\r\n\t \r\n\tThe aims of this book are to present the updates and advances in the field of resuscitation including AHA guidelines, latest evidence for the airway protection equipment, the role of AED in cardiac arrest, latest advances and the evidence including ongoing updated research including return of spontaneous circulation and post resuscitation care and support including neurological and hemodynamic stability. \r\n\t \r\n\tThe content of this book will be focused on latest research in the field which will create a concise updated information for medical, nursing and paramedical personnel. Furthermore, the book will also touch upon controversial topics in resuscitation and will try to bring out latest evidence intending to solve the controversies in the field of resuscitation. This book will be an excellent extract of all available updates and ongoing research for a complete knowledge of resuscitation.
",isbn:null,printIsbn:"979-953-307-X-X",pdfIsbn:null,doi:null,price:0,priceEur:0,priceUsd:0,slug:null,numberOfPages:0,isOpenForSubmission:!1,isSalesforceBook:!1,isNomenclature:!1,hash:"4e1d9c7965a911a1d2c3c1337a16acc5",bookSignature:"Dr. Mayank Gyan Vats",publishedDate:null,coverURL:"https://cdn.intechopen.com/books/images_new/8226.jpg",keywords:"CPR, Airway, Intubation, AED, BLS, ACLS, Cardiac Arrest, Arrhythmia, Advances",numberOfDownloads:null,numberOfWosCitations:0,numberOfCrossrefCitations:0,numberOfDimensionsCitations:null,numberOfTotalCitations:null,isAvailableForWebshopOrdering:!0,dateEndFirstStepPublish:"October 30th 2019",dateEndSecondStepPublish:"November 20th 2019",dateEndThirdStepPublish:"January 19th 2020",dateEndFourthStepPublish:"April 8th 2020",dateEndFifthStepPublish:"June 7th 2020",dateConfirmationOfParticipation:null,remainingDaysToSecondStep:"3 years",secondStepPassed:!0,areRegistrationsClosed:!0,currentStepOfPublishingProcess:5,editedByType:null,kuFlag:!1,biosketch:null,coeditorOneBiosketch:null,coeditorTwoBiosketch:null,coeditorThreeBiosketch:null,coeditorFourBiosketch:null,coeditorFiveBiosketch:null,editors:[{id:"148941",title:"Dr.",name:"Mayank",middleName:"Gyan",surname:"Vats",slug:"mayank-vats",fullName:"Mayank Vats",profilePictureURL:"https://mts.intechopen.com/storage/users/148941/images/system/148941.jpg",biography:"Dr. Mayank Vats is a Senior Specialist, Interventional Pulmonologist, Pulmonologist, Intensivist, and Sleep Physician at Rashid Hospital and Dubai Hospital and developed the interventional pulmonology department in Rashid Hospital. Before coming to the United Arab Emirates, he was a consultant in Respiratory Medicine, Critical Care Medicine, and Sleep Medicine at Escorts Heart Institute and Apollo Hospital, New Delhi India, a tertiary level of care hospital in India. Dr Vats’s interest is to utilize his professional knowledge and interpersonal skills in order to provide the highest degree of patient care and satisfaction. Having worked in a busy tertiary level teaching hospital and specialty corporate hospitals as a consultant, he has been exposed to the complete spectrum of respiratory, critical care and sleep medicine.",institutionString:"Rashid Hospital",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"2",totalChapterViews:"0",totalEditedBooks:"3",institution:{name:"Rashid Hospital",institutionURL:null,country:{name:"United Arab Emirates"}}}],coeditorOne:null,coeditorTwo:null,coeditorThree:null,coeditorFour:null,coeditorFive:null,topics:[{id:"16",title:"Medicine",slug:"medicine"}],chapters:null,productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"},personalPublishingAssistant:{id:"247865",firstName:"Jasna",lastName:"Bozic",middleName:null,title:"Ms.",imageUrl:"https://mts.intechopen.com/storage/users/247865/images/7225_n.jpg",email:"jasna.b@intechopen.com",biography:"As an Author Service Manager, my responsibilities include monitoring and facilitating all publishing activities for authors and editors. From chapter submission and review to approval and revision, copyediting and design, until final publication, I work closely with authors and editors to ensure a simple and easy publishing process. I maintain constant and effective communication with authors, editors and reviewers, which allows for a level of personal support that enables contributors to fully commit and concentrate on the chapters they are writing, editing, or reviewing. I assist authors in the preparation of their full chapter submissions and track important deadlines and ensure they are met. I help to coordinate internal processes such as linguistic review, and monitor the technical aspects of the process. As an ASM I am also involved in the acquisition of editors. Whether that be identifying an exceptional author and proposing an editorship collaboration, or contacting researchers who would like the opportunity to work with IntechOpen, I establish and help manage author and editor acquisition and contact."}},relatedBooks:[{type:"book",id:"3309",title:"Respiratory Disease and Infection",subtitle:"A New Insight",isOpenForSubmission:!1,hash:"2e85d47bf0576f1c2ccf642156ccbda2",slug:"respiratory-disease-and-infection-a-new-insight",bookSignature:"Bassam H. Mahboub",coverURL:"https://cdn.intechopen.com/books/images_new/3309.jpg",editedByType:"Edited by",editors:[{id:"148941",title:"Dr.",name:"Mayank",surname:"Vats",slug:"mayank-vats",fullName:"Mayank Vats"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"6151",title:"Noninvasive Ventilation in Medicine",subtitle:"Recent Updates",isOpenForSubmission:!1,hash:"77e2fc8d909ac2458e0087490ea02a6d",slug:"noninvasive-ventilation-in-medicine-recent-updates",bookSignature:"Mayank Vats",coverURL:"https://cdn.intechopen.com/books/images_new/6151.jpg",editedByType:"Edited by",editors:[{id:"148941",title:"Dr.",name:"Mayank",surname:"Vats",slug:"mayank-vats",fullName:"Mayank Vats"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"5449",title:"Sleep Apnea",subtitle:"Recent Updates",isOpenForSubmission:!1,hash:"a24e07959eedce97032e4191b88003bb",slug:"sleep-apnea-recent-updates",bookSignature:"Mayank G. Vats",coverURL:"https://cdn.intechopen.com/books/images_new/5449.jpg",editedByType:"Edited by",editors:[{id:"148941",title:"Dr.",name:"Mayank",surname:"Vats",slug:"mayank-vats",fullName:"Mayank Vats"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"6550",title:"Cohort Studies in Health Sciences",subtitle:null,isOpenForSubmission:!1,hash:"01df5aba4fff1a84b37a2fdafa809660",slug:"cohort-studies-in-health-sciences",bookSignature:"R. Mauricio Barría",coverURL:"https://cdn.intechopen.com/books/images_new/6550.jpg",editedByType:"Edited by",editors:[{id:"88861",title:"Dr.",name:"R. Mauricio",surname:"Barría",slug:"r.-mauricio-barria",fullName:"R. Mauricio Barría"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9500",title:"Recent Advances in Bone Tumours and Osteoarthritis",subtitle:null,isOpenForSubmission:!1,hash:"ea4ec0d6ee01b88e264178886e3210ed",slug:"recent-advances-in-bone-tumours-and-osteoarthritis",bookSignature:"Hiran Amarasekera",coverURL:"https://cdn.intechopen.com/books/images_new/9500.jpg",editedByType:"Edited by",editors:[{id:"67634",title:"Dr.",name:"Hiran",surname:"Amarasekera",slug:"hiran-amarasekera",fullName:"Hiran Amarasekera"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1591",title:"Infrared Spectroscopy",subtitle:"Materials Science, Engineering and Technology",isOpenForSubmission:!1,hash:"99b4b7b71a8caeb693ed762b40b017f4",slug:"infrared-spectroscopy-materials-science-engineering-and-technology",bookSignature:"Theophile Theophanides",coverURL:"https://cdn.intechopen.com/books/images_new/1591.jpg",editedByType:"Edited by",editors:[{id:"37194",title:"Dr.",name:"Theophile",surname:"Theophanides",slug:"theophile-theophanides",fullName:"Theophile Theophanides"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3161",title:"Frontiers in Guided Wave Optics and Optoelectronics",subtitle:null,isOpenForSubmission:!1,hash:"deb44e9c99f82bbce1083abea743146c",slug:"frontiers-in-guided-wave-optics-and-optoelectronics",bookSignature:"Bishnu Pal",coverURL:"https://cdn.intechopen.com/books/images_new/3161.jpg",editedByType:"Edited by",editors:[{id:"4782",title:"Prof.",name:"Bishnu",surname:"Pal",slug:"bishnu-pal",fullName:"Bishnu Pal"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3092",title:"Anopheles mosquitoes",subtitle:"New insights into malaria vectors",isOpenForSubmission:!1,hash:"c9e622485316d5e296288bf24d2b0d64",slug:"anopheles-mosquitoes-new-insights-into-malaria-vectors",bookSignature:"Sylvie Manguin",coverURL:"https://cdn.intechopen.com/books/images_new/3092.jpg",editedByType:"Edited by",editors:[{id:"50017",title:"Prof.",name:"Sylvie",surname:"Manguin",slug:"sylvie-manguin",fullName:"Sylvie Manguin"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"371",title:"Abiotic Stress in Plants",subtitle:"Mechanisms and Adaptations",isOpenForSubmission:!1,hash:"588466f487e307619849d72389178a74",slug:"abiotic-stress-in-plants-mechanisms-and-adaptations",bookSignature:"Arun Shanker and B. Venkateswarlu",coverURL:"https://cdn.intechopen.com/books/images_new/371.jpg",editedByType:"Edited by",editors:[{id:"58592",title:"Dr.",name:"Arun",surname:"Shanker",slug:"arun-shanker",fullName:"Arun Shanker"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"72",title:"Ionic Liquids",subtitle:"Theory, Properties, New Approaches",isOpenForSubmission:!1,hash:"d94ffa3cfa10505e3b1d676d46fcd3f5",slug:"ionic-liquids-theory-properties-new-approaches",bookSignature:"Alexander Kokorin",coverURL:"https://cdn.intechopen.com/books/images_new/72.jpg",editedByType:"Edited by",editors:[{id:"19816",title:"Prof.",name:"Alexander",surname:"Kokorin",slug:"alexander-kokorin",fullName:"Alexander Kokorin"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}]},chapter:{item:{type:"chapter",id:"18095",title:"Security Control and Privacy Preservation in RFID enabled Wine Supply Chain",doi:"10.5772/17496",slug:"security-control-and-privacy-preservation-in-rfid-enabled-wine-supply-chain",body:'
1. Introduction
Modern identification procedures such as radio frequency identification (RFID) are able to provide transparency in applications including supply chain, logistics and equipment management. The benefits of visibility and fast identification provided by RFID technology especially in supply chain management (SCM) reduce the risk of counterfeiting (Gao et al., 2004). There are two mainly ways in which RFID technology supports a visible and fast identification processes: 1) RFID allows for new, automated and secure ways to efficiently authenticate physical items; and 2) As many companies invest in networked RFID technology for varying supply chain applications, the item-level data can be gathered in any case (Lehtonen et al., 2006).
Despite these benefits, RFID technology is still not widely implemented. The main reasons are, firstly, the difficult are, firstly, the difficult technical aspects of implementation resulting in high setup costs, secondly, growing security and privacy concerns. Our focus in this paper is to discuss the second reason for the low take-up of RFID technology, that is, security and privacy concerns. We argue that without applying maximum security and privacy, trustworthiness between supply chain partners will be minimal. As a result, the effectiveness and collaboration of traditional supply chain environment with RFID technology cannot be achieved. Given that humans cannot read the RFID tags on items and the tags themselves maintain no history of past readings, the challenge of security and privacy in this technology is related to the nature of RFID tags and their functionality (Juels, 2005). A retailer inventory that is labeled with unprotected tags may be monitored and read by unauthorised readers. The inventory data holds significant financial value for commercial organisations and their competitors. Once data has been accessed by unauthorised users, it can be cloned on empty tags, giving rise to the counterfeiting issue. Counterfeiting in the form of cloned or fraudulent RFID tags is the consequence of a lack of security measures and trustworthiness among the supply chain partners when RFID technology is used to automate their business transactions.
Privacy violations stem from the fact that when goods are tagged, the manufacturers, retailers and consumers will be able to track the goods beyond point-of-sale (POS) because they have associated data. Even if the tags only contain product codes rather than unique serial numbers, a consumer’s taste in brands “constellation” can betray their identity. Moreover, even if the responses of the tags are encrypted, the owner can also be identified and tracked by the fixed encrypted code. While consumers fear omnipresent surveillance, organisations are primarily interested in protecting company-internal data from unauthorised access and potential manipulation. These problems are not, however, completely independent of one another, considering the fact that data security represents a prerequisite to guarantee data privacy.
Bottled wine counterfeiting is a multi-billion dollar industry, which has increased drastically since the early 1990s. A report produced by Australian IT (Mar, 2007) shows that counterfeit wines accounted for almost 10 percent of the global market. In terms of wines, most counterfeiters aim to counterfeit expensive wines by tampering the labels or marking of the bottles. Recently, the ability of RFID to identify, authenticate and track items and activities in the supply chain is seen as a possible solution to the counterfeiting damage occurring in the wine industry. RFID has been used in the wine supply chain to provide visibility at each step of the supply chain process and to provide unique identification for tracking not only lots and cases but also at the item-level. An example of RFID usage in the wine industry can be explored in the real-life business scenario of Domenitz.L and Kravitz.J (2008).
Even though RFID is seen as an anti-counterfeiting tool, the use of passive RFID tags is a significant problem for industry including the wine industry. The low-cost passive tags currently used in the wine industry may not be able to provide sufficient security compared to active tags. Passive tags have lesser storage and memory space and provide insufficient security against security threats such as RFID tag cloning and fraud which lead to counterfeiting. For example, the tags used by Domenitz.L and Kravitz.J (2008) for tracking purposes can be easily cloned and all the historical information can be stolen. If this occurs, a fraudulent batch of wines produced with similar historical data can hit the market without anyone noticing the lack of authenticity of the products.
