,
reputation, and even lives.
Whereas security experts recommend that security must be a consideration in all phases of the
business right from conception and design, most of the time it is ignored. Security plans are
usually a hard sell to management since the costs of instituting security measures are mostly
high [6]. As such, security is often considered as a function of management that does not give
direct returns and thus categorised as a liability to the business. Business managers will look for
any ways to cut down on operating expenses and security is usually vulnerable to such austerity
mentality. Even at deliberations and business developments, security gets downplayed or
ignored all together. Regulatory frameworks are often weak and lacking in foresight of all the
possible risks including business risks [1; 7]. This exposes business ventures to security risks.
3. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 8, No 3, August 2019
3
Information technology adds the cybersecurity dimension to traditional physical security. This
is true for Uber and other e-hail taxi services.
With convenience brought about with such innovations, there comes an even great possibility of
security risks. The fact that they are already being reported in the form of abductions, killings,
theft of property, compromise of sensitive personal or corporate information among others
indicates existence of weak security measures to mitigate such risks or at worst, inadequate
appreciation of the security risks during development of the Uber technology. Similar, scholars
have not been keen to research on e-hail taxi phenomenon and suggest informed steps to
mitigate on negative effects while maximizing on the benefits.
Most authors have explored many aspects of the app-based service provision, Riley [4] looked
at pertinent labour protections issues more so of uber drivers on whether they should be treated
as employees, and enjoy all the protections available. He recommended that a better solution
would be the introduction of a special scheme providing protections similar to those available to
other small business workers in special kinds of commercial relationships. Ignoring security
risks concerns, Geist [1] delved into the threat that technology-based ventures like Uber,Lyft,
Amazon, Netflix, among others pose to the going concern of the traditional business models and
thus the need for regulations to address the concerns by examining the intersection between the
sharing economy and international trade agreement. With most other scholars such as Calo &
Rosenblat [3], Cassar & Meier[8].Escande-Varniol[7],Tucker[5] among others, exploring non-
security aspects of app-based business models especially in the transport sector, there arises a
gap which this study sough to fill by forming the foundation on which to spur further research
into e-hail taxi and other developments in economic sectors with a keen interest on potential
security risk.
1.2. Research Objectives
The paper sought to achieve the following objectives:
i. To explore the evolution of Uber e-hail Taxi Services.
ii. To assess the comparative benefits of Uber e-hail Taxi Services.
iii. To analyse the emerging challenges in Uber e-hail Taxi Services.
2. REVIEW OF LITERATURE
2.1. Evolution ofUber e-hail Taxi Services
Companies such as Uber and Airbnb are less than ten years old, yet they have had a remarkable
disruptive effect on the economy and long-standing regulatory approaches [1]. Uber, based in
San Francisco, currently operates in 662 cities and eighty-two countries around the world [9].
The service provider offers several tiers of service, ranging from upscale town cars with
professional drivers (Uber), to low-cost privately owned “regular cars” driven by amateur or
part-time drivers. Estimated revenue for the company is more than $5 billion annually [8].
According to Blystone[9], Uber’s disruptive technology, explosive growth, and constant
controversy makes it one of the most fascinating companies to emerge over the past decade. For
a period of about ten years, the company has tremendously grown to become one of the highest
valued private start-up company in the world. This is despite facing turmoil on the stock
exchange due to controversies about its security, finances, human resource management, among
other factors. This turmoil has cost uber in terms of valuation. It is estimated that in the 2018
funding round, Uber experienced as slump with its valuation dropping from $70 billion to $48
4. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 8, No 3, August 2019
4
billion [9]. However, some economic pundits such as Jalloh [10] are upbeat that despite the
lower valuation, today is valued more than the market cap of Ford Motor Company and General
Motors Company.
As many other start-ups, including in the tech industry, the story of Uber seems to come from
humble beginnings. According to accounts by Blystone[9], Uber’s story began in Paris in 2008.
It is reckoned that two friends, Travis Kalanick and Garrett Camp, were attendingan annual tech
conference when the duo were not unable to get a cab on a cold winter night. The initial thought
is said to be an idea for a timeshare limo service that could be ordered via an app. After the
conference, the entrepreneurs went their separate ways, but when Camp returned to San
Francisco, he continued to be fixated on the idea and bought the domain name UberCab.com.In
2009, Camp began working on a prototype for UberCab as a side project [9]. By summer of that
year, Camp had persuaded Kalanick to join as UberCab’s ‘Chief Incubator’. Theservice was
tested in New York in early 2010 using only three cars, and the official launch took place in San
Francisco in May. Ryan Graves, who was Uber's General Manager and an important figure in
the early stages of the company, became CEO of Uber in August 2010. In December 2010,
Kalanick took over again as CEO, while Graves assumed the role of COO and board member
[9].The ease and simplicity of ordering a car fuelled the app’s rising popularity. With the tap of
a button, a ride could be ordered; GPS identified the location and the cost was automatically
charged to the card on the user account. In October 2010, the company received its first major
funding, a $1.25 million round led by First Round Capital [9].
It is further noted that, in October 2010, the company received a cease-and-desist order from the
San Francisco Municipal Transportation Agency due to the use of the name UberCab [9]. This
prompted the change of name to Uber and the subsequent buying of the Uber.com domain name
from Universal Music Group.It is reported that in early 2011, the company raised an estimated
$11 million in a round of funding led by Benchmark Capital [3]. This enabled Uber to expand to
New York, Seattle, Boston, Chicago, Washington D.C. as well as abroad in Paris. At the
December 2011 LeWeb Conference, Kalanick announced that Uber raised $37 million funding
from Menlo Ventures, Jeff Bezos, and Goldman Sachs [9]. In 2012, the company broadened its
offering by launching UberX, which provided a less expensive hybrid car as an alternative to
black car service.
