addressing public service vehicle … journal of computer engineering & applications, vol. iii,...

16
International Journal of Computer Engineering & Applications, Vol. III, Issue III ADDRESSING PUBLIC SERVICE VEHICLE SECURITY CHALLENGES USING AN SMS AND USSD IDENTITY CONFIRMATION SYSTEM Moses M. Thiga * Kabarak University ABSTRACT: The Public Service Vehicle (PSV) sector in Kenya has over time been faced with crimes such as carjacking, hijacking, robbery and even murder often perpetuated by persons posing as passengers. The lack of passenger records makes it difficult to solve these crimes. This paper presents a model and prototype based on the use of SMS, USSD and the web to deliver a simple identity verification system for use in this largely informal sector. The system registration process captures the user’s identity information such as names, identity card numbers, mobile phone numbers and photo. An exchange of codes generated by the system sends the ID information to both the PSV operator as well as the passenger’s mobile phones. The use of this system can help to deter crime given that criminals would hesitate to register or use it as well as help in providing information for crime investigations. Keywords: SMS, USSD, Identity Verification, Public Service Vehicle [I] INTRODUCTION There are various types of public transport services in Kenya such as taxis, matatus (14 and 30 seater minibuses), boda bodas (motorcycle taxis) and tuk tuks. The informal and small or microenterprise nature of these public service operators has over time exposed them to a variety of challenges that impact on their growth, operations and profitability. These challenges include high operational costs occasioned by high fuel and maintenance costs, loss of income through theft by crews and demands for bribes by policemen, high insurance costs due to the prevalence of bogus and inflated claims and crime leading to the loss of vehicles through theft and carjackings. Crime involving public service vehicles takes on a number of forms; carjackings where criminals board vehicles and then rob passengers or alternatively hire the vehicles and then proceed to commandeer them. These cases of hijacking have in many instances led to the loss of life as well as that of the vehicles. A major challenge in all these cases is the lack of passenger records from these public service vehicles. Such records would be of great help in initiating crime investigations by law enforcement agencies. IJCEA, JULY-SEPT - 2013 229

Upload: phamdieu

Post on 16-Apr-2018

216 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: ADDRESSING PUBLIC SERVICE VEHICLE … Journal of Computer Engineering & Applications, Vol. III, Issue III ADDRESSING PUBLIC SERVICE VEHICLE SECURITY CHALLENGES USING AN SMS AND USSD

International Journal of Computer Engineering & Applications, Vol. III, Issue III

ADDRESSING PUBLIC SERVICE VEHICLE SECURITY CHALLENGES USING AN SMS AND USSD IDENTITY

CONFIRMATION SYSTEM

Moses M. Thiga*

Kabarak University

ABSTRACT:

The Public Service Vehicle (PSV) sector in Kenya has over time been faced with crimes such as carjacking, hijacking, robbery and even murder often perpetuated by persons posing as passengers. The lack of passenger records makes it difficult to solve these crimes. This paper presents a model and prototype based on the use of SMS, USSD and the web to deliver a simple identity verification system for use in this largely informal sector. The system registration process captures the user’s identity information such as names, identity card numbers, mobile phone numbers and photo. An exchange of codes generated by the system sends the ID information to both the PSV operator as well as the passenger’s mobile phones. The use of this system can help to deter crime given that criminals would hesitate to register or use it as well as help in providing information for crime investigations.

Keywords: SMS, USSD, Identity Verification, Public Service Vehicle

[I] INTRODUCTION

There are various types of public transport services in Kenya such as taxis, matatus (14 and 30 seater

minibuses), boda bodas (motorcycle taxis) and tuk tuks. The informal and small or microenterprise

nature of these public service operators has over time exposed them to a variety of challenges that

impact on their growth, operations and profitability. These challenges include high operational costs

occasioned by high fuel and maintenance costs, loss of income through theft by crews and demands

for bribes by policemen, high insurance costs due to the prevalence of bogus and inflated claims and

crime leading to the loss of vehicles through theft and carjackings.

Crime involving public service vehicles takes on a number of forms; carjackings where criminals

board vehicles and then rob passengers or alternatively hire the vehicles and then proceed to

commandeer them. These cases of hijacking have in many instances led to the loss of life as well as

that of the vehicles. A major challenge in all these cases is the lack of passenger records from these

public service vehicles. Such records would be of great help in initiating crime investigations by law

enforcement agencies.