In order to address wine bottle counterfeiting, three different modules need to be incorporated together. These three modules are: 1) prevention; 2) detection; and 3) privacy. Prevention techniques focus on preventing a clone or fraud attack. Meanwhile, detection techniques are used to notify or record an attack in progress. Both modules are equally important and are not interchangeable since we cannot prevent what we cannot detect. The prevention module aims to provide security to all the layers concentrating mostly on the application, communication and the physical layers. Prevention of cloning involves the design and development of tags from the physical layer up to application level. Since intrusion prevention systems (IPS) are able to prevent attacks in real-time and manage the supply chain functionality through traffic flows, each part of the RFID system such as the tags, readers, communication channel, middleware and database are able to be protected. We will propose a simple yet powerful method to prevent counterfeiting in a supply chain plant. The aim here is to shield the whole supply chain plant from security attacks such as skimming, eavesdropping and replay attacks from occurring in the first place.
In contrast to prevention, the detection module focuses only on the application level. An intrusion detection function can tackle a compromised system more precisely since the knowledge of how and what has attacked the system is more clear compared to a prevention system. Prevention techniques are not guaranteed and may let an attack through, but dealing with a compromised system by responding to suspicious behavior and generating an alarm is possible with a detection system. However, the issue we tackle here is beyond the effort to minimise the error rate: the aim is to improve the percentage of the incorrect prediction of class labels and to deliver higher detection accuracy. In real-world applications, cost is treated unequally and the misclassification cost can be significant. We argue that a cost sensitive approach is essential in reducing the risk of counterfeiting in a supply chain. For example, in medical diagnosis of a cancer disease, if the cancer is regarded as the positive class, and non-cancer (healthy) is regarded as the negative class, then missing a cancer (the patient is actually positive but is classified as negative), is called a “false negative” and is much more serious (thus expensive) than the false-positive error. The patient could lose his or her life because of the delay in the correct diagnosis and treatment. Similarly, in RFID clone and fraud detection, a false negative or failure to detect fraudulent tags could be very expensive with counterfeit items reaching the market and causing millions of dollars of loss. In this chapter we aim to construct cost model detection using supervised learners from available tools such as WEKA ( Hall.M and Frank.E et.al, 2009). The objective of our study is to classify RFID tags using supervised learners to categorise RFID tags and detect the genuine (good) and fraudulent (bad) tags. Our RFID tag clone and fraud detector will employ RFID SCM tracking and tracing functions such as tag history attributes, event timestamp and time to live (TTL) (Li et al.,2009) as important factors. We believe this simple experiment using a cost sensitive detection method for RFID tags in a supply chain environment is the first of its kind.
Finally, the privacy module is useful to support the handling of security attacks such as cloning and fraud attacks. This is because tracking RFID tags is an essential step in cloning yet may compromise a partner’s privacy (Mahinderjit-Singh & Li, 2009). As for certain applications which require tracking, such as supply chains and drug pedigree tracing, privacy is a sensitive issue since the tracing and tracking processes may violate privacy in the first place. Thus, ensuring privacy protection while dealing with cloning attacks is crucial. Our third objective will be to provide a comprehensive guideline in tackling privacy concerns in the counterfeiting issue.
This chapter is directed towards a problem-driven context. Counterfeiting in an RFID based-wine supply chain is considered as a problem. We will tackle the counterfeiting issue in this supply chain example by using three different modules, namely, prevention, detection and privacy. Our first contribution is to propose a prevention method which is simple yet affordable to be implemented in a supply chain environment. The second is to detect counterfeit tags attached to wine bottles by utilising the cost sensitive concept. Finally, we provide a comprehensive privacy guideline handling the counterfeiting issue in a supply chain plant.
The main significance of this paper is to demonstrate how privacy preservation and security protection through prevention and detection can be maintained in an open-loop RFID supply chain such as the wine industry. In addition, a complete methodology on the most optimal and easy to use technique, approach or guideline in dealing with counterfeiting is presented. This research will closely study the relationship between these three modules in an RFID-enabled supply chain. The information on handling the supply chain in the wine industry can be extended to other goods or other RFID applications. The solution will be supported by using our seven-layer trust framework. The rest of this chapter is constructed as follows. Section 2 gives a literature review on RFID security and privacy issues in the supply chain. It also demonstrates the proposed trust framework. Section 3 explains the RFID-based wine supply chain. In Section 4 we outline how all three modules of prevention, detection and privacy can be employed to tackle counterfeiting in the wine industry. Section 5 provides a discussion. Section 6 provides the conclusion and views on future work.
2. RFID security and privacy in supply chain system
In this section, we present a taxonomy of the security and privacy issues of RFID-enabled supply chain management. Firstly, we discuss the challenges and problems related to security in an RFID system. The discussions in this section are essential in understanding why the trust mechanism is important in addressing security and privacy issues in RFID.
Lack of standardisation among different manufacturers of tags and readers makes it harder for a sharable security mechanism to operate in an open system environment. The network issues include the insecure communication between tags and readers. The attacker is able to remove the tag from the product and the lack of sufficient pedigree security makes it much easier for an authentic product to be forged. In addition, the lack of communication bandwidth and management introduces the problem of key management in ubiquitous computing (Juels, 2005). The architecture deployment in a supply chain environment, which includes the position of tags and alignment of readers in a centralised server, could cause erroneous readings such as duplicate records in the system and a reduction in accuracy. In addition, the RFID tag scalability issue in the supply chain environment needs attention. The growth of tag and reader size over time according to the needs of the supply chain business shows the importance of designing an architecture that is able to cope with future advancement.
On the other hand, the simple middleware design currently used by the Electronic Product Code (EPC) global network (http://www.epcglobalinc.org) does not take into account the evolving RFID technology and meet the business owner’s requirements. There is no dedicated middleware component for ensuring security needs such as authenticating (Lehtonen, Michahellas & Fleisch, 2007). These are among the issues concerning RFID in an open system environment as they affect the security and privacy of the data, which is the information on the tags linked to the enterprise database. This causes data inconsistency and leakage. In light of all these issues, the impact on human trust in the RFID technology is critical and contributes to the lack of data sharing mechanisms in SCM. The next sub-section will examine the RFID security taxonomy directed towards RFID security attacks.
2.1. Taxonomy of RFID security attacks in the supply chain
The taxonomy of RFID security attacks in the supply chain is based on three security mechanisms – authentication, authorisation and trust services. This section is structured as a discussion on each of these mechanisms.
A) Authentication
In a supply chain environment, there are several methods available to combat product counterfeiting. These methods include the use of electronic pedigree (Koh, 2003), serialisation (Johnston, 2007), product authenticity and RFID tag authentication. The electronic pedigree used for drug authenticity can trace and track items by checking and updating transactions in a sequence. This method will be invalid if any party, for instance, a retailer acting deliberately, does not update the database whenever a product leaves the store at the point-of-sale. Non-cryptography techniques that are simple and cost effective (Koh, 2003; Nochta, 2005; Johnston, 2007) were proposed to combat counterfeiting. But certain techniques such as the trace and track approach proposed by Koh (2003) do not solve cloning problems thoroughly due to the storage of the tag information in plaintext. However, the track and trace approaches which deal with the locality factor could bring additional information on when and where cloning would have taken place place (Lehtonen, 2007). Other approaches are proxy-based, such as the RFID Authentication Processing Framework (APF) (Ayoade et al., 2005) and Certificate Authority (CA). Both these techniques can reduce the counterfeiting issue caused by an unauthorised reader by authenticating the reader and hindering the ability of a fake reader to access the tags. The CA functions in a similar but more systematic way by storing a list of good readers on the centralised server. Finally, techniques such as watermarking (Potdar & Chang, 2006) do provide some degree of protection against cloning. However, the protocols are not adequate for low-cost EPC tags and require higher numbers of bits to ensure ultimate security.
B) Authorisation
In order to realise the business benefits of RFID, trading partners must be able to exchange data. The manufacturer, distributor and retailer all share RFID data. Access control involves the process of determining whether a user can perform a specific operation on resources. Based on the policy introduced by Wang et al. (2008), we argue that RFID system attacks within a supply chain can be eliminated when policies are assigned at product-level and item-level. In addition, a Discovery Service (DS) which is still under development can be utilised as another registry where incoming and outgoing products are registered (Ranasinghe & Cole, 2007) and can function as an item-level tagging server. Another important point is using role-based policy for the RFID access control systems (Seong et al., 2006). Languages such as SAML, XML, XACML and even WS-Security are suitable and widely used in RFID especially in supply chain services. In addition, the concept of e-pedigree (Frey.M, 2008) in the pharmaceutical industry proves that the sharing and tracking of information within an EPC network is able to provide accuracy and eliminate security threats. Another approach to sharing and exchanging information in RFID is using the Electronic Product Code Information Services (EPC-IS) model (Ranasinghe & Cole, 2007) which is a component of the EPC global network. The method for exchanging EPC-IS events uses protected communication channels based on HTTPS and SSL. EPC-IS enhances data sharing and visibility and monitoring day-to-day RFID applications. Each local company will have its own local database and local EPC-IS.
C) RFID Trust Service
The importance of the trust role in dealing with the security threats in RFID is a novel approach and is the first of its kind. Trust in the adoption of RFID among business partners is likely to be affected by two main challenges in RFID technology. First, the security and privacy threats in the system reduce the confidence in the system especially when RFID tagging is used for counterfeiting purposes. Second, the lack of any attack detection model in the RFID network makes the security and privacy threats go unnoticed.
Among the other reasons which contribute to the decrease of trust in RFID are:
Open system environment – Supply chain management exists in an open system environment with various types of RFID system interface, organisational protocols and communication interface (Derakhshan, Orlowska & Li, 2007). As a result, with multiple data integrations models existing, it is harder to develop a standardised and common data exchange and integration model among them.
Minimal authentication, authorisation and tracking services capabilities – RFID middleware only includes the common models for data exchange transactions. Models such as EPC-IS, ONS, EPC-DS only provide common transactions (http://www.epcglobalinc.org). The lack of capabilities in authentication models and tracking mechanisms built in to the RFID middleware supports the point that the design of RFID network infrastructure fails to address the security and privacy challenges. So far, e-pedigree, which is used for drug tracking, is the only model for tracking and tracing the whereabouts of products in the drug supply chain environment.
The existing EPC Trust Service – The current EPC trust model is the only trust model so far in RFID technology providing authentication and authorisation. EPC-Trust functions by using a third party (CA) in authenticating devices and users in a supply chain model (Verisign Inc, 2004). The trust model does not cover any security mechanism for RFID tags and readers and is without any detection model.
Figure 1.
Seven-layer trust framework (Mahinderjit-Singh and Li ; 2009)
Based on the factors that impact on the confidence rate in RFID adoption and the technology functionality, the base argument for this research is that both prevention and detection models are needed to tackle these issues. A better model of trust is needed especially one with the capability for preventing and detecting security and privacy threats. Further, the trust model must stand in an open system environment by supporting multiple protocols and communication interfaces between various organisations. This trust model could also be assimilated with supply chain service standards such as EDI/XML and SOA. Thus, in this chapter we carefully study the previous literature to determine the gaps in the research before proposing our idea and solutions. This extension of knowledge will be considered as a map for more secure and efficient business transactions in open system supply chain management.
Based on the seven-layer trust framework (Mahinderjit-Singh & Li, 2009), trust in an RFID technology system is defined as a “comprehensive decision making instrument that joins security elements in detecting security threats with preventing attacks through the use of basic and extended security techniques such as cryptography and human interaction with reputation models”. In addition, a trust model for a technological system should always include human interaction through the use of a feedback and ranking model. Among the functions of the trust framework (Figure 1) is the provision of guidelines for designing trust to solve open system security threats. The next sub-section focuses on RFID privacy concerns.
2.2. RFID privacy taxonomy
An RFID system should consider both privacy and security in its design structure and the focus of the proposal should be on the information system and not the technology. Privacy is the ability of the RFID system to keep the meaning of the information transmitted between the tag and the reader secure from non-intended recipients. The main privacy challenge in RFID is due to the nature of the RFID tag operation. Tags are “promiscuous’’: they can be read by entities outside their owner’s knowledge. Among the privacy concerns are tracing and tracking, profiling of products and secret tag reading (Ayoade, 2007). Approaches to deal with these concerns include: (i) tag killing (Sarma et al., 1999) in which the tags of sold items are disabled or removed at the point-of-sale; (ii) tag blocking (Juels et al., 2003) in which a blocker tag creates a radio frequency environment that prevents unauthorised scanning of consumer items; (iii) hash encryption (Juels, 2005) in which the information stored in tags is encrypted in a dynamic manner; and (iv) a rewriteable memory and random number approach (Gao et al., 2004) in which only authorised readers are able to access the tags.
In RFID applications such as a supply chain, an RFID tag may change its owner multiple times. To tackle this issue, a secure ownership transfer is essential. Ownership transfer means that once an RFID tag is transferred from two different owners, all information associated with the tag will need to be passed on as well. This should be done without compromising the privacy of either the old or new owner to ensure that tracing and retaining of the tag\'s information is not possible. Some ownership protocols that tackle ownership transfers are proposed by Osaka et al. (2006), Saito et al. (2005) and Song (2008). The Osaka-Takagi-Yamazaki-Takahashi (OTYT) protocol. (Osaka et al., 2006) uses symmetric encryption and hashing and provides privacy protection for both new and old owners. However, without any consideration of after-sale information recovery, this scheme is also prone to message manipulation attack since similar random numbers could be used to query a tag twice. The Saito protocol (Saito et al., 2005) makes use of properties such as three-way authentication using a TTP server but is prone to eavesdropping and only supports new owner privacy. This is because the fundamental approach of their scheme is to provide support for the backward channel without consideration of forward channel communication. Through security analysis done by Pedro (2010), the proposal by Song (2008) provides three important ownership transfers, which are new owner privacy, old owner privacy and authorisation recovery for transaction after POS. However, the mutual authentication method used is prone to many attacks such as tag and server impersonation, data leakage and denial-of-service attack. As a result, it is difficult to ensure privacy without compromising security if only symmetric cryptosystem is used without any provisions made in terms of a secure server\'s communication setup.
Hargraves and Shafer (2004) suggested that identifiability, observe-ability and link-ability of RFID tags with associated data should be minimised and the RFID system should be developed with authorisation, authentication and encryption on a routine basis to ensure trustworthiness of the RFID system. In VeriSign (2008), an innovative way to minimise the sharing of information is by applying distributed network architecture. This type of networked RFID system ensures that partners only store their serialised information about each product in a database and this information is only accessible to authenticated and trusted partners. Another approach will be to apply policies (Garfinkel et al., 2005). Garfinkel et al. (2005) emphasise the need for guidelines which require human and technology intervention and the need to educate humans in accessing RFID technology and facilitate understandings of how privacy threat can be handled.