During its expansion, Uber has met fierce resistance from the taxi industry and government
regulators. As part of their strategy to mitigate the opposition, the company hired David Plouffe,
a high-profile political and corporate strategist who worked on Obama's 2008 presidential
campaign [2]. In 2014, taxi drivers in London, Berlin, Paris, and Madrid staged a large-scale
protest against Uber [9]. The dispute between traditional Taxi companies and Uber has
manifested on several occasions. Taxi companies have claimed that Uber creates unfair
competition since it avoids expensive license fees and bypasses local laws. These squabbles led
to filling of a case on the matter in Europe’s top court which was heard in December of 2016.
Subsequently, Uber lost its license to operate in London where the company had 40,000
registered drivers in October 2017. In their submissions, the Transport for London (TfL) argued
that Uber was unfit to hold a license, while Uber countered that the Mayor of London had caved
to pressure and persuasions from people keen to limit the consumer’s choice. On June 26, 2018
Uber got a reprieve when a London judge overturned the ban [9]. This development enabled
Uber to operate under a 15-month license along with conditions. According to Bystone[9], the
year 2017 was also a rough year for Uber with troubles beginning in February when a former
female Uber engineer ousted the company for its sexist culture in a 3,000-word blog post. It was
alleged that Uber's corporate culture was highly hostile, sexist and quite offensive to most
people. The post quickly went viral and a number of high-level employees were let go or
resigned for reasons relating to the allegations in the following months. Following the blog post,
5. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 8, No 3, August 2019
5
the board called for an internal investigation which became known as the "Holder Investigation"
resulting in 47 recommendations intended to improve the culture and work environment, and,
according to Uber, the firing of more than 20 staff members [9].
The controversies in Uber’s operations seemed to by developing each day they surmounted a
previous challenge. For instance, in New York, it surfaced that Uber had mistakenly charged
drivers commission based on pre-tax earnings as opposed to after-tax earnings [9]. This
effectively meant that the affected drivers lost tens of millions of dollars.In its defence, Uber
argued that it was an accounting error and assured the affected drivers that it was committed to
paying them back in full as quickly as possible. With what appeared to be a strained
relationship, the driver's advocacy groups claimed that for some time that Uber had been
evading tax at the expense of its drivers[11]. This was a counter argument for the reasons why
the alleged accounting error had been executed by Uber against the victim drivers.
Being a tech app-based intermediary, Uber works like a driver dispatch tech office as
juxtaposed to traditional taxi companies. In its price management, it is observed that Uber uses
an automated algorithm to increase prices based on supply and demand in the market [9]. This
was evident on New Year's Eve of 2011where prices soared to as high as seven times standard
rates this attracting negative feedback from customers. The same situation repeated itself in
December of 2013 snowstorm in New York when hiked prices triggered outrage from Uber
users. The negative customer sentiments on price hikes during peak seasons, and occasions
when demand rises,has made Uberto cap surge pricing especially during bad weather conditions
in New York City.
In a bid to beat competition, diversify operations and attract more customers, Uber
developeda merchant delivery program for food called Uber Eats besides offering UberPool.
These additions allow Uber drivers to pick up multiple customersin one ride that making ita
cheaper option compared to other variant services of Uber such as UberX and UberBlack [3]. In
2017, the company, in partnership with Barclays, rolled out a co-branded rewards credit card in
the U.S. The Uber Visa Card reportedly will be free and come with a $100 starting bonus [10].
Furthermore Blystone[9] noted that on July 9, 2018, Uber was investing in the electric scooter
rental company, Lime, in collaboration with Alphabet Inc.'s Google Ventures. These lightweight
scooters are available for rent all over cities, as customers leave them on the sidewalk for the
next rider, making for a convenience and clean energy-based business model [12]. Uber made
similar efforts with the start-up JUMP Bikes before acquiring the business for reportedly close
to $200 million in April 2018 [13]. All these efforts are geared towards improving customer
satisfaction and beating competition. However, conspicuously lacking in Uber’s evolution and
developments is security risk mitigation strategies. Despite having numerous reported and
conformed security lapses such as the 2016 hacking and data compromise, the story of Uber has
mostly been about more of beating competition and rectifying other non-security controversies.
This leaves one to desire as to what exactly is the company’s security strategies in the face of
abductions, murder, carjacking, burglary among others that are perpetrated by Uber drivers, or
against Uber drivers [14].
Uber was officially launched in Nairobi Kenya on 23 January, 2015 with an initial 20%
discount on fares amounting to about Kshs. 164 per Km[15]. The taxi service provider initially
faced resistance from the existing taxi drivers who were reeling under the lack of customers and
now had to contend with a new entrant in the market. The resistance escalated to open hostility
when one uber taxi driver was badly beaten and his taxi burned by suspected taxi operators who
were opposed to uber based taxi operations[16]. Despite these initial challenges, Uber tried to
engage the dissenting entities to arrive at an understanding on operations. The company also
went ahead to expand to other towns such as Mombasa, Kisumu, Eldoret, Nakuru among others.
6. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 8, No 3, August 2019
6
2.2. Comparative Benefits of Uber Taxi Services
As in many other businesses, the service providers have sought to go to the customer as opposed
to the customer going to them. Customers can now choose their ride, have the taxi pick them at
their location, and pay on arrival at the destination. App- based service providers especially in
the transport sector have proven cheaper and convenient as compared to other transport
providers. Although no figures have been put forward,scholars have noted that many young
people use Uber because it is cheaper than hiring a taxi [4]. Being convenient, clean and cost-
effective, the Ubers and Lyfts among other Transportation Network Companies(TNCs), have
become the primary means for most people get from one point to the next.According to
Jalloh[10], instead of chasing down a taxi on a street; or calling and waiting half an hour for a
dispatch taxi, e-hail app users are able to hail a car from any location using internet connected
smartphones and have it arrive within minutes. Payment for the service is also convenient since
customers can pay using Mobile money services like M- Pesa, or credit card that is linked to the
e-hail Uber account. However, some scholars such as Tucker [5] have argued that there is no
significant difference between Uber app model and the traditional taxi dispatch services. The
Uber app is merely a software platform that enables Uber drivers to reach that public, just as
telephone and radio dispatch services enabled traditional taxi drivers to connect with customers
[5]. However, the app-based system seems to be preferred due to its convenience and the
possibility of sharing you ride information with friends on the network for safety and security
purpose.
Uber and other e-hail TNCs have developed a commendable reputation of providing
Professional Services. Due to competition and regulations, most Uber vehicles are of later
models, clean and comfortable. For instance,in major cities like New York where the taxi
industry is regulated, cars are required to be new, well maintained and chauffeured by
professional drivers who have proper commercial insurance coverage [3]. E-hail taxi service
providers operate in a way that when a driver accepts an assignment, passengers are able to
track a driver's position and route, and they can communicate with the assigned driver if
necessary. A driver only learns the passenger’s destination when the journey starts thus
eliminating the problem of being refused access to a taxi because the passenger wishes to travel
to undesirable parts of town or hiking the fare as a way to discourage the customer from taking
the ride. Furthermore, Riley [4] notes that Uber uses a rating system to determine which drivers
are offering satisfactory services to the customers. Unprofessional drivers are weeded out
because passengers get to rate the driver’s performance with those consistently receiving low
rating being forced out of Uber Taxi services.
It has also been observed that some safety considerations are comparably better for drivers
working with Uber or other e-hail services. For instance, because the transaction is cashless, a
driver does not face unpaid fares or need to carry a sizeable amount of cash that might entice a
robber [10]. Rude, aggressive, and disruptive passengers are eliminated since the drivers can
also rate their customers. Consistently low ratings or reports of unsafe behaviour toward drivers
can cause deactivation of a customer’s account [17]. Uber services are also available around the
clock making it suitable for emergency situations or those who patronize entertainment joints
late into the night. It is noted that unlike yellow cab taxi drivers who work 12-hour shifts, or
black car drivers who are scheduled by dispatchers, Uber and other e-hail drivers enjoy greater
freedom and flexibility [5]. Drivers can log in and out of the system anytime and choose their
own hours. Drivers can avoid expensive taxi rental leases by acquiring their own vehicles. This
means more profit for drivers, all else being equal. Drivers are also spared the stress caused by
favouritism and office politics because the app renders dispatchers irrelevant.
7. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 8, No 3, August 2019
7
Besides the benefits to the customers who use e-hail taxi services for purely transportation,
innovations such as Uber has enhanced job creation for drivers and increased income for drivers
who would otherwise park their vehicles in the Taxi ranks for extended periods of time. Its has
been noted that the sharing economy has attracted increased attentiondue to disruption of
longstanding, well-established market sectors;and also, by creating new opportunities that
threatens powerful economic interests [1]. It has been noted that the gains of uber services is
double of those other non-flexible arrangements [8]. Research findings have shown that by the
end of 2015, the collaborative economy was valued at $504 Million and about 45, 000 people
benefited from it as source of supplementary income [18]. Such advantages lead to growth in
the GDP and per capita income.
home and was later found dead [21]. On the hand, Uber drivers have fallen victim to nefarious
individual who disguise themselves as passengers. Instances of drivers being hijacked, killed,
vehicles stolen has been on the rise. In May 2014, Uber driver reportedly went missing in the
USA and three years later his vehicle was found abandoned [22]. According to NBC news, in
the first week of January 2019, an Uber driver disappeared in Washington DC af
2.3. Emerging Security Risks in UberTaxi Services
With convenience and business potential, Uber and similar service providers have posed
regulatory controversies and security challenges to both the taxi drivers and passengers. It is
noted that risk managers could be underestimating the additional liability exposures that come
with employing transport networking companies [19]Numerous incidences have been reported
or confirmed involving carjacking and even murder of taxi drivers and motorbike riders [2].
There have been instances of hate crime being perpetrated by individuals disguised as uber taxi
drivers [14]. Cases of passengers getting into wrong vehicles thinking it is their ordered Uber
taxi have also surfaced especially in the USA. As this could appear a mistake at face value, a
critical security mind will read mischief in the form of a possible hacking of the traffic between
the customer and the genuine Uber Taxi. These passengers have ended up being raped, killed or
both. However, according to an editorial by The Harvard Crimson [17], Uber has made some
attempts to address such challenges. This is througha partnership between Uber and emergency
response-focused start-upRapidSOS leadinga recent implementation of a “911 Assistance”
feature. The Crimson Editorial Board [17] indicates that the safety response feature included in
the Uber’s new safety toolkit, enables users in Cambridge to contact police without exiting the
app thus giving emergency responders earlier warning in the event of any security issues. While
this is a good effort in improving safety, it is not sufficient in the face of security concerns
raised against the Uber app.More so, the measure is reactive in orientation, rather than being
proactively developed through a Security Risk Analysis(SRA) process as required by safety and
security standards [6].
