The title of this project is profiling as an integral to enhance safety and security in UAE: A qualitative analysis of the Implications of Artificial Intelligence.
Profiling and artificial intelligence are highly practiced in the existing scenario for their safety and security. In current times, people highly eliminate the information based security with machine-based information because of the threat of data piracy. However, it is established in the existing scenario for the safety with the security. In the earlier period, people highly eliminate information-based security along with machine-based information because of the threat of data piracy (Budnitz, Rogner, and Shihab-Eldin, 2018). However, it is built in current times because information trend continues to grow and society has been forced for building new and intimate familiarities with the data-driven system and algorithm. In UAE, the artificial agent acts for decision making and devices that aids for algorithm learning procedure, automation, and drive the data. It also entails the system for the advanced cognitive system, online suggestion and also supports in the safety and security of the people (Ahmed, 2017).
This study will be beneficial for gaining the awareness that profiling as an integral to enhance safety and security in UAE. It would also lead to increase the knowledge about the ways of profiling and artificial intelligence in improving the safety and security of people in UAE. It also focuses on the advancements and contributions of Artificial Intelligence in profiling (Kashwani, and Nielsen, 2017).
The main aim of the proposed study is to address the role of profiling in enhancing the safety and security in UAE.
The given below objectives would be practiced for attaining the key aim of this investigation:
RO1: To explore the conceptual understanding about the profiling and artificial intelligence in the safety and security of people in UAE
RO2: To identify the roles of profiling in improving the safety and security of people in UAE
RO3: To discuss the advancements and contributions of Artificial Intelligence in profiling
As per the view of Meshkati et al. (2016), profiling and artificial intelligence is stable transaction from storage tower implementations to utility of function in across of several industries as a type of artificial general intelligence competencies. It is related to different products and services and application that maintain end-users. This transformation would have an intense impact on the security, safety, and privacy of the company and customers. It is also evaluated that uses of artificial intelligence are growing in across of different sector and it is associated with safety, security, and privacy of people.
(Sources: Nguyen, 2016).
In opposed to this, Pathirage and Al-Khaili (2016) stated that the AI-powered technique is used to perform the particular repetitive task with efficiency. The key reason for practicing profiling and AI is that it could remove the error of an individual from the tasks and aids to accomplish the appropriate result. Moreover, such a tool could be performed 24*7 hours as compared to the involvement of humans. Therefore, they eliminate the need for managing a different group of teams in a day and night shifts to work on particular tasks. For example, profiling and AI-powered chat support could answer the uncertainties of customers and provides help to visitors in each minute of the day and improves the revenue of the company.
In the view of Jakhu and Chen (2018), people are engaged to learn artificial intelligence associated with machines as it would aid to deal with the difficult equations and creates the critical tasks on their own. Therefore, the outcome created may generate the reliable outcome instead involving the human participation. This high truthfulness develops indispensable to deal in several sectors particularly, owing to the criticality of tasks. In addition, robots are superior with regards to resolving the major concerns like avoiding data theft in UAE.
According to Theophilus et al. (2018), AI practices are contributing to profiling such as storage of customer data and their experiences. It aids to retain the customers at long terms and also helps to increase customer loyalty. It is analyzed that AI practices machine learning algorithms like deep learning with neural networks to learn the innovative profiling things in UAE. This approach may eliminate the need to write new code at each time as an individual needs to learn more innovating things of profiling.
In contrast to this, Meshkati and Tabibzadeh (2016) the key advantage of practicing artificial intelligence powered machines is to manage the profiling the work. It also aids to gather a large quantity of information related to performance. This data can be processed to collect the deep perception about the process with qualitative assessment hence; people can keep the safety and security in profiling.
According to Newman Isaacs and Constantin (2016), people should use software that is easier to use and smarter that could be effective to improve safety and security in UAE. It can also provide the digital integration to insert AI from the key of edge. It would also make competent to people for real-time evaluation. It illustrates the capability to perform smart intake, pivoting, shifting, splitting and rapid data backbiting. An individual should identify the AI machines that combine the needs with objectives. For instance, when an individual is performing smart data wrangling then they may require verifying everything that they have attained. It can lead to identifying the resources to complete the task. Moreover, an individual can also generate the app for introducing and calling the rest limitations.
In opposed to this, Alqahtani et al. (2015) illustrated that people should focus on the vertically-oriented approach and customize to the area. They can also involve different components to deal with the AI based concern. It can also focus on different features of AI to determine safety and security. It can also support to comprehend the profiling of customers and aids in understanding attributes preferred by consumers.
With regards to the business of UAE, Memon (2017) recommended that a corporation should understand the business concern that needs to resolve. In such a manner, AI should be implemented in the business procedure to identify the concern. There are some case studies which would support for understanding the positive and negative aspect for leveraging the technology in an effective way. This technology would have highly persuaded the business process with respect to measuring the safety and security of people in UAE.