Figure 2.
RFID Privacy Concerns Categorisation
In the seven-layer trust framework (Mahinderjit-Singh & Li, 2009), both security and privacy are integrated in the first 5 layers. The trust framework could be applied to maintain an RFID system which is able to handle security threats without compromising privacy effects. Layer 2 – privacy looks into time and locality factors which are related to the privacy of data and location. Mahinderjit-Singh and Li (2009) argued that the privacy component is necessary to support the handling of cloning attacks because tracking of tags is an essential step towards cloning-detection and this may compromise a partner’s privacy. Thus, this layer is to ensure the privacy protection while dealing with cloning attacks. We also believe trust management is the key for the overall protection of security and privacy in an RFID system. In Figure 2, we categorise privacy attacks in RFID within single and multiple organisation loops and show how both privacy and security are a part of any trust model, which in our case is the seven-layer trust framework.
3. An example of RFID SCM in wine industry
In this section, we present an example of the supply chain in the wine industry. This example is important for understanding the degree of the counterfeiting risk in RFID technology. The counterfeiting issue in this example will also be used to design an appropriate solution in terms of preventing counterfeiting, detecting the clone and fraud attacks and preserving the privacy of the users in this supply chain example.
The aim of counterfeiters is to counterfeit expensive wines by tampering with the labels or markings of the bottles. Among the anti-counterfeit techniques are the traditional method of tasting the wines, biochemical methods (http://www.enotes.com/forensic-science/wine-authenticity), and using hologram labels, tamper-proof security seals and smart corks (Sagoff, 2008). However, the easily tampered, unsecured holograms and lack of mechanisms for traceability offered by the above techniques have led to the problem of low visibility, non-authentic and inaccurate transactions for tracing and tracking the movement of wines in a supply chain. Instead of solving the counterfeiting issue, more vulnerability loopholes are presented to the counterfeiter to perform attacks. The challenges of RFID usage in the wine industry are as follows:
the identification of liquids
the short lifespan of the passive tag battery currently used for RFID tracking and monitoring
the lack of a preventive mechanism to cope with future counterfeiting once the tamper-proof seal on the wine is tampered with,
the nature and limitation of the passive RFID tags.
The issue of identifying liquid is troublesome for the reason that liquid absorbs and reflects radio waves. The passive RFID tags for identification of the wines at e-Provenance are placed under the bottle and this reduces the read accuracy. According to Yeo (2006), the reading accuracy can be enhanced if the tag is placed on the top of the bottle. In order to be able to track and monitor purchased wine, the tags used for tracking must survive a life span of many years. However, the outcome of the RFID tags used currently is limited and only last for two years. The low-cost passive tags used currently may not be able to provide ultimate security compared to active tags. Passive tags have lesser storage and memory space and have insufficient security against security threats such as RFID tag cloning, fraud attack and counterfeiting. The tags used by e-Provenance (2008) for tracking purposes can easily be cloned and all the historical information can be stolen. A fraudulent batch of wines produced with similar historical data can hit the market without anyone noticing the lack of authenticity of the products.
3.1. RFID tagged wine supply chain management
Based on Report of Wine Traceability (2005), the function of each supply chain business partner in a typical wine production environment are as follows:
Wine Producer - The wine producer is responsible for receiving the grapes and for the production, manufacture and/or blending of wine products.
Transit / Cellar - The transit cellar is responsible for the receipt, storage, dispatch, processing, sampling and analysis of bulk wine, as well as record keeping of appropriate information about what is received and what is dispatched. The transit cellar can be part of the filler/packer company (geographically separate or not) or can be outsourced. What differentiates the bulk distributor from the transit cellar is that the former has a commercial role, whereas the latter has only a role of transit with no commercial and no invoicing goal.
Filler - The filler/packer is responsible for the receipt, storage, processing, sampling, analysis, filling, packing and dispatch of finished goods, as well as record keeping of appropriate information about what is received and what is dispatched.
Distributor - The finished goods distributor is responsible for the receipt, storage, inventory management and dispatch of finished goods, as well as re-packing and re-labelling.
Wholesaler / Retailer - The retailer receives pallets and cartons from the finished goods distributor and picks and dispatches goods to the retails stores. Figure 4 shows the flow of wine beginning from the grape grower up to the retailers.
Figure 3 shows the flow of supply chain business transaction between various partners in a wine environment. In addition, in this figure we are also able to pin-point the vulnerability points in which a counterfeit attack could takes place. Few scenarios of how the attack happens are also listed.
Besides the flow among normal supply chain partners, another process worth mentioning in the wine supply chain is the consolidation or merger of a few players in order to enhance profits and reduce the cost of labor and infrastructure. This process is critical if security measures are not taken upfront. The consolidation process could input counterfeit wines that are later sent to the distributor (licit chain) or the other retailers (illicit chain). The end process of the counterfeit wines here is the sale to the consumer. One more route of the counterfeiting process is the act of the thief in stealing information directly or indirectly. The direct stealing of information involves the help of a third party, someone who is the employer of the licit supply chain. An indirect attack is an attack done by using the internet such as eavesdropping, man in the middle and skimming. The function of the thief is critical. The thief can manipulate the information of the wines or even the wine bottles and input them into consolidation process or even sell the information to the retailer and consumer.
Based on the vulnerability points illustrated above in Figure 3, the following scenarios demonstrate typical cases of RFID tag cloning and RFID tag fraud:
Bordeaux Corp produces 1000 cases of wines with each case containing 100 bottles. The cases are then sent to the distributor. Bob, an employee of the distributor, steals the EPC information of 100 wine cases and supplies it to Carol, the attacker. Carol then copies the EPC tag numbers into empty tags and tags fake cases of wines. These wines are later shipped to several states within the country to different retailers.
Reagan Corp, a shipping company, is plotting to steal a bulk load of wines that it has been entrusted with transporting. These wines have tamper-proof bottles with passive RFID tags attached. Rather than trying to defeat the tamper-proofing of the bottles, Reagan creates fake cheaper wine bottles, and clones the associated passive EPC tags. It swaps the bogus bottles while it has custody of the real ones.
An anonymous reader belonging to Carol (an attacker) was placed at the warehouse belonging to Alice. When the Cabernet Sauvignon wines transported by Suiko Corp reached the warehouse, Carol eavesdrops on the communication channel, actively performs a relay attack (man in the middle attack) and records a series of messages exchanged between the genuine reader and the trusted local database. Based on the encrypted EPC data obtained, Carol’s reader communicates with the database. As there is no reader authenticity needed at the database side, the encrypted key is exchanged by the database. Carol now uses this key information received and performs a brute force attack on other EPC tags tagged on the cases. The guess game was able to reveal the key used for all the EPC tags scanned. Carol now sells this information to Alex, Alice’s competitor who injects the data into cloned EPC tags and tags them on to cheaper goods and sends the goods to another retailer.
Figure 3.
Wine Vulnerability Points
Counterfeiting in the RFID-based system used in wine industry can be tackled using three categories: security, privacy and detection. The security solution looks into how we can protect the RFID tags on the wine bottles against cloning and fraud attacks. The privacy solution looks into how we can preserve the privacy of the partners and maintain the confidentiality of the information recorded by them and shared between them. Detection plays its role in detecting the cloned and fraud tags in an RFID-based system.
4. Clone/fraud handling through prevention, detection and privacy
4.1. Security - prevention of cloning in RFID-based wine system
The requirements of the cloning prevention system are data integrity and authenticity. In order to eliminate cloning, there is an essential need for complete authentication between all the RFID components. This includes providing integrity to the information within the tags. In addition, the need to sign the data is essential to show that the data has not been tampered with throughout the communication channel. The cloning prevention system must be able to prevent the skimming, eavesdropping and active attacks which are major security attacks that contribute to cloning in RFID systems. In addition, careful attention needs to be given to the fundamental problem of low-cost tags which provide less space on the tags and reduced memory capability. The security attributes necessary to handle a cloning attack include the following:
A tag identifier must always be encrypted (e.g., hashed) before transmission between tag-reader-server begins. This reduces skimming and eavesdrop attacks on RFID tags and the system.
Immediately after a reader has been authenticated, the tag must refresh a secret key. As long as the tag output changes, the chances of a replay attack can be reduced and there are no opportunities to fake a tag. Without knowledge about the secret key, an adversary can never create a set of encryption values.
Three-way mutual authentication should always take place in any system including encryption and hash on tags, readers, and the data entries in databases.
Synchronisation between tags and databases should always be consistent to eliminate cloning and eavesdropping.
The number of communication rounds and operation stages should be minimal without any redundant operations to maintain scalability and eliminate the chances of replay and DOS attacks.
The server for coordinating the global item tracking should be designed with a timely tracking system to maintain the freshness of randomness of the keys used in inter-organisational item-tracking activities. This helps against DOS attacks and cloning. It ensures that even though a key is compromised, an adversary can only capture a single tag rather than a bulk of tags.
The most appropriate supply chain prevention mechanism should consider efficiency with a low-cost and practical approach. The techniques employed will need to be performed within the limitation of tags and RFID constraints. Therefore, techniques such as the physical uncloneable function (PUF) (Devadas et al., 2008) and watermarking technology (Potdar & Chang, 2006) are out of the question. The first is too costly and the latter is not efficient and practical when utilised on low-cost RFID tags.
EPC-PAS and EPC-TAS should be modelled into the current EPC global network (Lehtonen, 2007).
Item-level tracking should be used to diminish counterfeiting especially for luxury products such as jewellery and wine.
A novel trust solution with an associated prevention mechanism via authentication for tag readers and supply chain partners is required. The trust model should be designed with some human interaction and feedback capability to enhance trust even more.
We also propose a simple prevention mechanism which is able to prevent cloning and fraudulent tags in a supply chain management. Since RFID tags are the most vulnerable point for any security attack in an RFID system, the tags should not be embedded with any important or confidential information. They should always function as pointers in which essential information such as secret key information or random numbers is stored in the database. In this proposed model, we make use of the message authentication code (MAC) algorithm. The function of the MAC algorithm is similar to the hash function in which it authenticates a message using a key and produce an authenticated code (Menezes et al., 1996). Message authentication codes are useful in many situations. If we need to perform basic message authentication without resorting to encryption for efficiency reasons, MACs are the right tool for the job. In addition, we add the public key cryptosystem to provide an added security capability which is signature capability. The concepts of random numbers and timestamps are used to track the liveness of the tags and to eliminate replay attacks. We make use of the Certificate Authority (Menezes et al., 1996) a third party trusted entity to maintain a higher security level of authenticating the readers. The benefit of this approach is that it eliminates the risk of compromised readers.
At this point it is important to articulate the assumptions for the cloning prevention system. These assumptions are:
Channel between reader and database is secured.
Trusted party, CA authenticates readers upfront.
A Key Distribution Centre (KDC) is required to distribute and manage the secret key used by the tags and database.
Tags used here are passive and compliant to Class 1 generation 2 (CIG2) tag with security function such as 16 bit pseudorandom generator.
Timestamp values will be used to prove the authenticity of the tags based on the timeline starting from the movement information. For example, at location 1, the duration between the lifetime will be recorded according to the tags. The database on the trusted server will update the range of timeframe for any particular location and add the duration of the time. Finally, both timestamps will be similar or the difference of the timeline will be derived by a value of + 0.5 seconds or less.
The random number will be generated from the CIG2 capability to produce the sequences from a 16 bit generator.
Figure 4 below provides a graphical representation of how the IPS framework will function, and shows the framework of how the required algorithms and security requirements will function.
The cloning technique that can be applied in the RFID-enabled supply chain functions through a number of steps. The readers in an RFID system should always be authenticated to ensure authenticity and eliminating the replay attack scenario from arising. First, the readers will read and send a query to the RFID tag. We assume that RFID tags only function as identifiers without any sensitive and important information on the tag. The only information on the tags will be the ID, random number and the timestamp. Next, the reader will send the information from the tag to the database. Here, the MAC algorithm will be used to distinguish whether the tag ID and the random number between the tags and the one stored in the database is similar. The KDC server will be used to generate the secret key each time a tag is checked for its authenticity. The benefit of the MAC value is that it protects both the data integrity of the message as well as its authenticity, by allowing the verifier (which possesses the secret key and which in our example is the KDC server) to detect any changes to the message content. Based on the calculation of the timestamp to ensure the authenticity of the tag ID, the response will then be sent to the tag by the reader.
Pseudorandom generator - PNRG
CA
Message Authentication Codes
Reader
Timestamp
Database
Tags
The Notation of the system are :
CA
Trusted server
ID
Tag ID
R(0,1,…n)
Reader’s ID
D
Database
x
Secret key distributed by Key Distribution Center
TS
Timestamp
MAC[m]
A MAC computed by applying secret key x to message m
r
Random number
Information movement (Send/Receive)
Based on method illustrated in Figure 4, we are able to provide the below system analysis on how the proposed prevention approach is able to reduce the chances of counterfeiting in a supply chain plant:
The use of the CA – the CA will have the list of authorised readers upfront and will only authenticate the trusted reader. This eliminates the possibility of a compromised reader.
The use of MAC with a secret key which is hashed and encrypted will protect the integrity of the message and eliminate the eavesdropping attack and skimming attack from occurring. The security of the communication channel between the database and tags is guaranteed because of this.
The use of KDC – the Key Distribution Centre function provides a secret key to both tags and database. The use of a trusted dedicated server will reduce the chances of the key being compromised by an adversary. In addition, the key in the KDC will be generated randomly. The number of bits used to generate the keys will impact on the security level. Using higher numbers of bits will guarantee a stronger key. If a particular key is being compromised, the adversary is only able to clone the particular tag and not the entire batch.
Figure 4.
Cloning Prevention Method
The use of timestamps will reduce the chances of the replay attacks that allow cloning to take place. The duration of time from each location will show the authenticity of a tag. The duration will be added and a rounded-up value for the TTL will be stored in the database.
The use of random numbers will increase the difficulty for an adversary to guess the key value of the tag.