Passengers facethe risk of fake and predatory drivers posing as Uber taxi drivers. Being based
on IT platforms, and operated through mobile phones and electronic gadget whose security is
weak at best, the possibility of hacking by nefarious elements is an ever present. According to
business insider, Uber updated its software at the end of 2016, which triggered controversy for
allowing it to track locations of users well after their ride had ended [2]. A subsequent analysis
of the flow of data in and out of the updated Uber app, by tech security firm Appthority,
indicated that it displayed a range of risky behaviours that were more of a concern than in
previous versions. A major worry was that the newer versions of the popular ridesharing app no
longer enforced an encrypted connection, through secure sockets layer (SSL) technology, to
send data back and forth thus exposing it to snooping by third parties. Such scares have often
been expressed by security analysts. Thom Rickert, VP and emerging risk specialist at Trident
Public Risk Solutions observed that Protection of PII (personal identifiable information) is a risk
8. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 8, No 3, August 2019
8
that is unique to app-based service providers and that it is a nuance that does not exist with
other types of traditional transportation systems [19].
Sensitive information about key business personalities who use Networked transport services is
more at risk than ever. Integrating with a rideshare platform creates another point of entry into a
company’s corporate network. This exposes confidential company data to theft and increases
vulnerability to a malware attack. In 2017, Uber launched a B2B platform (Uber for Business)
designed to allow companies to manage rides taken by their employees or ordered for customers
or partners [2]. The program allows approved rides to be automatically charged to the company
account and provides detailed records of who took the ride, to where and at what time. By
linking directly to a corporate account, the platform exposes business users to direct financial
theft. It has been established that Uber has the ability to track location not only for C-level
executives but also for salespeople, developers and other enterprise employees whose location
could signal some activities that they don't want revealed for business reasons [2]. Employee
location is very important business information and it becomes more valuable when other
contextual data are added. For example, Uber can access not only the location of a meeting, but
also the meeting agenda, by accessing calendar, and the meeting attendees and their contact
information, by accessing address book.
In the year 2016, a massive data breachoccurredin the Uber app occurred affecting about 57
Million users. According to Uber CEO, Dara Khosrowshahi, the data breach affected the names
and driver’s license numbers of around 600,000 drivers in the United States; and some personal
information of 57 million Uber users around the world, including the drivers [20]. This
information included names, email addresses and mobile phone numbers. To address the
cybersecurity challenges, and in implied admittance of guilt, Uber made the following
recommendations for customers;
“...the Uber app can be blacklisted for all users or only for privileged users or another select
group that may be more high-risk targets. If an enterprise security team chooses not to
blacklist the Uber app, they can educate employees to turn off location services for the app.
Uber will still function, the user just has to type in the pickup address. Users may choose to
do that anyway to avoid the post-ride location tracking. As a general best practice,
enterprises should educate their employees that it is best not to give access to apps which
request access to another app unnecessarily. If access has already been given, the user can
revoke the access by going to the user's settings page on the Uber website.”[20].
Some cases have cases have involved supposedly genuine drivers going rogue and turning on
their customers, raping, kidnapping them for ransom or even killing them. In the USA there
have been various incidents of passengers disappearing after procuring Uber services.
Forinstance, a University of South Carolina mistakenly boarded a cab she thought was a Uber
she had ordered but never arrived ter picking a passenger [23]. In Kenya, it was reported that a
Uber taxi driver was beaten and his car torched in the year 2016 [16]. This seemed to be protest
action by traditional taxi drivers who claimed that entry of Uber services into the Kenyan taxi
market in 2015 was bringing undue competition. In response to such Uber has made promises to
review and strengthen their security measures. Such measures include introduction of a feature
that would help protect both riders and drivers in Kenya from the risks of fraud and theft by
requiring drivers to periodically take selfies in the Uber app accepting rides [24]. The logic is
that incase the photo of the driver does not match the one registered to their account, then that
account is blocked. However, the sufficiency of such measures are still questionable in the
phase of image manipulation applications such as photoshop.
9. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 8, No 3, August 2019
9
Whenever passengers are picked from their residences and dropped off at their destination,
nefarious Uber drivers are able to make an assessment if the security state of the residence and
whether it is left unattended after the customer leaves. This poses another security risk where
properties are exposed to potential burglars masquerading as Uber drivers. Such can be a
motivative factor for a criminal driver to strike a vulnerable target such as an unattended
residential house and steal valuables. Such situation presents classic ingredients for crime to
occur as espoused in the 1979 Routine Activity Theory of Felson and Cohen where a property’s
able guardians become absent and thus an opportunity is created for a willing burglar with
means to strike [25]. An example of such incident is was reported by the Huffington post on 10
April 2019. The report indicated that, after dropping his customers to the airport, a Uber driver
on various occasions came back to the homes of the customers, broke into them and stole
valuable items [26]. Although the driver was later apprehended by police, this exposes a failing
by background checks which Uber has limitations on, thus leaving the customers at the great
risk of dealing with criminal elements in the guise of Uber drivers. Such failings have led to a
numerous incidence of sexual assault cases against Uber passengers. For instance, between July
2013 and July 2016, there were approximately 140 sexual assault allegations against Uber and
Lyft passengers perpetrated by the drivers in the USA, UK, Australia and China [27]. This is as
compared to only five reported incidences of Kidnapping of Uber drivers during the same
period.
Governments have recognised the need for some regulation the collaborative economy sector,
with caution that new regulation should not strangle innovation and forfeit all these coveted
economic benefits [4]. However, it has been noted that, most regulatory initiatives have focused
on issues consumer protection and risks of unfair competition with established service
providers. In Australia for instance, Riley [4] notes that, the Road Transport (Public Passenger
Services) (Taxi Industry Innovation) Amendment Act 2015 introduced amendments to the Road
Transport (Public Passenger Services) Act 2001 in a bid to ensure that the new passenger
transport services providers such as Uber and Lyft are regulated alongside the taxi hire car
industries in the interests of passenger safety, by ensuring the registration and accreditation of
drivers. However, whereas the acts seem to cover normal road safety concerns, it ignores issues
of security issues such as vetting of service providers more so the drivers. The regulations also
ignore the fact that app-based transport service provision brings about issues of cyber security
which the tradition transport regulations may not cover.