IJCEA, JULY-SEPT - 2013 229

Page 2: ADDRESSING PUBLIC SERVICE VEHICLE … Journal of Computer Engineering & Applications, Vol. III, Issue III ADDRESSING PUBLIC SERVICE VEHICLE SECURITY CHALLENGES USING AN SMS AND USSD

International Journal of Computer Engineering & Applications, Vol. III, Issue III

Their level of automation is very low and they rely on manual passenger receipting with no reliable

passenger records. Only the first name is requested and it is not verified by requesting the ID. In the

event of accidents or crimes then the identities of the passengers is hard or impossible to ascertain.

While passenger manifest systems exist, they are not suitable for use in the informal transport sector

due to their relatively high cost and complexity. They are often enterprise kind of systems requiring

intensive investment in the hardware and software. The platforms they are developed on result in

systems that require substantial training in order to achieve effective use. These factors conspire to

keep them out of reach of most public transport operators whose small and informal operations make

it difficult to afford and operate them.

An effective, affordable and easy to use solution is thus required to address the challenge of

maintaining passenger manifests in the public transport sector.

The problem:

The lack of passenger records from these public service vehicles and boda bodas makes crime

investigations by law enforcement agencies a very daunting task. There is often no way to accurately

identify persons who board these vehicles in the event of crime making it very difficult to initiate

investigations. The availability of a record would thus be a very good starting point for investigations

as well as a deterrent to crime.

Objectives of the study:

To develop an effective, affordable and easy to use ID verification and passenger manifest

system for use in the informal and microenterprise public transport sector.

[II] LITERATURE REVIEW

2.1 The public service vehicle crime challenge

Public service vehicles are the most commonly used mode of transport in Kenya. There are a variety

of options available which include taxis, matatus (minibuses), boda boda (motorcycle taxis) and

buses. Over time these modes of transport have been faced with numerous challenges such as high

operational costs due to poor roads, high insurance costs, bribe demands by the police and crime

targeting both crews and passengers.

IJCEA, JULY-SEPT - 2013 230

Page 3: ADDRESSING PUBLIC SERVICE VEHICLE … Journal of Computer Engineering & Applications, Vol. III, Issue III ADDRESSING PUBLIC SERVICE VEHICLE SECURITY CHALLENGES USING AN SMS AND USSD

International Journal of Computer Engineering & Applications, Vol. III, Issue III

The crimes targeting the PSV sector often take the form of hijacking, robbery of personal effects and

money and in some cases murder. The crimes are perpetuated by criminals who pose as passengers

and commandeer the vehicles during journeys. In a majority of the cases reported the police have

absolutely no clues on the identity of the criminals who carry out these crimes. A summary of

incidences is presented in Error: Reference source not found

PSV Type Crime Matatu In this case a matatu was hijacked, passengers robbed and the vehicle stolen. Tracking devices helped to trace the

vehicle but the identity of the gangsters remains unknown [1].Matatu Gangsters boarded a matatu posing as passengers and all were searched at the police station. However, midway into the

journey they commandeered the vehicle, robbed passengers and disappeared into the darkness. It was not possible to trace the gangsters because no ID information was taken on boarding the vehicle [2].

Matatu This incident happened on Ngong road, Nairobi. Thugs posed as passengers, took control of vehicle and robbed passengers. They fled and could not be traced [3].

Bus A 60 seater bus headed to a city suburb, Githurai, was hijacked by 8 gangsters armed with pistols. They robbed passengers of cash and valuables. [4].

Boda boda A boda boda operator was hijacked, killed and his motorcycle stolen. Thugs had posed as passengers [5].Boda boda Two people posing as customers robbed a boda boda operator and in a related incident another one was robbed and

killed. [6].Boda boda Two boda boda operators were robbed and killed in coffee farm. Interestingly the Police advised operators to ‘look’

carefully at customers and to inform their colleagues of destinations before departing with passengers [7].Taxi In this incident a Taxi driver was strangled and robbed of his vehicle [8].Taxi Two people posing as passengers coming from a night of drinking drugged and robbed taxi drive of their vehicle [9].

The incidences discussed above a just but a drop in the ocean and are derived purely from media

reports. Police records are likely to paint a grimmer picture of the crime situation in the PSV sector.