It is worth mentioning that we have shown how three different attacks which are skimming, eavesdropping and active attacks through replay attack are able to be removed by utilising the above algorithm. However, physical attacks will only be addressed by using a higher level of key values. In addition, reverse engineering attacks could only be addressed by using a secure hardware implementation such as PUF (Devadass, 2008). Hence, we do not discuss these two attacks in our chapter. As supply chain management uses passive tags with low capabilities, we are not able to protect the RFID tags by using high-end security properties. However, by employing the trust framework, we are able to use third party solutions such as the CA server and KDC server. All the calculations of the MAC algorithm keys will be done at the database end. RFID tag information will store only minimal ID information. With minimal information, the probability of being skimmed and eavesdropped upon will reduce. This model could be used for any RFID application such as the wine supply chain in our context.
4.2. Detection of cloning and fraud wine bottles in RFID system
This section explains RFID supply chain, RFID data structure and how TTL will be used in our proposed system. There are four different attacks in an RFID system (Mahinderjit-Singh & Li, 2009; Mahinderjit-Singh & Li 2010). Skimming attack occurs when RFID tag are read directly without anyone knowledge. Eavesdropping attack happens when an attacker sniffs the transmission between the tag and reader to capture tags data. On the other hand, man-in-the-middle attack occurs when a fake reader is used to trick the genuine tags and readers during data transmission. RFID tag data could also be altered using this technique and as a result, fraud tags could be generated too. Physical attack which requires expertise and expensive equipment takes places in laboratory on expensive RFID tags and security embedded tags.
The strength of any RFID application is fully capitalised when the temporal and location information are correctly utilised in eliminating data security issue in RFID. Real time monitoring of events such as fraud and cloning attacks in RFID application are still rare.
Figure 5.
Wine Supply Chain
Figure 5 shows a wine SCM environment with four different sites (Manufacturer, Distributor,Wholesaler and Retailer). RFID tags are attached to the products for instance wine bottles. RFID based supply chain system involves the movement and flows of millions of data. The data generated consists of RFID tuples of the form of (EPC, location, time), where EPC is the unique identifier read by an RFID reader, location is the place where the RFID reader scanned the item, and time is the time when the reading took place. Tuples are usually stored according to a time sequence.
Each sites will have their own database system and this distributed manner database system are combined with a centralized EPC global server; EPC- Information Server. (EPC-IS). Our trust framework will resides in centralized server with ONS and EPC-IS (Verisign,2004). The trust framework, fifth layer, mainly the detection module will consists predefined rules of real time monitoring and tracking system. The tracking and monitoring system can even play role as an intrusion detection system by using events rules and triggers function in database. Among the rules are as below:
If, for instance, a product was identified at specific read points, e.g., ‘shelf’ (R3) and then ‘exit’ (R6),without having first been identified at the read point ‘checkout’ (R4 or R5), then it could be a matter of cloned or fraud.
If a pallet P, which is containing the objects O1, O2, and O3 when leaving the production facility (M2 or M3) was identified as having only the objects O1 and O3 at the distributors receiving dock (D1 or D2), then the object O2 could have been replaced with O4 during transportation. These mean counterfeit products are injected.
i) Data structure time to live(TTL)
TTL indicates the time restriction that targets events should satisfy. Since most RFID application has a restriction time, we believe if carefully defined, we can use the notion of TTL to detect clones and fraud tags in a typical SCM. Based on TTL taxonomy (Li.X et.al, 2009), there are 4 different notions of TTL given based on the event types, both primitives and complex categorised based on events as Absolute TTL (TTLa), Relative TTL (TTLr), Periodic TTL (TTLp) and Sequential TTL (TTLsE). The detection process of cloned and fraud tags are able to manipulate all the above TTL notions. However, based on RFID applications, we determine that three relevant TTL notion for a SCM transactions and monitoring process is mainly TTLa, TTLr and TTLs. We also argue that the absolute TTL (TTLa) notion can be further categorised based on RFID applications. Some applications such as drugs and fast moving products for e.g. diary and foodstuff requires restriction in expiry date as the TTLa compare to product such as wine and jewellery. These expensive products emphasize more on manufacturing time. We will introduce the new notion of TTL called Initial TTL (TTL i).
TTLi specifies the period of time a RFID tag is tagged on the product. By tracking, monitoring and storing the TTLi in the system; we are able to classify cloned RFID tags from genuine tags. Below are some examples to show the practicality of the usage of TTL.
Example 1 - Initial TTL (TTLi): Suppose 1000 new RFID tags have been purchased from its manufacturer. Each tag is then scanned by the reader denoting the birth time of the tags. Once the tag is tagged to a product such as wine, the expire time of tag is also stored. The period between this birth time and expire time areconcluded as Initial TTL. For products such as wine, TTLi is extremely important. Since the TTLi is an event happening at the manufacturer site, any fraud injection of fake wine bottles after the manufacturer site can be detected.
ii) Example 2 – Relative TTL (TTLr) – In a wine based SCM, when the wines bottles are transported from the manufacturer site to the distributor site, the transportation period need to be carefully tracked. If the time to reach a destination is more than its relative TTL, an alarm will be raised as the state of bottles are suspicious. Relative TTL also indicates the period time the bottles are scanned by multiple readers at the front door of the distributor up to the time period the bottles leaves the site. Thus the TTLr can be categorised as transfer TTL (TTLt) and site TTL (TTLs). TTLt is the restriction time for all the movement time from one point to the other. Meanwhile TTLs is the whole site location e.g. Manufacturer, Distributor and Retailer period from the time it enter a site where it will be processed for unpack or repack up to the time it leaves the site.
iii) Example 3 – Sequential TTL (TTLsE) – The products movement from the manufacturer site upto the retailer site is denoted by the TTLsE. TTLsE is the sum of all the TTLr in a supply chain. If the time from the manufacturer site and till the retailer site exceed or lesser than the TTLsE, the event could be suspicious.
SiteTTL (TTLs) = Time of RFID within a site such as manufacturer, Distributor and Retailer
TransferTTL (TTLt) = Time taken when moving products from site A to site B
Sequential TTL (TTLsE) = Overall accumulated time from Manufacturer site up to Retailer site
The audit data for a single RFID is given below:\n\t\t\t\t
Audit tag, for a single RFID tag,
T = < Po, Pm, Psd, Pt, Pr > where:
Po= operation match rate,
Pm =mean of TTL, where TTL = { TTLs,TTLt, TTLsE}
Psd =standard deviation of TTL, where TTL = { TTLs,TTLt, TTLsE}
Pt = rate of tag responses, and
Pr = R/W (mean and standard deviation) rate.
ii) Cost- Sensitive learning
Cost-Sensitive Learning is a type of learning in data mining that takes the misclassification costs (and possibly other types of cost) into consideration. The goal of this type of learning is to minimize the total cost (Turney, 2000). Many works for dealing with different misclassification costs have been done, and they can be categorized into two groups. One is to design cost sensitive learning algorithms directly (Turney,1995; Domingos,1999). The other is to design a wrapper that converts existing cost-insensitive base learning algorithms into cost-sensitive ones. The wrapper method is also called cost-sensitive meta-learning (Witten and Frank, 2005., Domingos,1999) sampling (Zadrozny,2003), and weighting (Ting,1998). Cost-sensitive meta-learning converts existing cost insensitive base learning algorithms into cost-sensitive ones without modifying them. Cost-sensitive meta-learning techniques can be classified into two main categories, sampling and nonsampling,in terms of whether the distribution of training data is modified or not according to the misclassification costs. This paper focuses on the nonsampling cost-sensitive meta-learning approaches. The non-sampling approaches can be further classified into three subcategories: relabeling, weighting, and threshold adjusting, described below. The first is relabeling the classes of instances, by applying the minimum expected cost criterion (Witten and Frank, 2005). Relabeling can be further divided into two branches: relabeling the training instances (Witten and Frank, 2005) and relabeling the test instances (Domingos, P. 1999).
In Relabeling approach such as Metacost (Domingos, P. 1999)and Cost Sensitive Classifier (Witten and Frank, 2005), cost C is known at the learning time. The technique to modify the inputs to the learning algorithm to reflect cost C includes :
If there are 2 classes and the cost of a false positive is λ times larger than the cost of a false negative, put a weight of λ on each negative training example λ = C(1,0) / C(0,1)
Then apply the learning algorithm as before
Setting λ by class frequency (less frequent class has higher cost) λ ~ 1/nk, nk - number of training examples from class k
Setting λ by cross-validation
WEKA, an open source Java package which contains machine learning algorithms and Metacost algorithm are used for solving the RFID cloning issue in SCM.
iii) Cost –based Counterfeiting Detection Architecture and Result
Figure 6.
Detection and Cost Model Architecture
Figure 7.
Pseudo code for Decision Tree (J48 algorithm) with Metacost
In this section we discuss how RFID tag cloning and fraud detection as well as cost modelling are supported seven layer trust framework (Mahinderjit-Singh & Li, 2009; Mahinderjit-Singh & Li 2010). Our RFID detection system has three main components:pre-processing; detection; and response and decision module as shown in Figure 6.Pre-processing is the component that collects a RFID event set E that is supplied by different supply chain partners. RFID event sets are then sent to the detection component where the information sources are analysed. Several detection functions are performed in this component, such as pattern matching; traffic or protocol analysis; finite state transition; etc. The response and decision component notifies the system administrator where and when an intrusion takes place and calculate the total cost of any attack.
Applying the dataset from the simulated RFID supply chain, 3000 example of RFID traces are generated from manufacturer site up to retailer site. RFID traces is then pre-processed into audit dataset which includes attributes such as Tags ID, location ID, TTLs (mean), TTLt ( mean), TTLsE( mean and standard deviation ) and Read/write ( mean and standard deviation. The datasets are then feed into Weka engine by applying Metacost algorithm shown in Figure 6. The audit data will then be feed into a filtering system upfront for normalization purposes. CfsSubsetEval with Best First technique are used to determine the evaluation of attributes and search methods.
The base classifiers used were Naive Bayes, Random Forest and Weka\'s implementation of a Support Vector Machine (SMO), JRIP and C4.5 (J48) decision tree. Default Weka options were used for the Naive Bayes, Random Forest and JRIP but for the SMO "build logistic models" was set to true and for the J48 tree "Pruning" was disabled. Receiver Operating Characteristic (ROC) curve is a plot of the probability of true positive (recall) as a function of the probability of false alarm across all threshold settings. An ROC curve provides an intuitive way to evaluate the classification performance of RFID detection system. Recall represents the probability of detection of cloned tags and precision is the proportion of the correctly predicted genuine tags in each prediction class. In this study, we will utilize ROC for models evaluation.
The engine is trained with a training dataset. Cloning attacks such as skimming, eavesdropping and man-in the middle are simulated. To train the models cross-validation was employed. Cross-validation is a standard statistical technique where the training and validation data set is split into several parts of equal size, for example 10% of the compounds for a 10 fold cross validation. An independent test dataset is simulated as well. However, for the differing classifiers they have used across-the-board costs of 20, 40, 60, 80,100, 200, 500 etc. Weka normalises (reweights) the cost matrix to ensure that the sum of the costs equals the total amount of instances. Next we will illustrate one of the algorithms, J48 used with Metacost in WEKA tool. The pseudo code for Decision Tree (J48 algorithm) with Metacost is shown in figure 7. The ROC curve plotted in figure 8 takes in to account a few classifiers in WEKA. Based on this ROC curve, we could conclude that various classifier provide different performance based on the setting and nature of the classifier itself. For instance, Naïve bayes provide the larger area of ROC curve which indicate, it has the best performance. In addition, the true positive is almost 98% with only less than 2% of false alarm.
In a cloned detection RFID enabled supply chain, misclassifying cloned tag as genuine is undesirable. Result shows that when we increase cost-ratio from 20 to 10,000, recall rate increases, although the rate of increase depends on the algorithm. However, although not unexpected, is the decrease of precision which implies needless analysis of large number false positives (shown in fig.9) SMO, JRIP and J48 algorithms consistently reach Recall rates close to 1 at high cost ratios, with precision slightly above 0.1.
Figure 8.
ROC Curve plot for WEKA Classifiers
Figure 9.
Precision-Recall Curve for Various Classifiers in WEKA
Figure 10 indicates the accuracy of various classifiers against misclassification costs. We could conclude that as cost ratio increases, the accuracy of classifier decreases as well. An important implication from this study is that we can use cost to choose suitable operational threshold (based on different cost-ratio) to control a classifier’s performance.
Figure 10.
Accuracy vs. Misclassification Cost for Classifiers
Figure 11.
ROC Curve for J48 classifier with various Costs
In practice, exact costs are rarely known and could change as we learn more about system requirements, its design, operational environment, etc. When considering a wide range of cost ratios the resulting models differ significantly. For instance from Fig 11, J48 classifier is made cost sensitive when the cost ratio was set to be 500 with accuracy of 35.1%. This means that FN needs to be 500 times more expensive than FP for J48 to transform to cost sensitive. Overall, J48 provides the most robust and versatile classifier for imbalanced RFID dataset compared to other classifiers.
With respect to construct validity, cost ratios in our experiments, which vary from 20 to 10,000 might not include all meaningful cost differentials. Different intrusion detection systems may have their own cost ranges of interests. The selection of classifiers is another possible source of bias. We cannot exclude the possibility that a classifier not studied here could show significantly better performance. Nevertheless, based, we believe that the chance of such a classification algorithm being in existence is rather low. The results above could be implicated by the small datasets used in the training models. When small dataset are used, classifier cannot accurately estimate the class membership probabilities and the imbalanced in class distribution of the dataset.
Any RFID cloned detection classifiers used must be correlated with cost since lower cost properties projects to lower or zero cloned tags in the system. This also impact positively in reducing the counterfeit attack which risks billions of dollars losses yearly in the market. Overall, we could conclude that by using WEKA tool, we are able to detect cloned and fraud tags in a supply chain plant. In addition, when various cost files are utilised we are able to reduce the misclassification cost of testing dataset. The important of the above experiment are to show the relationship between false positive rate and false negative rate. The trade-off shows that by increasing cost values, the false negative or the misclassification cost can be reduced. As a result, the false positive rate increase and this reduced the classifier accuracy overall. We also conclude that among the various supervised learners used, J48 is more sensitive to cost effects and outperform other classifiers when used together with Metacost.