In Kenya, the law governing traffic conduct is contained in the Traffic Act, 2016 Chapter 403,
laws of Kenya (which was revised in 2018). While the act considers most aspects relating to
traffic regulations, it does not have a provision for app-based system of procuring/ hailing
transport, especially on apportioning liability in case of security mishaps. While this can be
considered to be taken care of in the Kenya Penal Code of 2012, Chapter 63 Laws of Kenya
(revised in 2014), such cases are likely to be thrown out based technicalities since Uber in itself
is an in itself cannot do background check and does not assume liability for the conduct of
drivers using the app despite instituting a raft of safety measures.
2.4. Conceptual Framework
The paper conceptualizes the relationship of factors in a atom nucleus model. Security forms
theproton core around which the other developmental, and operating factors must revolve
around as wold the electrons. That relationship is as depicted in the security atom model below:
10. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 8, No 3, August 2019
10
Figure 2.1: Security AtomModel (Author)
From figure 2.1 above, security and its considerations form the core around which other
concepts have to be developed. Right from the conceptualisation and design of e-hail taxi
technology, business utility of e-hail taxis, through to development and approval of the
regulatory framework, and security risks assessments and mitigation measure, security
considerations must be the anchor of them all. Virtually all ventures are fraught with risks of
various kinds. Most critical of these risks are security related since they can unhinge an
undertaking or even lead to catastrophic outcomes. The security atom,as the author
conceptualises it, underscores the central role of security in any entrepreneurial undertaking.
Just like at the protons form the nucleus of an atom, security is at the core of any venture. The
main and supporting concepts through the lifespan of the venture will revolve around security
considerations just like electrons revolve around the nucleus in an atom. Ignoring security
considerations from design, operation and termination of a business undertakings is a gross
mistake that often leads to devastating results.In the traditional conceptual framework, security
is the independent variable while the dependant variables are; e-hail taxi conceptualization and
developmental processes, operation and business utility, regulatory framework, and security risk
assessment and mitigation measures. Whereas the model can be adapted to any business activity
by substituting the surrounding factors (electrons) with those particular to a business, the core
represented by security cannot be substituted.
3. METHODOLOGY
The study used exploratorysurvey design. Exploratory research, also known as formulative
research studies, are aimed at formulating a problem for more precise investigation or of
developing the working hypotheses from an operational point of view [28]. The major emphasis
in such studies is on the discovery of ideas and insights. The research problem for formulative
studies is broadly defined initially and then it is transformed into one with more precise
meaning but where facts may necessitate changes in the research procedure for gathering
relevant data [28].Since Uber is a relatively new venture and more so its security risks aspects
have not been researched on, this design is there suitable for exploring this aspect and forming a
foundation for further studies/research.
The target population for this study was 4,556,381 residents of Nairobi City County, Kenya. A
sample size of 400 respondents was drawn using Yamane formula on sample size. Purposive
sampling was then used to select Uber drivers and customers. Data collected using
SECURITY
E-hail taxi
concept,
design and
developme
nt
Operation
s and
business
utility
Regulator
y
Framewor
k
Security
Risk
Assessme
nt and
Mitigatio
n
Measures
11. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 8, No 3, August 2019
11
questionnaire with clarification afforded to respondents by trained research assistants. The
results and discussion are as presented in section 4.1.
4. SUMMARY FINDINGSAND DISCUSSION
4.1. Summary Findings
The Figures below presents that findings on various aspects ofcustomer use of uber services and
their opinions. They range from frequency of use, opinion on convenience, whether uber offers
more business and employment opportunities,whether Uber taxis portend security risks,
likelihood of certain security risks when using uber taxi services, whether existing regulations
on Uber Taxi services are sufficient to guarantee security of customers, whether e-hail taxis
services can take reasonable measures to self-regulate, opinion on whether the government
agencies need to do more to regulate Uber Taxi services and whether founders and managers of
e-hail taxi services should be held accountable for security lapses.
Figure4.1: How often respondents used Uber Taxi
In figure 4.1 above the 27.27% of the respondents indicated that they used Uber Taxi services
very often while 32.32% indicated they used Uber Taxi services somewhat often. A similar
percentage indicated that they do not often use Uber Taxi services while 2.02% and 6.06%
indicated that they extremely often use Uber Taxi services and never use Uber Taxi services
respectively.
Figure 4.2: Convenience of Uber Taxi Compared to other Taxi Service Providers
2.02%
27.27%
32.32% 32.32%
6.06%
0.00%
5.00%
10.00%
15.00%
20.00%
25.00%
30.00%
35.00%
Extrement Often Very Often Somewhat Often Not so Often Never
33.11%
58.76%
3.09% 1.03% 0.00%
Strongly Agree Agree Neither agree or Disagree Disagree Strongly Disagree
12. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 8, No 3, August 2019
12
Figure 4.2 above indicates the perception of the respondents about the convenience of Uber
Taxi Services as compared to other traditional Taxi service providers. A majority of the
respondents (58.76%) agreed that Uber Taxi is comparatively convenient while 33.11% strongly
agreed. 3.09% of the respondents were undecided on whether Uber Taxi is comparatively
convenient while 1.03% disagreed.
Figure 4.3: Uber offering Business/Employment Opportunities
Figure 4.3 above presents the respondents opinion on whether Uber Taxi services offer business
and employment opportunities. Majority of the respondents (86.46%) replied in the affirmative
while 13.54% opined that it does not offer more business and employment opportunities.