However, these instances are sufficient to paint the picture of a sector grappling with a serious

security challenge.

Accurate passenger records can go a long way in preventing and investigating these crimes. However,

operators in the informal transport sector lack systems to help them in maintaining passenger records.

This challenge is typical of small businesses that have been found to have limited knowledge of and

access to technology and information systems [10-12].

2.2 SMS and USSD

SMS is a basic service offered on GSM, GPRS and CDMA networks that allows mobile devices to

exchange messages with a short amount of text limited to 160 characters. SMS utilizes a store and

forward approach to transmit messages between mobile phones which allows messages to be stored

briefly in case the recipient is not available [13, 14].

SMS has been used in the delivery of a wide range of services to mobile phone subscribers. These

include; (1) Consumer applications such as person to person messaging, interactive information

IJCEA, JULY-SEPT - 2013 231

Page 4: ADDRESSING PUBLIC SERVICE VEHICLE … Journal of Computer Engineering & Applications, Vol. III, Issue III ADDRESSING PUBLIC SERVICE VEHICLE SECURITY CHALLENGES USING AN SMS AND USSD

International Journal of Computer Engineering & Applications, Vol. III, Issue III

services (obtaining weather forecasts), entertainment services (downloading ringtones) and location

based services (restaurant suggestions based on handset locations), (2) Corporate applications that

include notification and alert services (product expiry and renewal dates, emergencies), contact,

correspondence and appointment management and vehicle tracking, and (3) Mobile service provider

applications that include SIM card updates (customer profiles and address book entries) and WAP

push with URLs for advertisements to be viewed on the user’s mobile browsers [15]. The simplicity

and low cost of SMS has made it the most popular mobile messaging method with over 7 trillion

messages being sent worldwide in 2010 [16].

USSD (Unstructured Supplementary Service Data) is a GSM communication technology that is used

to send messages between a mobile phone and a network based application server [17]. It is a device

and SIM independent and highly cost effective messaging service that is seven times faster than SMS.

USSD is able to support interactive menu based applications that make simultaneous voice and data

communications possible [18]. A typical GSM network architecture with USSD capabilities is

presented in Error: Reference source not found.

USSD is used for the development of mobile chatting, m-commerce, pre-paid balance inquiries,

callback services, software upgrades and mobile banking services [17, 18]. These services are

available as (i) ‘pull’ based services such as news updates, weather, movie information, sports

updates, currency updates, stock market reports, telephone directory and yellow pages, and (ii) ‘push’

based services that include voting / polling and emergency information services. It is also used for

advertising where businesses get listed on menu based USSD systems in order to promote their

services [17].

The use of SMS and USSD is a feasible approach in delivering the PSV security solution in Kenya

given that there are approximately 30M mobile phone users accounting for 75.8% of the population.

In addition, over 4 Billion SMS messages were sent in Kenya during quarter 1 of 2013 making it a

highly utilized mode of mobile communications [19].

[III] The ID verification model

A model requiring the use of SMS, USSD and a web application is thus proposed to provide an

accessible and affordable public sector passenger manifest system. The model comprises of two parts;

the user registration process and the passenger manifest process.

IJCEA, JULY-SEPT - 2013 232

Page 5: ADDRESSING PUBLIC SERVICE VEHICLE … Journal of Computer Engineering & Applications, Vol. III, Issue III ADDRESSING PUBLIC SERVICE VEHICLE SECURITY CHALLENGES USING AN SMS AND USSD

International Journal of Computer Engineering & Applications, Vol. III, Issue III

The user registers by providing their full names, a copy of an identification document and a photo

taken at the time of registration. These details are then keyed in to the system which subsequently

sends an SMS to the user requesting them to confirm their registration. This confirmation is accessed

via a USSD menu.

The registration process is the most critical aspect of the system. User details, which the system

relies on, must be captured accurately in order to inspire confidence in the beneficiaries of the

information.

Figure 1: User registration process

System

Registration Form

Name: KEN KEN KEN

ID Number: 999999999999

Mobile Number: 7788991122

Gender: MALE

Year of Birth: 1970

Signed:

Provide Registration

Details

Key in Registration

Details Request User to Confirm

User Confirms Registration

The user registers by providing their full names, a copy of an identification document and a photo

taken at the time of registration. These details are then keyed in to the system which subsequently

sends an SMS to the user requesting them to confirm their registration. This confirmation is accessed

via a USSD menu. The registration process is the most critical aspect of the system. User details,

which the system relies on, must be captured accurately in order to inspire confidence in the

beneficiaries of the information.