In an RFID based wine supply chain, our main concern will be to eliminate the possibility of any counterfeit wine bottle passing through any detection classifier without generating any alarm. We believe the risk of counterfeit wines bottles passing through our detection system is greater than any genuine wines bottles detected as counterfeit one. Thus, even though the overall accuracy of classifiers decreases under the cost effects, we are able to reduce the losses in term of money and trust in RFID technology when used in supply chain. By minimising the counterfeit rate flowing in the market, human trust in this technology increases dramatically.
Next section provides a comprehensive privacy guideline in handling counterfeiting in a supply chain environment.
4.3. Privacy - countermeasures in preventing privacy violations
In the clone detector, some ways to prevent privacy violations in a Wine based RFID-enabled supply chain include:
The EPCglobal Discovery Service (DS) is equipped with key management mechanisms using ElGamal or RSA encryption algorithms. The clone detector is installed on the DS. The partners that need to access the clone detector will have to go through the DS for authenticity, and only permitted personnel are given permission to access information. Before using the clone detector, all players obtain the necessary information to establish a connection to each other through the DS, which knows who owns an event on a certain ID and can the bootstrap the network upon a partner request for detecting clones of ID.
Distributed network architecture is employed. The distributed network architecture eliminates the problem of information overload and makes it easier to exchange information (VeriSign, 2008). Manufacturers as well as all trading partners create and store their own serialised information about each and every product. The manufacturer will manage and host a database that stores information about the generation of products, while trading partners host and manage similar databases storing information about product movement through the supply chain. Each involved partner will make this information available to authorised parties over the internet. This will ensure minimal sharing of local tracking data (times and places) with the EPC network.
The ONS could be used to point to an address on the EPCglobal network where information about the product being questioned is stored. The information stored here should be in minimal granularity that has limited timestamp information. By limiting timestamp accessible data, the effect of data leakage and data privacy can be minimised.
Default killing of RFID tags at store exits or password protection of RFID tag content could be set up. This means that the production tag which is used for tagging on the product within the supply chain will be deactivated at the POS exit. This will reduce the possibility of tracking and inventorying for the purposes for profiling done by the supply chain partners especially the manufacturer in learning the behavior of the consumer. In addition, a new tag can be placed on the tag after the purchase of the product that comes along with warranties. This information should be accessible only by the manufacturer and consumer.
Partial or no saving of the full EPC serial number should always be applied on RFID tags in an RFID-enabled supply chain environment.
There can be rigorous controls and transparency of EPC network access rights. A role-based access control (RBAC) policy should always be implemented together with item-level tagging (Illic et al., 2007). The main purpose of the RBAC policy is allowing only certain individuals to access certain levels of information. By applying this policy, we are able to limit accessible information by different role of personnel in an organisation.
Deletion of all product data after a certain period of time. After a while, the entire product data linked by the tag ID and the database should be deleted. This requirement reduces any form of tracking violation and curbs fraud situations from occurring. However, this will stamp out the advantages of an RFID system in a supply chain such as providing visibility and traceability.
Any supply chain partner could exercise control over personal information on sold products available on the EPC network. This will limit any misuse of product information by the consumer and competitors in learning about the supply chain partner‟s financial gain in forecasting sales information. In addition, a competitor could also use this information in creating cloned tags with similar product information on fake products for future transactions.
All RFID transactions and information transmissions in the RFID supply chain require consent from both parties, namely, the business owner and consumer. By complying with Garfinkel et al’ s proposed policy (2005), RFID organisations in a supply chain environment need to be aware of their full rights especially to know when, where and why an RFID tag is being read. To comply with it, organisations could post a sign wherever RFID readers operate. Embedding this policy with a detection system is possible when a tag equipped with memory could count the number of times it has been read.
In preservation of RFID privacy, besides employing user policies in accessing the information in system, ownership transfer between partners can also be supported. By using one of the ownership transfer protocols discussed in Section 2.2, the security of the protocols can be maintained if the communication channel is protected. Another way to ensure a secure transfer of information will be to allow access to information to all the partners in the local EPC-IS without handing out any sensitive information such as sales and forecasting information. The conclusion we could draw here is that by following one or more of the privacy guidelines are able to protect the whole supply chain running on an EPCglobal network platform.
5. Conclusion
In this paper, three layers – Layer 1 – Security, Layer 2-Privacy and Layer 5-Detection – from our seven-layer trust framework are investigated for tackling counterfeit problem in a wine industry RFID-enabled supply chain. We have directed the security (prevention and detection of counterfeiting) and privacy preservation by using the RFID-enabled wine supply chain application. In an RFID-enabled supply chain system, privacy concerns require urgent attention especially to control the counterfeit issue. Security principles such as authorisation, authentication and encryption need to be combined with privacy procedures to maintain data integrity and privacy. Protection of privacy is essential for both consumers and business owners in order for a trustworthy relationship to be maintained between them. We have demonstrates that by applying MAC technique and third party services such as CA and KDC service, we are able to protect the low cost tags from being counterfeit.
In addition, we argue that RFID clone detection classifiers must always be correlated with cost since lower cost properties project to lower or zero cloned tags in the system. This also impacts positively in reducing the counterfeit attack which risks billions of dollars in losses every year in the market. We have shown that when the relabelling approach is used, we are able to reduce the misclassification cost and eliminate the scenario of having cloned and fraudulent tags in the system.
Nevertheless, RFID tag cloning and fraud can be detected in a supply chain at an initial stage if there is proper transfer of ownership with secure and authorised information exchange. This is made possible by integrating the monitoring, detection, and security and privacy functions from the seven-layer trust framework model which focuses on reducing risks and increasing benefits such as eliminating counterfeiting tags in SCM systems and boosting supply chain players‟ confidence. In future work, we aim to extend our RFID cloning and fraud detection work by using an outlier detection technique to identify illegitimate RFID tags and designing an improved cost decision model to calculate the damage, response and operational cost for a typical RFID clone detector system in a supply chain application. In addition, we would like to enhance RFID supply chain privacy and security in terms of context-awareness.
Acknowledgments
This work is partially sponsored by University Sains Malaysia (USM)
\n',keywords:null,chapterPDFUrl:"https://cdn.intechopen.com/pdfs/18095.pdf",chapterXML:"https://mts.intechopen.com/source/xml/18095.xml",downloadPdfUrl:"/chapter/pdf-download/18095",previewPdfUrl:"/chapter/pdf-preview/18095",totalDownloads:2602,totalViews:252,totalCrossrefCites:0,totalDimensionsCites:0,totalAltmetricsMentions:0,impactScore:0,impactScorePercentile:28,impactScoreQuartile:2,hasAltmetrics:0,dateSubmitted:"October 21st 2010",dateReviewed:"April 4th 2011",datePrePublished:null,datePublished:"June 15th 2011",dateFinished:null,readingETA:"0",abstract:null,reviewType:"peer-reviewed",bibtexUrl:"/chapter/bibtex/18095",risUrl:"/chapter/ris/18095",book:{id:"445",slug:"designing-and-deploying-rfid-applications"},signatures:"Manmeet Mahinderjit-Singh, Xue LI and Zhanhuai LI",authors:[{id:"19639",title:"Dr.",name:"Manmeet",middleName:null,surname:"Mahinderjit Singh",fullName:"Manmeet Mahinderjit Singh",slug:"manmeet-mahinderjit-singh",email:"manmeet@cs.usm.my",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",institution:null},{id:"21559",title:"Prof.",name:"Xue",middleName:null,surname:"Li",fullName:"Xue Li",slug:"xue-li",email:"xueli@itee.uq.edu.au",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",institution:null},{id:"37872",title:"Prof.",name:"Zhanhuai",middleName:null,surname:"LI",fullName:"Zhanhuai LI",slug:"zhanhuai-li",email:"lizhh@nwpu.edu.cn",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",institution:null}],sections:[{id:"sec_1",title:"1. Introduction",level:"1"},{id:"sec_2",title:"2. RFID security and privacy in supply chain system ",level:"1"},{id:"sec_2_2",title:"2.1. Taxonomy of RFID security attacks in the supply chain ",level:"2"},{id:"sec_3_2",title:"2.2. RFID privacy taxonomy ",level:"2"},{id:"sec_5",title:"3. An example of RFID SCM in wine industry",level:"1"},{id:"sec_5_2",title:"3.1. RFID tagged wine supply chain management ",level:"2"},{id:"sec_7",title:"4. Clone/fraud handling through prevention, detection and privacy ",level:"1"},{id:"sec_7_2",title:"4.1. Security - prevention of cloning in RFID-based wine system ",level:"2"},{id:"sec_8_2",title:"4.2. Detection of cloning and fraud wine bottles in RFID system ",level:"2"},{id:"sec_9_2",title:"4.3. Privacy - countermeasures in preventing privacy violations ",level:"2"},{id:"sec_11",title:"5. Conclusion ",level:"1"},{id:"sec_12",title:"Acknowledgments",level:"1"}],chapterReferences:[{id:"B1",body:'AyoadeJ.2007Privacy and RFID Systems: Roadmap to Solving Security and Privacy Concerns in RFID Systems. Computer Law and Security Report, 236555561\n\t\t\t'},{id:"B2",body:'MenezesA. J.van OorschotP. C.VanstoneS.Handbook of Applied Cryptography, CRC Press, Florida, USA (1996pages, 0-84938-523-7'},{id:"B3",body:'DomingosP.1999MetaCost: A general method for making classifiers cost-sensitive. In Proceedings of the Fifth International Conference on Knowledge Discovery and Data Mining, 155164ACM Press.\n\t\t\t'},{id:"B4",body:'DrummondC.HolteR.2000Exploiting the cost (in)sensitivity of decision tree splitting criteria. In Proceedings of the 17th International Conference on Machine Learning, 239246\n\t\t\t'},{id:"B5",body:'DevadasS.SuhE.ParalS.SowellR.ZiolaT.KhandelwalV.2008Design and implementation of PUF based “Unclonable” RFID ICs for anti-counterfeiting and security applications. In Proceedings of the 2008 IEEE International conference on RFID, 2008 (5864\n\t\t\t'},{id:"B6",body:'GarfinkelS.JuelsA.PappuR.2005RFID Privacy: An Overview of Problems and Proposed Solutions.IEEE Security and Privacy, 3(3):3443May-June 2005.\n\t\t\t'},{id:"B7",body:'GaoX.WangH.ShenJ.HuangJ.SongB.2004An Approach to Security and Privacy of RFID System FOR Supply Chain," Proceedings of the IEEE International Conference on E-Commerce Technology for Dynamic E-Business (CEC-East’04), 164168\n\t\t\t'},{id:"B8",body:'Johnston G., 2007 “An anticounterfeiting strategy using numeric tokens.International journal of pharmaceutical medicine”, 163171'},{id:"B9",body:'HargravesK.ShaferS.2004Radio Frequency Identification (RFID) Privacy The Microsoft Perspective\n\t\t\t'},{id:"B10",body:'IlicA.MichahellesF.FleischE.2007Pervasive Computing and Communications Workshops, 2007. PerCom Workshops ‘07. Fifth Annual IEEE International Conference on 337341\n\t\t\t'},{id:"B11",body:'JuelsA.2006RFID security and privacy: a research survey‟ IEEE Journal on Selected Areas in Communications, 242February 2006, 381394'},{id:"B12",body:'JuelsA.2005Strengthening EPC tags against cloning‟, in Proc of the 4th ACM workshop on wireless security. 2005, Cologne, Germany, 6776\n\t\t\t'},{id:"B13",body:'KutvonenS.2005Trust management survey, Proceedings of iTrust 2005, 3477in LNCS, 7792Springer-Verlag.\n\t\t\t'},{id:"B14",body:'KohR.et al.2003White Paper: Securing the pharmaceutical supply chain, Auto-ID Center, Massachusetts Institute of Technology, 2003.\n\t\t\t'},{id:"B15",body:'LehtonenM.MichahellesF.FleischE.2007Probabilistic approach for location-based authentication‟, Auto-ID Labs White Paper WP-SWNET-020, Auto-ID Labs ETH Zurich. 