Figure 4.4: Uber Taxi Meeting Customer Expectations
On whether Uber Taxi services met customer expectations Figure 4.4 above indicates that
84.69% felt that Uber Taxi services met their expectations while 9.18% felt that it exceeded
their expectations. However, 6.12% of the respondents felt that Uber taxi services were below
their expectations.
Figure 4.5: Uber Taxi Services Portend Security Risks
Yes, 86.46%, 86%
No, 13.54%, 14%
, 0, 0%, 0, 0%
Yes No
9.18%
84.69%
6.12% 0
Exceeded Expectations Met Expectation Below Expectation
65.31%
34.69%
0.00%
20.00%
40.00%
60.00%
80.00%
Yes No
13. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 8, No 3, August 2019
13
On whether Uber Taxi services portend security risks to drivers and customers, Figure 4.5
above indicates that 65.31% of the respondents agreed that Uber Taxi services portend security
risks while 34.69% of the respondents disagreed.
Figure 4.6: Likelihood of Security Risks to occur when using Uber Taxi
The respondents were asked to give their opinion on the likelihood of certain security risks
occurring to either Uber drivers or customers and the responses are as indicated in Figure 7
above. The security risks included Abduction , carjacking, sexual harassment/abuse, murder,
robbery, and burglary. In summary, Majority indicated that the following risks are likely;
abductions (40.82%), carjacking (40.82%), sexual harassment (38.14%), murders (35.71%),
robbery (41.84%) and burglaries (34.69%). However, a majority of 28.57% thought that
hackings into sensitive customer and company data was less likely.
Figure 4.7: Sufficiency of Existing Regulatory Framework to Guarantee Security of Uber Taxi Users
The respondents were asked whether they felt that the existing regulatory framework on
transportation sector and security was sufficient to guarantee security of Uber Taxi services
users. From Figure 4.7 above, majority of the respondents (57.14%) felt that the existing
Abductions Carjacking
Sexual
Harassment
/Abuse
Hacking
Sensitive
Customer/
Corporate
Data
Murder Robbery
Burglary of
Customer
Premises
after being
Dropped
off
Extremely Likley 7.06% 7.14% 11.34% 9.18% 12.24% 13.27% 10.20%
Highly Likely 18.37% 22.45% 15.46% 25.51% 9.18% 15.31% 17.35%
Likely 40.82% 40.82% 38.14% 24.49% 35.71% 41.84% 34.69%
Less Likely 28.57% 25.51% 30.93% 28.57% 33.67% 24.49% 27.55%
Not Likely 6.12% 4.08% 4.12% 12.24% 9.18% 5.10% 10.20%
0.00%
5.00%
10.00%
15.00%
20.00%
25.00%
30.00%
35.00%
40.00%
45.00%
Extremely Likley Highly Likely Likely Less Likely Not Likely
42.86%
57.14%
0.00%
10.00%
20.00%
30.00%
40.00%
50.00%
60.00%
Yes No
14. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 8, No 3, August 2019
14
regulatory framework was not sufficient to guarantee security of Uber users. Conversely,
42.86% of the respondents agreed that the regulatory framework was sufficient to guarantee
security of Uber Taxi Users.
Figure 4.8: Whether e-Hail Taxi Service Providers will take Significant Security Mitigation Measures
The respondents were asked whether they thought e-hail taxi service providers will take
significant security mitigation measures as a way to self-regulate. Figure 4.8 above indicate that
75.51% of the respondents agreed that e-hail Taxi service providers will take significant security
mitigation measures while 24.49% disagreed.
Figure 4.9: Should Relevant Government Authorities do more to Regulate Uber Taxi services
Figure 4.9 above indicates the respondents opinion on whether relevant government agencies
should do more in regulating the Uber Taxi Industry. Majority of the respondents (92.93%)
agreed that the government should take more measures to regulate Uber taxi services while
7.07% disagreed.
Figure 4.10: Whether Founders and Managers of e-hail Taxi Service Providers should be held
accountable for security lapses.
75.51%
24.49%
0.00%
10.00%
20.00%
30.00%
40.00%
50.00%
60.00%
70.00%
80.00%
Yes No
92.93%
7.07%00
Yes No
85.86%
14.14% 0 0
Yes No
15. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 8, No 3, August 2019
15
On whether the founders and managers of e-hail taxi service providers should be held
accountable for security lapses, Figure 4.10 indicate that 85.86 % of the respondents agreed
while 14.14% disagreed.
4.2. Discussion
The study found out that most people prefer using uber as indicated by Majority of the
respondents indicated 32.23% of the respondents. This is due to the comparative convenience
offered by e-hail mode of taxi transportation as affirmed by 58.76%. Besides conveniences,
Uber is preferred since is offers employment opportunities for taxi drivers would otherwise be
sitting parked in taxi ranks with minimal prospects of getting customers. Also, business
opportunities are afforded in this way and in the faster and convenient way that uber tend to
deliver commodities such as the case with Uber-eats[10]. This aspect of business and
employment opportunities is affirmed by 86.46% of the respondents.
However, with such significant statistics indicating preference for e-hail taxi services such as
Uber, many people are exposed to security risks besides the traditional road safety concerns. As
indicated in the study 65.31% opined that Uber portend security risks to both the drivers of uber
taxis who can fall victim to rogue customers and also customers who can fall victim to rogue
uber drivers. Some of the security risks that respondents feared to likely occur when taking a
uber ride include; abductions (40.82%), carjacking (40.82%), sexual harassment (38.14%),
murders (35.71%), robbery (41.84%) and burglaries (34.69%). All this are security incidents
that have been reported to have occurred while using services such as Uber or Lyft.
Interestingly, a majority of 28.57% thought that hackings into sensitive customer and corporate
data was less likely.On the one hand, this statistic is likely to be indicative of the lack of
information on the extend and effects of such hackings since corporate organisations tend to
keep such incidents inhouse as a way of damage control and image protection [2]. On the other
hand, such incidents are rare and occur far apart.