3.2 ID Verification process

IJCEA, JULY-SEPT - 2013 233

Page 6: ADDRESSING PUBLIC SERVICE VEHICLE … Journal of Computer Engineering & Applications, Vol. III, Issue III ADDRESSING PUBLIC SERVICE VEHICLE SECURITY CHALLENGES USING AN SMS AND USSD

International Journal of Computer Engineering & Applications, Vol. III, Issue III

Once users have been registered then the ID verification process can then take place as follows;

1. The PSV operator accesses the system using a USSD menu and requests for an identification

(ID) code.

2. The potential client sends the ID code to a designated short code or by USSD.

3. The system responds to the PSV operator with the ID details of the potential client and sends

the ID details of the PSV operator to the client.

4. The details sent to both parties include; Mobile number, Name and ID number.

This exchange of ID codes is recorded by the system for future reference.Client

SystemProvider

Process Request

Send ID Code ABC

Send ID Code XYZ

Receive and Verify ID Codes

Client gives ID code ABC to Provider

Provider gives ID code XYZ to Client

Client sends code XYZ to System

Provider sends code ABC to System

System confirms Identity

Code XYZ has been given to you by Chris

Mann, ID number 565656565,

mobile number 0733114455

System confirms Identity

Code ABC has been given to you by John

Doe, ID number 98989898, mobile

number 0722778866

Exchange ID Codes

Request for ID code

Request for ID code

The exchange of identity information can server two main purposes; (i) to deter crime when would be

criminals either refuse to register on the service and to have their identity known, and (ii) to facilitate

IJCEA, JULY-SEPT - 2013 234

Page 7: ADDRESSING PUBLIC SERVICE VEHICLE … Journal of Computer Engineering & Applications, Vol. III, Issue III ADDRESSING PUBLIC SERVICE VEHICLE SECURITY CHALLENGES USING AN SMS AND USSD

International Journal of Computer Engineering & Applications, Vol. III, Issue III

investigations in the event that crime is committed given that the identities of both the operator and

passengers are on record.

3.3 Online passenger manifest process

While the SMS and USSD approach is easy to use and convenient it is limited to receiving identity

information only. There are instances where PSV operators may wish to query historical records or

analyze passenger volumes. For such requirements the system can also be extended to include a web

based module that allows them to manage passenger records online. With the use of the system online

additional functionality such as ticketing and reporting can be included in the system. The

proposed extension is illustrated in Error: Reference source not found.

System

Create Trip - Enter fare &

generate Code

Receive Code Display passenger information

Receive payment &

generate Receipt

Give Code to passenger

Send Code to system

1

2

3

4

5

This process as depicted in Error: Reference source not found is preceded by two processes; (i) the

registration or capture of details such as the registration number and passenger capacity of the

vehicles involved, and (ii) the creation of routes that the vehicles ply.

Step1- Create a trip: A trip or journey is created using a web interface. A vehicle is selected, a route

is specified and the fare payable is indicated. Once these details are captured by the system a random

ID code for the particular vehicle and trip is generated by the system and displayed.

IJCEA, JULY-SEPT - 2013 235

Page 8: ADDRESSING PUBLIC SERVICE VEHICLE … Journal of Computer Engineering & Applications, Vol. III, Issue III ADDRESSING PUBLIC SERVICE VEHICLE SECURITY CHALLENGES USING AN SMS AND USSD

International Journal of Computer Engineering & Applications, Vol. III, Issue III

Step 2 – Share ID code with passenger: The ID code is then given to prospective passengers.

Step 3 – Passenger sends ID code: The passenger then sends the ID code to a designated short code

or through a USSD menu.

Step 4 – System displays passenger details: The system then retrieves the ID details of the

passenger and displays them to the PSV operator.

Step 5 – Receive payment and produce receipt: The PSV operator then receives the payment and

produces a receipt with the full details of the passenger.

Based on the process above the system is capable of producing a number of reports such as the

number and details of passengers on various trips, the total number of trips per vehicle, the total

amount of money collected per vehicle, the routes travelled by the vehicle and passenger specific

reports such as number of trips and the total spend over a period of time.