317\n\t\t\t'},{id:"B16",body:'Lehtonen. M2007Trust and Security in RFID-Based Product Authentication Systems” Systems Journal, IEEE, 129144\n\t\t\t'},{id:"B17",body:'Lehtonen. M 2006From Identification to Authentication- A Review of RFID Product Authentication Techniques." Workshop on RFID Security-RFIDSec,169181Springer'},{id:"B18",body:'LiX.LiuJ.ShengQ. Z.ZeadallyS.ZhongW.2009TMS-RFID: Temporal Management of Large-Scale RFID Applications, International Journal of Information Systems Frontiers, Springer, July. 2009 120\n\t\t\t'},{id:"B19",body:'Mahinderjit-SinghM.LiX.2009Trust Framework for RFID Tracking in Supply Chain Management," Proc of The 3rd International Workshop on RFID Technology- Concepts, Applications, Challenges (IWRT 2009), Milan, Italy, 1726May 2009.\n\t\t\t'},{id:"B20",body:'Mahinderjit-SinghM.LiX.2010Trust in RFID-Enabled Supply-Chain Management, in International Journal of Security and Networks (IJSN), 5, 2/3 (Mar. 2010), 96105\n\t\t\t'},{id:"B21",body:'NochtaZ.StaakeT.FleischE.“.Product specific security features based on RFID technology.”in Applications and the Internet Workshops, 2006SAINT Workshops 2006. International Symposium on, 2327'},{id:"B22",body:'OsakaK.TakagiT.YamazakiK.TakahashiO.2006An Efficient and Secure RFID Security Method with Ownership Transfer” Computational Intelligence and Security, 2006, 210901095\n\t\t\t'},{id:"B23",body:'Pedro, P.L.2010Vulnerability analysis of RFID protocols for tag ownership transfer, Comput. Netw. (2010), doi:10.1016/j.comnet.2009.11.007'},{id:"B24",body:'Potdar.V and Chang.E, 2006 “Tamper detection in RFID tags using fragile watermarking,” 10th IEEE International Conference onIndustrial TechnologyICIT2006), Mumbai, INDIA, Dec. 15-17,\n\t\t\t'},{id:"B25",body:'DerakhshanR.OrlowskaM. E.LiX.2007RFID data management: Challenges and opportunities. In: D. W. Engels, IEEE International Conference on RFID 2007. IEEE International Conference on RFID 2007, Grapevine, Texas, USA, (175182March, 2008\n\t\t\t'},{id:"B26",body:'RanasingheD. C.ColeP. H. . E. P. C.NetworkArchitecture.InCole. P. H.anasingheD. C.(edsNetworkedR. F. I. D.SystemsLightweightCryptography.RaisingBarriers.toProduct.CounterfeitingSpringer; 1 edition. 978-3-54071-640-22007'},{id:"B27",body:'StaakeT.ThiesseF.FleischE.2005Extending the EPC network: the potential of RFID in anti-counterfeiting‟, Proc of ACM symposium on Applied computing, Santa Fe, New Mexico, 2005, 16071612\n\t\t\t'},{id:"B28",body:'SarmaS.AshtonK.BrockD.1999The Networked Physical World, Technical Report IT- AUTOID-WH-001, 1999. \n\t\t\t'},{id:"B29",body:'SeongD.etal. .AccessControl.Authorizationfor.Securityof. R. F. I. D.Multi-DomainUsing. S. A. M. L.X. A. C. M. L.presentedat.ComputationalIntelligence.Security2006International Conference on, 15871590'},{id:"B30",body:'Saito, J., Imamoto, K., Sakurai, K.: Reassignment scheme of an RFID tag’s key for owner transfer.2005In: Enokido, T., Yan, L.,Xiao, B., Kim, D.Y., Dai, Y.-S., Yang, L.T. (eds.) EUC-WS LNCS, 382313031312Springer, Heidelberg (2005)'},{id:"B31",body:'SongB.2008RFID tag ownership transfer, in Proceedings of Workshop on RFID Security, Budapest, Hungary, July 2008.'},{id:"B32",body:'TurneyP. D.1995Cost-Sensitive Classification: Empirical Evaluation of a Hybrid Genetic Decision Tree Induction Algorithm. Journal of Artificial Intelligence Research 2: 369409\n\t\t\t'},{id:"B33",body:'TurneyP. D.2000Types of cost in inductive concept learning. In Proceedings of the Workshopon Cost-Sensitive Learning at the Seventeenth International Conference on Machine Learning, Stanford University, California 1521'},{id:"B34",body:'TingK. M.1998Inducing Cost-Sensitive Trees via Instance Weighting. In Proceedings of the Second European Symposium on Principles of Data Mining and Knowledge Discovery, 2326Springer-Verlag.\n\t\t\t'},{id:"B35",body:'TurneyP. D.1995Cost-Sensitive Classification: Empirical Evaluation of a Hybrid Genetic Decision Tree Induction Algorithm. Journal of Artificial Intelligence Research 2: 369409\n\t\t\t'},{id:"B36",body:'Verisign - Expanding value of Supply Chain,2008\n\t\t\t'},{id:"B37",body:'Verisign Inc : “EPC Network Architecture” 2004'},{id:"B38",body:'WittenI. H.FrankE.2005Data Mining- Practical Machine Learning Tools and Techniques with Java Implementations. Morgan Kaufmann Publishers.\n\t\t\t'},{id:"B39",body:'Hall.M and Frank.E et.al2009The WEKA Data Mining Software: An Update; SIGKDD Explorations, 111Mark Frey: "EPCglobal Certificate Profile " '},{id:"B40",body:'Frey.M,2008EPCglobal Certificate Profile '},{id:"B41",body:'ZadroznyB.LangfordJ.AbeN.2003Cost-sensitive learning by Cost- Proportionate instance Weighting. In Proceedings of the 3rd International Conference on Data Mining 435445GS1 :\n\t\t\t'},{id:"B42",body:'Wine Supply Chain Traceability” 2006'},{id:"B43",body:'Vivian Yeo : Bedding, wine get a taste of RFID[Online].2007\n\t\t\t'},{id:"B44",body:'Australian IT,2009RFID to fight wine fraud" '},{id:"B45",body:'Domenitz.L and Kravitz.J2011e-Provenance \n\t\t\t'},{id:"B46",body:'Jared Sagoff : New bottle cap thwarts wine counterfeiters [Online].2008'}],footnotes:[],contributors:[{corresp:"yes",contributorFullName:"Manmeet Mahinderjit-Singh",address:"",affiliation:'
Northwest Polytechnical University of China,, China
'}],corrections:null},book:{id:"445",type:"book",title:"Designing and Deploying RFID Applications",subtitle:null,fullTitle:"Designing and Deploying RFID Applications",slug:"designing-and-deploying-rfid-applications",publishedDate:"June 15th 2011",bookSignature:"Cristina Turcu",coverURL:"https://cdn.intechopen.com/books/images_new/445.jpg",licenceType:"CC BY-NC-SA 3.0",editedByType:"Edited by",isbn:null,printIsbn:"978-953-307-265-4",pdfIsbn:"978-953-51-6029-8",reviewType:"peer-reviewed",numberOfWosCitations:17,isAvailableForWebshopOrdering:!0,editors:[{id:"9302",title:"Dr.",name:"Cristina",middleName:null,surname:"Turcu",slug:"cristina-turcu",fullName:"Cristina Turcu"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,coeditorOne:null,coeditorTwo:null,coeditorThree:null,coeditorFour:null,coeditorFive:null,topics:[{id:"758"}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"},chapters:[{id:"18084",type:"chapter",title:"Impacts of RFID on Business Models",slug:"impacts-of-rfid-on-business-models",totalDownloads:3667,totalCrossrefCites:0,signatures:"Ela Sibel Bayrak Meydanoğlu",reviewType:"peer-reviewed",authors:[{id:"33873",title:"Associate Prof.",name:"Ela Sibel",middleName:null,surname:"Bayrak Meydanoğlu",fullName:"Ela Sibel Bayrak Meydanoğlu",slug:"ela-sibel-bayrak-meydanoglu"}]},{id:"18085",type:"chapter",title:"Commercial and Implementation Issues Relating to the Widespread Acceptance and Adoption of Radio Frequency Identification Technology",slug:"commercial-and-implementation-issues-relating-to-the-widespread-acceptance-and-adoption-of-radio-fre",totalDownloads:2536,totalCrossrefCites:0,signatures:"Mark J. Rodrigues and Kieran James",reviewType:"peer-reviewed",authors:[{id:"29846",title:"Dr.",name:"Kieran",middleName:null,surname:"James",fullName:"Kieran James",slug:"kieran-james"},{id:"56259",title:"M.A.",name:"Mark",middleName:"J",surname:"Rodrigues",fullName:"Mark Rodrigues",slug:"mark-rodrigues"}]},{id:"18086",type:"chapter",title:"The Role of RFID Technology in Supply Chain Risk Management",slug:"the-role-of-rfid-technology-in-supply-chain-risk-management",totalDownloads:5428,totalCrossrefCites:1,signatures:"May Tajima",reviewType:"peer-reviewed",authors:[{id:"30872",title:"Dr.",name:"May",middleName:null,surname:"Tajima",fullName:"May Tajima",slug:"may-tajima"}]},{id:"18087",type:"chapter",title:"Secure RFID for Humanitarian Logistics",slug:"secure-rfid-for-humanitarian-logistics",totalDownloads:3641,totalCrossrefCites:2,signatures:"Gianmarco Baldini, Franco Oliveri, Hermann Seuschek, Erwin Hess and Michael Braun",reviewType:"peer-reviewed",authors:[{id:"37037",title:"MSc",name:"Gianmarco",middleName:null,surname:"Baldini",fullName:"Gianmarco Baldini",slug:"gianmarco-baldini"},{id:"40467",title:"Mr",name:"Franco",middleName:null,surname:"Oliveri",fullName:"Franco Oliveri",slug:"franco-oliveri"}]},{id:"18088",type:"chapter",title:"Applications of RFID Technology in the Complex Product Assembly Executive Process",slug:"applications-of-rfid-technology-in-the-complex-product-assembly-executive-process",totalDownloads:2135,totalCrossrefCites:0,signatures:"Huibin Sun",reviewType:"peer-reviewed",authors:[{id:"25768",title:"Dr.",name:"Huibin",middleName:null,surname:"Sun",fullName:"Huibin Sun",slug:"huibin-sun"}]},{id:"18089",type:"chapter",title:"Using RFID Technology for Simplification of Retail Processes",slug:"using-rfid-technology-for-simplification-of-retail-processes",totalDownloads:4483,totalCrossrefCites:2,signatures:"Azra Bayraktar, Erdal Yılmaz and Şakir Erdem",reviewType:"peer-reviewed",authors:[{id:"40616",title:"Dr.",name:"Azra",middleName:null,surname:"Bayraktar",fullName:"Azra Bayraktar",slug:"azra-bayraktar"},{id:"81938",title:"Dr.",name:"Erdal",middleName:null,surname:"Yılmaz",fullName:"Erdal Yılmaz",slug:"erdal-yilmaz"},{id:"81939",title:"Dr.",name:"Şakir",middleName:null,surname:"Erdem",fullName:"Şakir Erdem",slug:"sakir-erdem"}]},{id:"18090",type:"chapter",title:"A Solution with Security Concern for RFID-Based Track & Trace Services in EPCglobal-Enabled Supply",slug:"a-solution-with-security-concern-for-rfid-based-track-trace-services-in-epcglobal-enabled-supply",totalDownloads:3481,totalCrossrefCites:1,signatures:"Wei He, Yingjiu Li, Kevin Chiew, Tieyan Li and Eng Wah Lee",reviewType:"peer-reviewed",authors:[{id:"25833",title:"Prof.",name:"Yingjiu",middleName:null,surname:"Li",fullName:"Yingjiu Li",slug:"yingjiu-li"}]},{id:"18103",type:"chapter",title:"Discovery Services in the EPC Network",slug:"discovery-services-in-the-epc-network",totalDownloads:2734,totalCrossrefCites:6,signatures:"Martin Lorenz, Jürgen Müller, Matthieu-P. Schapranow, Alexander Zeier and Hasso Plattner",reviewType:"peer-reviewed",authors:[{id:"25930",title:"Mr",name:"Juergen",middleName:null,surname:"Mueller",fullName:"Juergen Mueller",slug:"juergen-mueller"},{id:"32312",title:"MSc",name:"Martin",middleName:null,surname:"Lorenz",fullName:"Martin Lorenz",slug:"martin-lorenz"},{id:"32313",title:"Mr",name:"Alexander",middleName:null,surname:"Zeier",fullName:"Alexander Zeier",slug:"alexander-zeier"},{id:"43871",title:"Mr.",name:"Matthieu-P.",middleName:null,surname:"Schapranow",fullName:"Matthieu-P. Schapranow",slug:"matthieu-p.-schapranow"}]},{id:"18104",type:"chapter",title:"Advantages and New Applications of DHT-Based Discovery Services in EPCglobal Network",slug:"advantages-and-new-applications-of-dht-based-discovery-services-in-epcglobal-network",totalDownloads:1892,totalCrossrefCites:1,signatures:"Juan Pedro Muñoz-Gea, Pilar Manzanares-Lopez and Josemaria Malgosa-Sanahuja",reviewType:"peer-reviewed",authors:[{id:"17879",title:"Mr",name:"Josemaria",middleName:null,surname:"Malgosa-Sanahuja",fullName:"Josemaria Malgosa-Sanahuja",slug:"josemaria-malgosa-sanahuja"},{id:"17880",title:"Mr",name:"Juan Pedro",middleName:null,surname:"Muñoz-Gea",fullName:"Juan Pedro Muñoz-Gea",slug:"juan-pedro-munoz-gea"},{id:"17881",title:"Ms",name:"Pilar",middleName:null,surname:"Manzanares-Lopez",fullName:"Pilar Manzanares-Lopez",slug:"pilar-manzanares-lopez"}]},{id:"18091",type:"chapter",title:"Application of RFID and Mobile Technology to Plaster Board Waste in the Construction Industry",slug:"application-of-rfid-and-mobile-technology-to-plaster-board-waste-in-the-construction-industry",totalDownloads:2780,totalCrossrefCites:1,signatures:"Lizong Zhang, Anthony S. Atkins and Hongnian Yu",reviewType:"peer-reviewed",authors:[{id:"26358",title:"Dr.",name:"Anthony",middleName:null,surname:"Atkins",fullName:"Anthony Atkins",slug:"anthony-atkins"}]},{id:"18092",type:"chapter",title:"RFID-Based Equipment Monitoring System",slug:"mohd-helmy-abd-wahab-herdawatie-abdul-kadir-zarina-tukiran-nor-aisah-sudin-mohd-hafiz-a-jalil-and-ay",totalDownloads:8579,totalCrossrefCites:0,signatures:"Mohd Helmy Abd Wahab, Herdawatie Abdul Kadir, Zarina Tukiran, Noraisah Sudin, Mohd Hafizz Ab. Jalil and Ayob Johari",reviewType:"peer-reviewed",authors:[{id:"3012",title:"Mr.",name:"Mohd Helmy",middleName:null,surname:"Abd Wahab",fullName:"Mohd Helmy Abd Wahab",slug:"mohd-helmy-abd-wahab"},{id:"5803",title:"Mrs.",name:"Herdawatie",middleName:null,surname:"Abdul Kadir",fullName:"Herdawatie Abdul Kadir",slug:"herdawatie-abdul-kadir"},{id:"34491",title:"Mrs.",name:"Zarina",middleName:null,surname:"Tukiran",fullName:"Zarina Tukiran",slug:"zarina-tukiran"},{id:"34492",title:"Mrs.",name:"Noraisah",middleName:null,surname:"Sudin",fullName:"Noraisah Sudin",slug:"noraisah-sudin"},{id:"34493",title:"Mr.",name:"Mohd Hafizz",middleName:null,surname:"Ab. Jalil",fullName:"Mohd Hafizz Ab. Jalil",slug:"mohd-hafizz-ab.-jalil"},{id:"84890",title:"Prof.",name:"Ayob",middleName:null,surname:"Johari",fullName:"Ayob Johari",slug:"ayob-johari"}]},{id:"18093",type:"chapter",title:"Developing RFID-Based Instruments Maintenance Management in Construction Lab",slug:"developing-rfid-based-instruments-maintenance-management-in-construction-lab",totalDownloads:2793,totalCrossrefCites:0,signatures:"Yu-Cheng Lin, Weng-Fong Cheung, Yi-Chuan Hsieh, Fu-Cih Siao and Yu-Chih Su",reviewType:"peer-reviewed",authors:[{id:"28493",title:"Prof.",name:"Yu-Cheng",middleName:null,surname:"Lin",fullName:"Yu-Cheng Lin",slug:"yu-cheng-lin"}]},{id:"18094",type:"chapter",title:"What are Authentic Pharmaceuticals Worth?",slug:"what-are-authentic-pharmaceuticals-worth-",totalDownloads:1661,totalCrossrefCites:3,signatures:"Matthieu Schapranow, Jürgen Müller, Martin Lorenz, Alexander Zeier and Hasso Plattner",reviewType:"peer-reviewed",authors:[{id:"25930",title:"Mr",name:"Juergen",middleName:null,surname:"Mueller",fullName:"Juergen Mueller",slug:"juergen-mueller"},{id:"43871",title:"Mr.",name:"Matthieu-P.",middleName:null,surname:"Schapranow",fullName:"Matthieu-P. Schapranow",slug:"matthieu-p.