The existing regulatory framework in both the security sector and transport sector are not
keeping up with the fast evolution of technology. This trying to apply them to current evolved
situations is self-defeating since they will definitely be insufficient in address the new dynamics
[7; 4]. This view is supported by 57.14% of the respondents who felt that the existing regulatory
framework for app-based taxi hailing system were not sufficient to guarantee safety security.
Despite this, 75.51% of the respondents tended to be optimistic that e-hail transport industry
will take meaningful security mitigation measures from the lessons they have learned.However,
this is optimism tends to be false since 92.93% of the respondents felt that government
authorities should do more in regulating app-based services such Uber despite the positive
outlook on Uber self-regulation.
The issue of accountability especially uber company has been a contentious issue with claims
the uber app is just a facilitator and thus not responsible for any security incidents that may
befall drivers or customers [5]. This is an escapist excuse since the fact that uber makes it easier
to connect taxis to customers is the same way they make easier for rogue elements to access
their victims. Therefore, business and security wisdom would require due diligence to be
conducted as part of the ‘duty of care’ that all the players owe to the drivers and customers of
uber. It is immoral to continue receiving monetary benefits from transactions that increasingly
put peoples’ lives at risk yet one is not taking the necessary precautions. Security precautions
can only be taken by an entity with a security culture [25]; whose operations revolve around
security as indicated by the security atom model in figure 2.1. Failure in security due diligence
requires appropriated judicial action as affirmed by 85.86% of the respondents who felt that the
founders and managers of e-hail taxi services should be held responsible for security lapses.
16. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 8, No 3, August 2019
16
5. CONCLUSIONS
While lauding the impressive improvements in transportation that comes with tech-based apps,
this study points out to the need to take reasonable security precautions in order to reduce
security risks to as low as reasonably possible(ALARP). This is in realisation of the fact that
every undertaking is not risk free, and with the consideration that security incidents involving
Uber have occurred. Whereas the study did not attempt to establish whether security
consideration were factored in during the conception and operationalization of the app-based
taxi hailing services, it does however note that the security lapses and reactionary mitigative
approaches are indicative of lack of such considerations; and thus concludes that there were
security gaps in the conceptualization, development, launch and operationalization of the Uber
and other app-based taxi hailing services. Therefore, what the tech-based service providers are
reactionary and retrofit attempts to patch-up for the security failures. Unfortunately, it is being
done consequent to loss of lives, property and tremendous psychological anguish to the
unfortunate victims.
6. RECOMMENDATIONS
Based on the findings of the study, the following recommendations are thus put forward:
i. A review of exiting security measures applied to Uber services and other app-based taxi
hailing services(even other sharing economies including Airbnb). This should be in the
form of a comprehensive security risk analysis leading to development of security plan that
is amenable to review to keep pace with the inherent industry dynamics.
ii. Existing regulations in the transport and security sectors need to be aligned with the
developments of app-based taxi hailing services and the sharing economy in general. The
regulations should spell out the burden of responsibility to be shouldered by the
government, developers and managers of app-based taxi hailing services and sharing
economies, taxi drivers, and even customers in ensuring the ALARP security point is
attained.
6.1.Areas for further study
The study recommends that research should be conduct in the following aspects:
I. Security impact of the risk portended by e-Hail Taxi services and sharing economy.
II. Responsibility ofparties in app-based taxi service providers in mitigation of security
risks.
III. A review of the conceptualisation and operationalization of app-based taxi service
providers and sharing economy to establish the place of security considerations.
REFERENCES
[1] Geist, M. (2018). The Sharing Economy and Trade Agreements: The Challenge to Domestic
Regulation. In D. McKee, F. Makela, & T. Scassa (Eds.), Law and the "Sharing Economy":
Regulating Online Market Platforms (pp. 223-260). Ottawa: University of Ottawa Press.
[2] Business Insider. (2017). Businesses using Uber are exposed to a security risk that could leak
sensitive data. Retrieved April 15, 2019, from www.businessinsider.com:
https://www.businessinsider.com/businesses-using-uber-are-exposed-to-a-security-risk-that-could-
leak-sensitive-data-2017-8?IR=T
17. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 8, No 3, August 2019
17
[3] Calo, R., & Rosenblat, A. (2017). THE TAKING ECONOMY: UBER, INFORMATION, AND
POWER. Columbia Law Review, 117(6), 1623-1690.
[4] Riley, J. (2017). Brand New ‘Sharing’ or Plain Old ‘Sweating’?: A Proposal for Regulating the New
‘Gig Economy. In R. LEVY, M. O’BRIEN, S. RICE, P. RIDGE, & MARGARETTHORNTON
(Eds.), New Directions for Law in Australia: Essays in Contemporary Law Reform (pp. 59-70).
ANU Press.
[5] Tucker, E. (2018). Uber and the Unmaking and Remaking of Taxi Capitalisms: Technology, Law,
and Resistance in Historical Perspective. In D. McKee, F. Makela, & T. Scassa (Eds.), Law and the
"Sharing Economy": Regulating Online Market Platforms (pp. 357-392). Ottawa: University of
Ottawa Press.
[6] Kamais, C. E. (2019). Complacency and Security Management Practices in Nairobi City County,
Kenya. American Journal of Humanities and Social Sciences Research (AJHSSR), 3(4), 01-13.
[7] Escande-Varniol, M.-C. (2018). The Legal Framework for Digital Platform Work: The French
Experience. In D. McKee, F. Makela, & T. Scassa (Eds.), Law and the "Sharing Economy":
Regulating Online Market Platforms (pp. 321-356). Ottawa: University of Ottawa Press.