[IV] SYSTEM DESIGN

Based on the model proposed in the previous section a prototype was designed.

4.1 System Flowcharts

The system flowcharts are presented in Figure 4, Figure 5 and Figure 6.

IJCEA, JULY-SEPT - 2013 236

Page 9: ADDRESSING PUBLIC SERVICE VEHICLE … Journal of Computer Engineering & Applications, Vol. III, Issue III ADDRESSING PUBLIC SERVICE VEHICLE SECURITY CHALLENGES USING AN SMS AND USSD

International Journal of Computer Engineering & Applications, Vol. III, Issue III

4.2 System Database

Figure 2: System database

IJCEA, JULY-SEPT - 2013 237

Page 10: ADDRESSING PUBLIC SERVICE VEHICLE … Journal of Computer Engineering & Applications, Vol. III, Issue III ADDRESSING PUBLIC SERVICE VEHICLE SECURITY CHALLENGES USING AN SMS AND USSD

International Journal of Computer Engineering & Applications, Vol. III, Issue III

[V] PROOF OF CONCEPT

A prototype based on the proposed model and system design was then developed. The process

proposed in Error: Reference source not found and Error: Reference source not found is implemented

in the prototype as illustrated from Figure 3 to The system is capable of displaying the passenger’s

details as shown in The system is capable of displaying the passenger’s details as shown in .

5.1 User registration

User details are keyed in to the system and their photo is also uploaded as shown in Figure 3.

Figure 3: User details entry screen

Figure 4: ID confirmation messages

Message Received

ID Confirmation for code H5FX8: Name: Moses Mwangi Thiga ID No: 28767450 Mobile: 0726785634

Options Reply Back

Message Received

ID Confirmation for code H5FX8: Name: Henry Kibet Kiplagat ID No: 2453478 Mobile: 0727564590

Options Reply Back

The PSV Operator confirmation message

The passenger confirmation message

IJCEA, JULY-SEPT - 2013 238

Page 11: ADDRESSING PUBLIC SERVICE VEHICLE … Journal of Computer Engineering & Applications, Vol. III, Issue III ADDRESSING PUBLIC SERVICE VEHICLE SECURITY CHALLENGES USING AN SMS AND USSD

International Journal of Computer Engineering & Applications, Vol. III, Issue III

5.3 ONLINE PASSENGER MANIFEST PROCESS

Vehicle management: Vehicles are created and listed as shown in Figure 5and Figure 6.

Figure 5: Create new vehicle

Figure 6: List of vehicles

Route management: Routes are created and listed as shown in Figure 7and Error: Reference source

not found.

Figure 7: Create route

IJCEA, JULY-SEPT - 2013 239

Page 12: ADDRESSING PUBLIC SERVICE VEHICLE … Journal of Computer Engineering & Applications, Vol. III, Issue III ADDRESSING PUBLIC SERVICE VEHICLE SECURITY CHALLENGES USING AN SMS AND USSD

International Journal of Computer Engineering & Applications, Vol. III, Issue III

Trip management: Trips or journeys are created and listed as shown in Figure 8 and .

Figure 8: Create trip

Figure 9: List of trips

Populating the passenger manifest: The population of the passenger manifest begins with the user

sending the ID code to the system as shown in Figure 10

Figure 10: User sends ID code

Your Message:

Options Send to Exit

NS567

IJCEA, JULY-SEPT - 2013 240

Page 13: ADDRESSING PUBLIC SERVICE VEHICLE … Journal of Computer Engineering & Applications, Vol. III, Issue III ADDRESSING PUBLIC SERVICE VEHICLE SECURITY CHALLENGES USING AN SMS AND USSD

International Journal of Computer Engineering & Applications, Vol. III, Issue III

The operator access the list of the trips currently available and selects the one they wish to receive

payments for as shown in The operator access the list of the trips currently available and selects the

one they wish to receive payments for as shown in . .

Figure 11: Receive payment – list of trips

The list of passengers who have sent the ID code to the system for the particular vehicle and trip are

displayed as shown in Error: Reference source not found. Links are enabled for those who have not

paid and for all passengers to allow for viewing of their details.