-schapranow"}]},{id:"18095",type:"chapter",title:"Security Control and Privacy Preservation in RFID enabled Wine Supply Chain",slug:"security-control-and-privacy-preservation-in-rfid-enabled-wine-supply-chain",totalDownloads:2602,totalCrossrefCites:0,signatures:"Manmeet Mahinderjit-Singh, Xue LI and Zhanhuai LI",reviewType:"peer-reviewed",authors:[{id:"19639",title:"Dr.",name:"Manmeet",middleName:null,surname:"Mahinderjit Singh",fullName:"Manmeet Mahinderjit Singh",slug:"manmeet-mahinderjit-singh"},{id:"21559",title:"Prof.",name:"Xue",middleName:null,surname:"Li",fullName:"Xue Li",slug:"xue-li"},{id:"37872",title:"Prof.",name:"Zhanhuai",middleName:null,surname:"LI",fullName:"Zhanhuai LI",slug:"zhanhuai-li"}]},{id:"18096",type:"chapter",title:"An RFID-Based Anti-Counterfeiting Track and Trace Solution",slug:"an-rfid-based-anti-counterfeiting-track-and-trace-solution",totalDownloads:2851,totalCrossrefCites:0,signatures:"Ioan Ungurean, Cornel Turcu, Vasile Gaitan and Valentin Popa",reviewType:"peer-reviewed",authors:[{id:"5902",title:"Professor",name:"Vasile Gheorghita",middleName:null,surname:"Gaitan",fullName:"Vasile Gheorghita Gaitan",slug:"vasile-gheorghita-gaitan"},{id:"6025",title:"Prof.",name:"Valentin",middleName:null,surname:"Popa",fullName:"Valentin Popa",slug:"valentin-popa"},{id:"52542",title:"Prof.",name:"Cornel",middleName:null,surname:"Turcu",fullName:"Cornel Turcu",slug:"cornel-turcu"},{id:"52554",title:"MSc.",name:"Ioan",middleName:null,surname:"Ungurean",fullName:"Ioan Ungurean",slug:"ioan-ungurean"}]},{id:"18097",type:"chapter",title:"A Knowledge-Based Approach for Detecting Misuses in RFID Systems",slug:"a-knowledge-based-approach-for-detecting-misuses-in-rfid-systems",totalDownloads:2338,totalCrossrefCites:0,signatures:"Gennaro Della Vecchia and Massimo Esposito",reviewType:"peer-reviewed",authors:[{id:"28609",title:"Dr.",name:"Massimo",middleName:null,surname:"Esposito",fullName:"Massimo Esposito",slug:"massimo-esposito"},{id:"38569",title:"Dr.",name:"Gennaro",middleName:null,surname:"Della Vecchia",fullName:"Gennaro Della Vecchia",slug:"gennaro-della-vecchia"}]},{id:"18098",type:"chapter",title:"A Study on Implementation and Service of Digital Watermark Technology Architecture for Distribution Management",slug:"a-study-on-implementation-and-service-of-digital-watermark-technology-architecture-for-distribution-",totalDownloads:2531,totalCrossrefCites:0,signatures:"Manabu Hirakawa",reviewType:"peer-reviewed",authors:[{id:"28555",title:"Dr",name:"Manabu",middleName:null,surname:"Hirakawa",fullName:"Manabu Hirakawa",slug:"manabu-hirakawa"}]},{id:"18099",type:"chapter",title:"RFID Middleware Design and Architecture",slug:"rfid-middleware-design-and-architecture",totalDownloads:9362,totalCrossrefCites:3,signatures:"Mehdia Ajana El Khaddar, Mohammed Boulmalf, Hamid Harroud and Mohammed Elkoutbi",reviewType:"peer-reviewed",authors:[{id:"26677",title:"Dr.",name:"Mehdia",middleName:null,surname:"Ajana El Khaddar",fullName:"Mehdia Ajana El Khaddar",slug:"mehdia-ajana-el-khaddar"},{id:"59312",title:"Prof.",name:"Mohammed",middleName:null,surname:"El Koutbi",fullName:"Mohammed El Koutbi",slug:"mohammed-el-koutbi"},{id:"81916",title:"Dr.",name:"Mohammed",middleName:null,surname:"Boulmalf",fullName:"Mohammed Boulmalf",slug:"mohammed-boulmalf"},{id:"81917",title:"Dr.",name:"Hamid",middleName:null,surname:"Harroud",fullName:"Hamid Harroud",slug:"hamid-harroud"}]},{id:"18100",type:"chapter",title:"A Study on the Influence of RFID Tagging on Circulation Services and Collection Management: a Case Study of the Taipei Public Library",slug:"a-study-on-the-influence-of-rfid-tagging-on-circulation-services-and-collection-management-a-case-st",totalDownloads:3195,totalCrossrefCites:0,signatures:"Shu-hsien Tseng and Chien-ju Chou",reviewType:"peer-reviewed",authors:[{id:"33065",title:"Prof.",name:"Shu-hsien",middleName:null,surname:"Tseng",fullName:"Shu-hsien Tseng",slug:"shu-hsien-tseng"},{id:"33068",title:"Ms",name:"Chien-Ju",middleName:null,surname:"Chou",fullName:"Chien-Ju Chou",slug:"chien-ju-chou"}]},{id:"18101",type:"chapter",title:"The Right UHF RFID Tags for Libraries – Criteria, Concern and Issues",slug:"the-right-uhf-rfid-tags-for-libraries-criteria-concern-and-issues",totalDownloads:3833,totalCrossrefCites:0,signatures:"Steve H Ching, Alice Tai, Henry Ip, Lau Lap Fai and Michael Cheng",reviewType:"peer-reviewed",authors:[{id:"41381",title:"Prof.",name:"Steve H",middleName:null,surname:"Ching",fullName:"Steve H Ching",slug:"steve-h-ching"},{id:"89699",title:"Ms.",name:"Alice",middleName:null,surname:"Tai",fullName:"Alice Tai",slug:"alice-tai"},{id:"89715",title:"Mr.",name:"Henry",middleName:null,surname:"Ip",fullName:"Henry Ip",slug:"henry-ip"},{id:"89716",title:"Mr.",name:"Michael",middleName:null,surname:"Cheng",fullName:"Michael Cheng",slug:"michael-cheng"},{id:"89720",title:"Mr.",name:"Lau",middleName:null,surname:"Lap Fai",fullName:"Lau Lap Fai",slug:"lau-lap-fai"}]},{id:"18102",type:"chapter",title:"RFID- Application in Info-Documentary Systems",slug:"rfid-application-in-info-documentary-systems",totalDownloads:3059,totalCrossrefCites:2,signatures:"Angela Repanovici and Luciana Cristea",reviewType:"peer-reviewed",authors:[{id:"40952",title:"Dr.",name:"Angela",middleName:null,surname:"Repanovici",fullName:"Angela Repanovici",slug:"angela-repanovici"},{id:"40971",title:"Dr.",name:"Luciana",middleName:null,surname:"Cristea",fullName:"Luciana Cristea",slug:"luciana-cristea"}]}]},relatedBooks:[{type:"book",id:"3608",title:"Development and Implementation of RFID Technology",subtitle:null,isOpenForSubmission:!1,hash:null,slug:"development_and_implementation_of_rfid_technology",bookSignature:"Cristina Turcu",coverURL:"https://cdn.intechopen.com/books/images_new/3608.jpg",editedByType:"Edited by",editors:[{id:"9302",title:"Dr.",name:"Cristina",surname:"Turcu",slug:"cristina-turcu",fullName:"Cristina Turcu"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"},chapters:[{id:"6025",title:"Development and Implementation of RFID Technology",slug:"development_and_implementation_of_rfid_technology",signatures:"Huiyun Li",authors:[null]},{id:"6026",title:"Design of Antennas for RFID Application",slug:"design_of_antennas_for_rfid_application",signatures:"Ming-Tao Zhang, Yong-Chang Jiao, Fu-Shun Zhang and Wu-Tu Wang",authors:[null]},{id:"6027",title:"Design Fundamentals and Advanced Techniques of RFID Antennas",slug:"design_fundamentals_and_advanced_techniques_of_rfid_antennas",signatures:"Sungtek Kahng",authors:[null]},{id:"6028",title:"UHF RFID of People",slug:"uhf_rfid_of_people",signatures:"Milan Polívka, Milan Švanda and Přemysl Hudec",authors:[null]},{id:"6029",title:"UHF Tags for Sensing Applications",slug:"uhf_tags_for_sensing_applications",signatures:"Gaetano Marrocco",authors:[null]},{id:"6030",title:"Remotely UHF-Powered Ultra Wideband RFID for Ubiquitous Wireless Identification and Sensing",slug:"remotely_uhf-powered_ultra_wideband_rfid_for_ubiquitous_wireless_identification_and_sensing",signatures:"Majid Baghaei Nejad, Zhuo Zou, David S. Mendoza and Li-Rong Zheng",authors:[null]},{id:"6031",title:"Development of Sensing and Computing Enhanced Passive RFID Tags Using the Wireless Identification and Sensing Platform",slug:"development_of_sensing_and_computing_enhanced_passive_rfid_tags_using_the_wireless_identification_an",signatures:"Alanson Sample, Daniel Yeager, Michael Buettner and Joshua Smith",authors:[null]},{id:"6032",title:"Surface Acoustic Wave RFID Tags",slug:"surface_acoustic_wave_rfid_tags",signatures:"S. Härmä and V. P. Plessky",authors:[null]},{id:"6033",title:"Smart RFID Tags",slug:"smart_rfid_tags",signatures:"Nadine Pesonen, Kaarle Jaakkola, Jerome Lamy, Kaj Nummila and Jouko Marjonen",authors:[null]},{id:"6034",title:"Advances in RFID Components Design: Integrated Circuits",slug:"advances_in_rfid_components_design__integrated_circuits",signatures:"Arjuna Marzuki, Zaliman Sauli and Ali Yeon Shakaff",authors:[null]},{id:"6035",title:"A Low Cost Anticollision Reader",slug:"a_low_cost_anticollision_reader",signatures:"Dan Tudor Vuza, Reinhold Frosch, Helmut Koeberl and Damien Boissat",authors:[null]},{id:"6036",title:"A Scientific Approach to UHF RFID Systems Characterization",slug:"a_scientific_approach_to_uhf_rfid_systems_characterization",signatures:"Ulrich Muehlmann",authors:[null]},{id:"6037",title:"Security and Privacy in RFID Applications",slug:"security_and_privacy_in_rfid_applications",signatures:"Paweł Rotter",authors:[null]},{id:"6038",title:"The Study of RFID Authentication Protocols and Security of Some Popular RFID Tags",slug:"the_study_of_rfid_authentication_protocols_and_security_of_some_popular_rfid_tags",signatures:"Hung-Yu Chien",authors:[null]},{id:"6039",title:"A Secure Mutual Authentication Protocol for Low-Cost RFID System",slug:"a_secure_mutual_authentication_protocol_for_low-cost_rfid_system",signatures:"N.W. Lo, Tzu-Li Yang and Kuo-Hui Yeh",authors:[null]},{id:"6040",title:"Privacy Enhancing Techniques on RFID systems",slug:"privacy_enhancing_techniques_on_rfid_systems",signatures:"Masataka Suzuki and Kazukuni Kobara",authors:[null]},{id:"6041",title:"An Improved Forward Secrecy Protocol for Next Generation EPCGlogal Tag",slug:"an_improved_forward_secrecy_protocol_for_next_generation_epcglogal_tag",signatures:"L.M. Cheng, C.W. So and L.L. Cheng",authors:[null]},{id:"6042",title:"RFID System Integration Design with Existing Websites via EPCglobal-like Architecture for Expensive Material Handling",slug:"rfid_system_integration_design_with_existing_websites_via_epcglobal-like_architecture_for_expensive_",signatures:"Shing Tenqchen, Chui- Yu Chiu and Saad Laraqui",authors:[null]},{id:"6043",title:"RFID Product Authentication in EPCglobal Network",slug:"rfid_product_authentication_in_epcglobal_network",signatures:"Tieyan Li and Wei He",authors:[null]},{id:"6044",title:"RFID Information Value Chain and ETRI RFID Ecosystem: Value-added Environment Linking Physical and Virtual Worlds",slug:"rfid_information_value_chain_and_etri_rfid_ecosystem__value-added_environment_linking_physical_and_v",signatures:"Tae-Su Cheong and Yong-Jun Lee",authors:[null]},{id:"6045",title:"Enhancing the Interactivity of Learning-Guide Systems with RFID",slug:"enhancing_the_interactivity_of_learning-guide_systems_with_rfid",signatures:"Yo-Ping Huang, Yueh-Tsun Chang, Wei-Po Chuang and Frode Eika Sandnes",authors:[null]},{id:"6046",title:"Object Recognition Using a 3D RFID System",slug:"object_recognition_using_a_3d_rfid_system",signatures:"Se-gon Roh and Hyouk Ryeol Choi",authors:[null]},{id:"6047",title:"RFID System Architecture Reconsidered",slug:"rfid_system_architecture_reconsidered",signatures:"Dirk Henrici, Aneta Kabzeva and Paul Mueller",authors:[null]},{id:"6048",title:"Generalized "Yoking-Proofs" and Inter-Tag Communication",slug:"generalized_yoking-proofs_and_inter-tag_communication",signatures:"Leonid Bolotnyy and Gabriel Robins",authors:[null]},{id:"6049",title:"Shared Tag RFID System for Multiple Application Objects",slug:"shared_tag_rfid_system_for_multiple_application_objects",signatures:"Ji-Yeon Kim, Jong-Jin Jung, Yun-Seok Chang and Geun-Sik Jo",authors:[null]},{id:"6050",title:"Object-Oriented Solutions for Information Storage on RFID Tags",slug:"object-oriented_solutions_for_information_storage_on_rfid_tags",signatures:"Cristina Turcu, Remus Prodan, Marius Cerlinca and Tudor Cerlinca",authors:[null]},{id:"6051",title:"Mobile Applications for RFID Based B2B Systems",slug:"mobile_applications_for_rfid_based_b2b_systems",signatures:"Tudor-Ioan Cerlinca, Cornel Turcu, Valentin Popa and Felicia Giza",authors:[null]},{id:"6052",title:"Development of Consumer RFID Applications and Services",slug:"development_of_consumer_rfid_applications_and_services",signatures:"Yong-Woon Kim",authors:[null]},{id:"6053",title:"Efficient Outlier Detection in RFID Trails",slug:"efficient_outlier_detection_in_rfid_trails",signatures:"Elio Masciari and Giuseppe M. Mazzeo",authors:[null]},{id:"6054",title:"RFID Tags as Technology for Value Sensing in Real Space Market",slug:"rfid_tags_as_technology_for_value_sensing_in_real_space_market",signatures:"Yukio Ohsawa, Hikaru Kimura, Toru Gengo and Takeshi Ui",authors:[null]},{id:"6055",title:"A Sector Analysis for RFID Technologies: Fundamental and Technical Analysis for Financial Decision Making Problems",slug:"a_sector_analysis_for_rfid_technologies__fundamental_and_technical_analysis_for_financial_decision_m",signatures:"S. Kasap, M.C. Testik, E. Yüksel and N. Kasap",authors:[null]}]}],publishedBooks:[{type:"book",id:"147",title:"Biosensors",subtitle:"Emerging Materials and Applications",isOpenForSubmission:!1,hash:"506ba7fc7057db3f5a13c57a5ed4a460",slug:"biosensors-emerging-materials-and-applications",bookSignature:"Pier Andrea Serra",coverURL:"https://cdn.intechopen.com/books/images_new/147.jpg",editedByType:"Edited by",editors:[{id:"6091",title:"Prof.",name:"Pier Andrea",surname:"Serra",slug:"pier-andrea-serra",fullName:"Pier Andrea Serra"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"162",title:"Microsensors",subtitle:null,isOpenForSubmission:!1,hash:"3d48614c970df4eb00d2d1a4e1bb5cda",slug:"microsensors",bookSignature:"Igor Minin",coverURL:"https://cdn.intechopen.com/books/images_new/162.jpg",editedByType:"Edited by",editors:[{id:"3712",title:"Prof.",name:"Oleg",surname:"Minin",slug:"oleg-minin",fullName:"Oleg Minin"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"445",title:"Designing and Deploying RFID Applications",subtitle:null,isOpenForSubmission:!1,hash:"95835973805a19d1c3fb1cdea037ac31",slug:"designing-and-deploying-rfid-applications",bookSignature:"Cristina Turcu",coverURL:"https://cdn.intechopen.com/books/images_new/445.jpg",editedByType:"Edited by",editors:[{id:"9302",title:"Dr.",name:"Cristina",surname:"Turcu",slug:"cristina-turcu",fullName:"Cristina Turcu"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"851",title:"Magnetic Sensors",subtitle:"Principles and Applications",isOpenForSubmission:!1,hash:"d4a21c0850b33dd0d182e0cf89b861d3",slug:"magnetic-sensors-principles-and-applications",bookSignature:"Kevin Kuang",coverURL:"https://cdn.intechopen.com/books/images_new/851.jpg",editedByType:"Edited by",editors:[{id:"72281",title:"Dr.",name:"Kevin",surname:"Kuang",slug:"kevin-kuang",fullName:"Kevin Kuang"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1543",title:"Electromagnetic Radiation",subtitle:null,isOpenForSubmission:!1,hash:"1ade06592c00a3854500b79f21a37988",slug:"electromagnetic-radiation",bookSignature:"Saad Osman Bashir",coverURL:"https://cdn.intechopen.com/books/images_new/1543.jpg",editedByType:"Edited by",editors:[{id:"100186",title:"Prof.",name:"Saad",surname:"Bashir",slug:"saad-bashir",fullName:"Saad Bashir"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}],publishedBooksByAuthor:[{type:"book",id:"106",title:"Supply Chain Management",subtitle:null,isOpenForSubmission:!1,hash:"5e9e8cec79b6ffe25eefcb7ec35083cc",slug:"supply-chain-management",bookSignature:"Pengzhong Li",coverURL:"https://cdn.intechopen.com/books/images_new/106.jpg",editedByType:"Edited by",editors:[{id:"19636",title:"Prof.",name:"Pengzhong",surname:"Li",slug:"pengzhong-li",fullName:"Pengzhong Li"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"445",title:"Designing and Deploying RFID Applications",subtitle:null,isOpenForSubmission:!1,hash:"95835973805a19d1c3fb1cdea037ac31",slug:"designing-and-deploying-rfid-applications",bookSignature:"Cristina Turcu",coverURL:"https://cdn.intechopen.com/books/images_new/445.jpg",editedByType:"Edited by",editors:[{id:"9302",title:"Dr.",name:"Cristina",surname:"Turcu",slug:"cristina-turcu",fullName:"Cristina Turcu"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}]},onlineFirst:{chapter:{type:"chapter",id:"72435",title:"Police Education in the United Kingdom: Challenges and Future Directions",doi:"10.5772/intechopen.92705",slug:"police-education-in-the-united-kingdom-challenges-and-future-directions",body:'