Interpretivism philosophy of research will be practiced in this research study because interpretivism philosophy would facilitate the research scholar to evaluate the views and opinion of the research participants in an effective manner. This philosophy would also assist the research scholar to achieve the reliable outcome related to AI (artificial intelligence) and its implications to enhance safety and security in UAE. Interpretivism philosophy plays an imperative role in the accumulation of reliable facts about research dilemma. In contrast to this, due to subjective nature of this research study, positivism and realism philosophies of research would not be practiced by the researcher (Butti Al Shamsi, et. al., 2018).
This investigation is subjective in nature and due to this reason; inductive research approach would be executed by the research scholar as compared to a deductive approach. This research approach enables the researcher to gain theoretical knowledge of the current research matter. Research scholar could enhance the trustworthiness and validity of the research outcome by implementing this research approach. Inductive research approach would facilitate the researcher to determine AI (artificial intelligence) and its implications to enhance the safety and security in UAE. On the other hand, in this research study, there is no need of making a hypothesis for responding to research questions (Alders, et. al., 2018).
Qualitative research design would be used by the investigator due to its exploratory nature. This research design offers a full image of expectations to the research scholar through a research project. Further, this research design facilitates the investigator to evaluate the individual’s behavior and components that affecting behavior. Under this investigation, an investigator would keep the objectivity and try to conduct a precise measurement for attaining the reliable research outcome (Faour-Klingbeil, and Todd, 2018).
Causal type of research would be executed by the research scholar for evaluating the effects and causes of the relationship between profiling and AI (artificial intelligence), and safety and security in UAE. This type of research delivers appropriate data related to research matter. It also supports the research scholar for accumulating the real and valid facts associated with profiling and AI (artificial intelligence) and its implications to enhance the safety and security in UAE (Najaf, et. al., 2017).
In this investigation, an investigator will use case study associated with Profiling as an integral to enhance safety and security in UAE. By using this approach, an investigator would be competent to assess the previous phenomenon related to research concern. Moreover, a case study is practiced for assessing the particular research concern within the edge of a company. In this investigation, a descriptive case study is practiced by an investigator to evaluate the key concern related to this investigation (Alders, et. al., 2018).
In contrast to this, a literature review is practiced by an investigator to attain the aim and objectives of the investigation. Through the literature review, an investigator will use different secondary sources like textbooks, journal articles, online sites, and offline articles for obtaining deep knowledge about the Profiling as an integral to enhance safety and security in UAE. This strategy would be beneficial for obtaining a reliable and valid outcome. These strategies would enable an investigator for increasing the trustworthiness of investigation result (Butti Al Shamsi, et. al., 2018).
Research scholar would utilize a non-probability sampling technique in this research study due to the subjective nature of this investigation. Under this sampling technique, the investigator would choose sample group as per their own views and opinion. Investigator would practice their personal opinion for selecting the group of the sample for obtaining the aim and objectives of the research. Consequently, the purposive sampling method of non-probability sampling would be practiced by the research scholar. In purposive sampling method, research scholar assumes that he/she could acquire the representative sampling with the help of their good judgment which will consume minimum time and money (Najaf, et. al., 2017).
In this research study, the researcher would use secondary data collection method as this method assist to attain the valid and appropriate research outcome. There are certain online and offline sources that support to gather secondary data such as authentic websites, annual reports, journals, and articles. This method is imperative as it provides accurate facts and data in minimum cost and time. The trustworthy and consistent outcome could be achieved by incorporation of this data into LR (literature review) (Faour-Klingbeil and Todd, 2018).
In the process of research, a research will face a certain issue that may negatively affect the outcome of research. In this way, money, access to data and time are key constraints that can restrict the research with respect to collecting the valuable and reliable outcome. In this research, the minimum time is required to conduct the research might negatively influence the whole research study with regards to collecting the adequate amount of data via different sources related to Profiling as an integral to enhance safety and security in UAE. In addition, money is another limitation that could negatively influence the researcher to conduct genuine research in this area. Because of less funding, a researcher will be unable to go towards the several sorts of data resources and also unable for acquiring the data from authentic sources (Araújo, 2015). This could also create an edge for the reliability and validity of research among people of UAE.
Under this investigation, an investigator could face certain ethical concerns like privacy, in-text citation, and plagiarism. Therefore, the researcher would use privacy act to maintain the privacy of respondents. Moreover, in each paragraph, an investigator would provide a proper in-text citation for gaining the reliability of investigation. The researcher will collect the peer-reviewed articles for conducting the research ethically. By using this, a researcher will be proficient to capture the secondary data in-depth associated with Profiling as an integral to enhance safety and security in UAE. It is effective for the researcher to keep the authenticity of information effectively (Athawale, 2015). Moreover, a researcher has instructed the approach related to privacy like privacy data would not be revealed after and during the research study.
There are some risk related to this research like peer-reviewed articles, authentic case studies, and fake result that can influence the outcome of the investigation and generates the difficulty in accomplishing the aim and objectives of research (Hatzivasilis, Papaefstathiou, and Manifavas, 2017).
This research will support the researcher to create the depth knowledge about the Profiling as an integral to enhance safety and security in UAE. This investigation would be beneficial for gaining an understanding of the roles of profiling in improving the safety and security of people in UAE. It would be also supportive of gaining knowledge about the advancements and contributions of Artificial Intelligence in profiling.