[8] Cassar, L., & Meier, S. (2018). Nonmonetary Incentives and the Implications of Work as a Source
of Meaning. The Journal of Economic Perspectives, 32(3), 215-238.
[9] Blystone, D. (2019). The Story of Uber. Retrieved April 22, 2019, from www.investopedia.:
https://www.investopedia.com/articles/personal-finance/111015/story-uber.asp
[10] Jalloh, M. S. (2019). Uber: Advantages and Disadvantages. Retrieved April 15, 2019, from
www.investopedia.com: https://www.investopedia.com/articles/investing/110614/taxi-industry-pros-
cons-uber-and-other-ehail-apps.asp
[11] Scheiber, N. (2017). Uber to Repay Millions to Drivers, Who Could Be Owed Far More. Retrieved
April 24, 2019, from www.nytimes.com:
https://www.nytimes.com/2017/05/23/business/economy/uber-drivers-tax.html?_r=0
[12] Sun, T., & Bao, B. (2018). Lime's Next Chapter In Smart Mobility Backed By GV And Uber.
Retrieved April 24, 2019, from www.li.me: https://www.li.me/second-street/lime-smart-mobility-
backed-by-gv-uber
[13] Dickey, M. R. (2018). Uber acquires bike-share startup JUMP. Retrieved April 24, 2019, from
techcrunch.com: https://techcrunch.com/2018/04/09/uber-acquires-bike-share-startup-jump/
[14] Sweeney, M. M., & Perliger, A. (2018). Explaining the Spontaneous Nature of Far-Right Violence
in the United States. Perspectives on Terrorism, 12(6), 52-71.
[15] Alastair. (2015). Uber Kenya Launch Party. Retrieved April 29, 2019, from Uber Website:
https://www.uber.com/en-KE/blog/uber-kenya-launch-party/
[16] Reuters. (2016). Uber driver attacked in Kenya, his taxi torched: police. Retrieved April 29, 2019,
from www.reuters.com: https://www.reuters.com/article/us-kenya-security/uber-driver-attacked-in-
kenya-his-taxi-torched-police-idUSKCN0VV19X
[17] The Crimson Editorial Board. (2019). New Uber Feature Promises Physical Safety, Data Risks.
Retrieved April 15, 2019, from www.thecrimson.com:
https://www.thecrimson.com/article/2019/2/11/editorial-uber-feature-safety-data/
18. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 8, No 3, August 2019
18
[18] State of NSW Department of Finance, Services and Innovation. (2015). The Collaborative Economy
in NSW – A Position Paper. Retrieved from NSW State website:
http://www.finance.nsw.gov.au/publication-and-resources/collaborative-economy
[19] Dwyer, K. (2018). Uber for Business: More Dangerous Than We Realized. Retrieved April 15,
2019, from https://riskandinsurance.com/uber-for-business-critical-risks-to-consider-before-
requesting-a-ride/
[20] Uber Newsroom. (2017). 2016 Data Security Incident. Retrieved April 15, 2019, from
www.uber.com: https://www.uber.com/newsroom/2016-data-incident/
[21] Washington Post. (2019). Woman killed after getting into what she thought was an Uber. Retrieved
April 28, 2019, from www.washingtonpost.com: https://www.washingtonpost.com/crime-
law/2019/03/31/she-thought-she-had-gotten-into-her-uber-police-say-hours-later-hunters-found-her-
body/
[22] Hoodline. (2017). Uber Driver Remains Missing After Car Is Found In Bayview. Retrieved April
28, 2019, from hoodline.com: ttps://hoodline.com/2017/05/uber-driver-remains-missing-after-car-is-
found-in-bayview
[23] NBC News. (2019). Uber Driver Disappears After Picking Up Passenger in DC. Retrieved April 28,
2019, from www.nbcwashington.com: https://www.nbcwashington.com/news/local/Uber-Driver-
Disappears-After-Picking-Up-Passenger-in-DC_Washington-DC-505228392.html
[24] Dahir, A. L. (2017). Uber drivers in Kenya will take selfies to keep riders safe. Retrieved April 29,
2019, from Quartz Africa Website: https://qz.com/africa/1019010/uber-is-introducing-live-face-
checks-in-kenya-to-reduce-driver-fraud/
[25] Purpura, P. P. (2013). Foundations of Security and Loss Prevention. In P. P. Purpura, Security and
Loss Prevention (6 ed., pp. 661-705). Butterworth: Heinemann. doi:https://doi.org/10.1016/C2010-
0-69612-X
[26] Huffington Post. (2019). Uber Driver Burglarized Home After Dropping Customers Off At Airport,
Police Say. (H. Miller, Producer) Retrieved April 28, 2019, from www.huffpost.com:
https://www.huffpost.com/entry/uber-driver-robs-passengers-home_n_5cadda32e4b0d6eb63c24e54
[27] Atchsion Transportation Services . (2017). REPORTED LIST OF INCIDENTS INVOLVING
UBER AND LYFT. Retrieved from www.atchisontransport.com:
https://www.atchisontransport.com/blog/reported-list-of-incidents-involving-uber-and-lyft/
[28] Kothari, C. R. (2004). Research Methodology: Methods and Techniques (2 ed.). New Delhi: New
Age International Publishers.
AUTHOR
Cosmas Ekwom Kamais1
is Masters Candidate (Security Management) at the
Egerton University, Kenya. He is also undertaking Masters in Peace and
Security Management at Kenyatta University Kenya. He holds a BSc in Military
Science from Egerton University and Postgraduate Level 6 Diploma in Certified
Security Management Professional (CSMP) from the International Security
Management Institute, United Kingdom (ISMI). He is also Member of ISMI (M.
ISMI).