Figure 12: Passenger manifest

The operator proceeds to receive payment for the selected passenger as shown in The

operator proceeds to receive payment for the selected passenger as shown in . The passenger

photo is shown in the payments receipt screen. . The passenger photo is shown in the

payments receipt screen.

Figure 13: Receive payment

IJCEA, JULY-SEPT - 2013 241

Page 14: ADDRESSING PUBLIC SERVICE VEHICLE … Journal of Computer Engineering & Applications, Vol. III, Issue III ADDRESSING PUBLIC SERVICE VEHICLE SECURITY CHALLENGES USING AN SMS AND USSD

International Journal of Computer Engineering & Applications, Vol. III, Issue III

The system is capable of displaying the passenger’s details as shown in The system is

capable of displaying the passenger’s details as shown in

Figure 14: Passenger details

[VII] DISCUSSION

7.1 Advantages

The proposed system presents a number of advantages to the operators of PSV vehicles;

1. User detail capture: These details are captured once, used many times and can be shared

among all the operators.

2. User detail availability: The PSV operators are able to get ID details that they would

ordinarily not have access to due to their inability to capture and maintain them as well as the

nature of their operations.

Accurate passenger manifests: The capture of passenger details at the beginning of every trip

makes it possible to have an accurate record of all persons in a particular vehicle. This information

is useful in a number of scenarios such as in the processing of insurance claims, crime

investigations and even customer loyalty programs.

3. Easy to use system: The utilization of SMS and USSD for passenger interaction with the

system makes it very easy to use.

IJCEA, JULY-SEPT - 2013 242

Page 15: ADDRESSING PUBLIC SERVICE VEHICLE … Journal of Computer Engineering & Applications, Vol. III, Issue III ADDRESSING PUBLIC SERVICE VEHICLE SECURITY CHALLENGES USING AN SMS AND USSD

International Journal of Computer Engineering & Applications, Vol. III, Issue III

4. Affordable operation: The use of SMS and USSD is relatively low cost especially when

multiple PSV’s connect to a common system.

5. Report generation: The use of this system can make it possible to produce summary reports

of total revenues and no of trips per vehicle. This information is often not availably and accurate

in the present setup that relies on manual records.

7.2 Challenges

The main challenge facing the utilization of such a system from the PSV perspective is that it will

require a PC and internet access to operate the system for receipting and viewing of reports.

7.3 Assumptions

The main assumption made in the development of the SMS and USSD ID verification model and

prototype is that all the users required to use the system have mobile phones and valid identification

documents required for both the use of the system as well as registration.

A number of additional assumptions have been made in proposing the online passenger manifest

system;

1. That internet is available in the areas where the system will be used.

2. That the PSV operators have IT literate staff to operate the system.

3. That all potential passengers have mobile phones.

[VIII] CONCLUSIONS

There is great potential in a system that can provide a practical, effective and affordable solution to

the challenges of improving security and maintaining passenger manifests among public service

vehicle operators. The proposed use of SMS, USSD and the web in delivering the solution is a viable

approach given the fact that a majority of potential passengers and PSV operators are already familiar

with these technologies.

[IX ]AREAS FOR FURTHER STUDY

IJCEA, JULY-SEPT - 2013 243

Page 16: ADDRESSING PUBLIC SERVICE VEHICLE … Journal of Computer Engineering & Applications, Vol. III, Issue III ADDRESSING PUBLIC SERVICE VEHICLE SECURITY CHALLENGES USING AN SMS AND USSD

International Journal of Computer Engineering & Applications, Vol. III, Issue III

The proposed system or an enhanced version is applicable in scenarios where people must deal with

people they do not know. These kind of scenarios include events such as concerts and football

matches as well as in land transactions and transport hire among others.

[VIII] CONCLUSIONS

There is great potential in a system that can provide a practical, effective and affordable solution to

the challenges of improving security and maintaining passenger manifests among public service

vehicle operators. The proposed use of SMS, USSD and the web in delivering the solution is a viable

approach given the fact that a majority of potential passengers and PSV operators are already familiar

with these technologies.

[IX ]AREAS FOR FURTHER STUDY

The proposed system or an enhanced version is applicable in scenarios where people must deal with

people they do not know. These kind of scenarios include events such as concerts and football

matches as well as in land transactions and transport hire among others.

References

[

IJCEA, JULY-SEPT - 2013 244