Under this investigation, there are certain limitations and risks that could directly influence the outcome of the investigation. Therefore, an investigator should emphasize on the strategy for eliminating it. Moreover, a researcher can use more than 3 case studies to collect information regarding the investigation in the upcoming times. It can also use more secondary sources in the further investigation to capture more reliable and feasible results (Plant, and Authority, 2015).
References
Ahmed, K.G., 2017, March. Sustainable Urban Regeneration Strategies for Deteriorated Neighborhoods Centers in UAE. In International Sustainable Buildings Symposium (pp. 736-749). USA: Springer, Cham.
Alders, R.G., Ratanawongprasat, N., Schönfeldt, H. and Stellmach, D., 2018. A planetary health approach to secure, safe, sustainable food systems: workshop report. Food Security, 10(2), pp.489-493.
Alqahtani, F., Chinyio, E., Mushatat, S. and Oloke, D., 2015. The Links between the Values of Abu-Dhabi Police and the Competencies of Their Project Managers. Journal of Engineering and Architecture, 3(2), pp.157-169.
Araújo, K., 2015. Dynamics of International Nuclear Safety: Post-Fukushima Developments in Regulatory Oversight and Filtered Vent Technology in Six Nuclear Countries. In Nuclear Threats and Security Challenges (pp. 193-206). USA: Springer, Dordrecht.
Athawale, C.Y.V., 2015. Towards Enhancing Maritime Capability in the Indian Ocean Rim. Maritime Affairs: Journal of the National Maritime Foundation of India, 11(2), pp.81-98.
Budnitz, R.J., Rogner, H.H. and Shihab-Eldin, A., 2018. Expansion of nuclear power technology to new countries–SMRs, safety culture issues, and the need for an improved international safety regime. Energy Policy, 119, pp.535-544.
Butti Al Shamsi, K., Compagnoni, A., Timpanaro, G., Cosentino, S.L. and Guarnaccia, P., 2018. A Sustainable Organic Production Model for “Food Sovereignty” in the United Arab Emirates and Sicily-Italy. Sustainability, 10(3), p.620.
Faour-Klingbeil, D. and Todd, E., 2018. A Review of the Rising Prevalence of International Standards: Threats or Opportunities for the Agri-Food Produce Sector in Developing Countries, with a Focus on Examples from the MENA Region. Foods, 7(3), p.33.
Hatzivasilis, G., Papaefstathiou, I. and Manifavas, C., 2017, June. Real-time management of railway CPS secure administration of IoT and CPS infrastructure. In Embedded Computing (MECO), 2017 6th Mediterranean Conference on (pp. 1-4). IEEE.
Jakhu, R.S. and Chen, K.W., 2018. The Missing Link in the Global Aviation Safety and Security Network: The Case of Taiwan. In Asia-Pacific Security Challenges (pp. 243-261). USA: Springer, Cham.
Kashwani, G. and Nielsen, Y., 2017. Evaluation of safety engineering system in oil and gas construction projects in UAE. International Journal, 12(29), pp.178-185.
Memon, Q.A. ed., 2017. Distributed Networks: Intelligence, Security, and Applications. USA: CRC Press.
Meshkati, N. and Tabibzadeh, M., 2016. An integrated system-oriented model for the interoperability of multiple emergency response agencies in large-scale disasters: Implications for the Persian Gulf. International Journal of Disaster Risk Science, 7(3), pp.227-244.
Meshkati, N., Tabibzadeh, M., Farshid, A., Rahimi, M. and Alhanaee, G., 2016. People-technology-ecosystem integration: A framework to ensure regional interoperability for safety, sustainability, and resilience of interdependent energy, water, and seafood sources in the (Persian) Gulf. Human factors, 58(1), pp.43-57.
Najaf, P., Isaai, M.T., Lavasani, M. and Thill, J.C., 2017. Evaluating traffic safety policies for developing countries based on equity considerations. Journal of Transportation Safety & Security, 9(sup1), pp.178-203.
Newman, A., Isaacs, T., and Constantin, A., 2016. International Approaches to Spent Fuel Management: Challenges and Opportunities. Universal Journal of Physics and Application, 10(5), pp.170-175.
Nguyen, V.P., 2016. Improving Nuclear Safety, Security, and Nonproliferation in Northeast Asia through Multinational Approach. International Journal of Nuclear Security, 2(3), p.11.
Pathirage, C. and Al-Khaili, K., 2016. Disaster vulnerability of Emirati energy sector and barriers to enhance resilience. Built Environment Project and Asset Management, 6(4), pp.403-414.
Plant, K.N.P. and Authority, S.R.S., 2015. Tools for Building CBRN Security Culture. CBRN Security Culture in Practice, 121, p.65.
Theophilus, S.C., Nwankwo, C.D., Acquah?Andoh, E., Bassey, E. and Umoren, U., 2018. Integrating Human Factors (HF) into a Process Safety Management System (PSMS). Process Safety Progress, 37(1), pp.67-85.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download