1. Introduction
In recent years, professionalisation has become a critical discourse [1, 2, 3, 4] for the development of police forces in the United Kingdom. As a result, moving away from traditional training programmes towards more formal higher education programmes has been seen as a way of progress to develop professionalism within the police force [5]. In light of recent development in the field of policing, modernisation became the key concern for workforce development to fulfil the demands of the twenty-first century. The changing nature of policing and the complexity of police work became an integral part of police studies discourse [6, 7]. Recent studies show that having a higher education degree tends to have a more significant impact on police officers’ knowledge and appreciation of the values and lifestyles of peoples from different cultures, especially minority groups and immigrants [8, 9]. Therefore, the professional academic education programme has been suggested as a vital tool for the development of police forces in the United Kingdom [10].
In February 2016, the College of Policing, the national professional body for policing in England and Wales, introduced the Policing Education Qualifications Framework (PEQF) for developing academic programmes for the 43 police forces in England and Wales. The PEQF proposed different routes for providing education, namely Police Constable Degree Apprenticeship (PCDA), Degree Holder Entry Programme (DHEP), and Pre-Join Degree (PJD), in professional policing practice [11, 12]. Student officers are recruited by the forces for the PCDA and DHEP routes on a salaried full-time 40 hours per week contract. Within their contract hours, they have to engage 20% of their time for off-the-job learning with a partner university, being students of an enrolled programme [12, 13].
Several police forces have already launched the PCDA programmes in partnership with several universities. On 7 September 2018, Nottinghamshire Police nationally pioneered the PCDA programme with their first cohort in partnership with the University of Derby. This initiative was followed by Derbyshire Police who then ran their first cohort of the PCDA programme with the same university. Then throughout the year in 2019, some other forces such as Leicestershire, Northamptonshire, South Wales, Gwent, Dyfed-Powys, West Midlands, Northumbria, Avon and Somerset, Staffordshire, Merseyside, and Sussex started running the PCDA programme [14]. These programmes, in fact, shifted the nature of police education and training with a particular focus on theoretical knowledge linking with the professional practice of police work with less or no emphasis on physical education. The primary mission for drastically changing police education and training is to make policing a graduate level occupation [14]. It is not only to replace the Initial Police Learning and Development Programme (IPLDP) or give all officers a university degree, but also to make the officers academically and professionally sound for the complex challenges they face in contemporary policing.
It is not an easy task to transform the century-old traditional police training to the university education programmes over a period of 2–3 years. Due to this transition in developing professional qualifications, both the forces and the higher education institutions (HEIs) are facing challenges in tackling different practical and pedagogical issues in implementing new programmes. On the one hand, the police forces are traditionally conservative [15, 16, 17] as Reiner ([18], p. 130) claims that the majority of police officers are conservative ‘both politically and morally’ and the students of these programmes are the trainee officers of a disciplined force [19, 20]. On the other hand, universities are very much student-focused to ensure the best learning experience for every individual student and encourage them to be critical about their learning journey and broaden their horizons. To run an academic programme successfully, HEIs are required to comply with the frameworks of the Institute for Apprenticeships and Technical Education and other funding requirements, for example from the Education and Skills Funding Agency (ESFA) as well as strictly maintaining academic regulations including Quality Assurance (QA) process and satisfy the Office for Students (OfS). Therefore, HEIs have to be in continuous conversations with the partner forces to solve the problems associated with teaching, delivery, and assessment as they arise.
Despite the fact that the Peelian objectives of policing were to ensure safety and security of person and property with the help of the community as well as prevent and detect crime [21], policing around the world became an ‘extraordinarily complex endeavour’ [22] due to changing demands and new challenges including technological advancement and changing patterns of crimes [23]. Police Officers do not spend a great deal of time in dealing with theft, robbery, and burglary that they did in the earlier days. Nowadays they deal with rapidly evolving crime threats such as terrorism, cybercrime, and serious and organised crime. Yet for the public, their role as citizens in uniform and bobbies on the beat as portrayed in the ever popular BBC series ‘Dixon of Dock Green’ (1955–1976) has not been lost as they still need to help the people whenever necessary. This is especially the case when austerity has meant a reduction to other public services in the UK leading to increasing demand on the police service, for example assistance with mental health-related incidents [24]. Yet, there was a saying ‘if you want to know the time, ask a policeman’ ([18], p. 78), people still call the police to help them with non-crime incidents even to buy some groceries for vulnerable residents.
2. Historical development of police education and training
The role of a police constable is one of the oldest professions in Great Britain as its history dates back to 1285 Statute of Winchester, attestation of constables following an Act of Parliament in 1673, Bow Street Runners of 1749, the establishment of the City of Glasgow Police in 1800 and finally the creation of a full-time formal police organisation for London, the Metropolitan Police, in 1829. However, the establishment of the Metropolitan Police, a brainchild of the then Home Secretary Sir Robert Peel, who later served as a British Prime Minister, is seen as the introduction of the ‘modern’ public policing in the world; as a result, policing became a career that offered status and security at the end of the nineteenth century [25].
It was after 100 years since the establishment of the Metropolitan Police, serious efforts were made to develop police training. The Metropolitan Police College at Hendon was established in 1934 as a military-style institution with the intention to train the serving and newly recruited officers for senior rank. The idea originally came from the Indian Police Service (IPS) that used to recruit officers in senior ranks called probationer Assistant Superintendent of Police. The Assistant Commander of the College was seconded from the IPS. In five intakes, 188 officers were graduated from the college to become inspectors until the institution was closed in September 1939. The college was not re-opened in the same format after the Second World War. Instead, in June 1948, the new National Police College (known as the Police Staff College since 1979) was established at Ryton-on-Dunsmore, near Coventry, to run different training courses for higher ranking officers with potentials to become senior police officers [26]. The college ran residential and non-residential junior, senior, and short courses and also overseas command courses for promising officers, and a scholarship scheme was available [27, 28].
Turning to the London Metropolitan Police ‘was the first modern police force in a nation with representative government’ ([29], ix) and the British bobbies ‘occupy a special place in the history of policing in the world’ and was ‘a role model of successful policing’ ([30], p. 435). The initial recruit training played a great role in turning an ordinary citizen into a uniformed policeman. The Metropolitan Police Training School for constables was established at Peel House in Regency Street, Pimlico in 1907, which was there until 1974, and the Metropolitan Police College in Hendon was rebuilt and opened in 1974, popularly known as the Peel Centre [31].
Historically, initial police training was known as the foundation training or basic police training in the UK, which was followed by police organisations around the world, in particular, in former British colonies. Many national police forces such as the Bangladesh Police still run the same initial police training for the new recruits. After World War II, the specialist cadet college for direct entry senior officers for the Metropolitan Police was turned into a Metropolitan Police Training School for recruit constables. The 17-week initial training was run at Hendon until 2007. However, since the 1960s, intense pressure to change the patterns of recruiting and training for the police force has led to an emphasis on recruiting graduates and since then support for higher education has grown [32, 33].
In addition to Hendon, organisations such as the National Police Training (NPT) (a Home Office unit established in 1993, following the Police Training Council’s recognition of problems with the arrangements for managing police training in 1992), the Central Police Training and Development Authority (CENTREX), and the National Policing Improvement Agency (NPIA) were involved in running the initial police training in England and Wales [34, 35]. The NPT aimed at bringing greater coherence to all police training establishments including the Police Staff College, Police Training Centres (PTCs), the Police National Computer School, a centre for the design of training and training of trainers at Harrogate and a centre for the training of surveillance techniques for National Crime Squad officers at Loughborough [36]. CENTREX took over from the NPT in 2002 [37] and ran the Probationer Training Programme at six PTCs in various parts of the country, namely Bruche, Ashford, Durham, Bramshill, Ryton-on-Dunsmore, and Cwmbran. In 2007, the functions of CENTREX were merged with the NPIA, which was dissolved in 2013 and the newly established College of Policing took over some of its responsibilities.
In 2006, the new 26-week IPLDP was introduced and it became the responsibility of the respective police forces to train the newly recruited constables. Since 2010, a level 3 qualification called Diploma in Policing was awarded to the recruits upon successful completion of the IPLDP training, which used to run week by week in four phases, that is induction, community placement, supervised patrol, and independent patrol. The academic qualifications proposed by the PEQF have been gradually replacing IPLDP and it is expected that by 2020 all the forces in England and Wales will run the PEQF programmes1. However, the Metropolitan Police is still in the process of implementing the PEQF and it is expected to run the PCDA and DHEP programmes from September 2020.
Following the government White Paper ‘Policing A New Century—A Blueprint for Reform’ [38], the report of Her Majesty’s Inspectorate of Constabulary (HMIC) entitled ‘Training Matters’ [39] and BBC’s the Panorama show entitled ‘The Secret Policeman’ (2003) that exposed racism in the regional Police Training Centre at Bruche had a significant impact on the long-lasting police training. As a result, the government came forward to reform the initial police training. Charman ([35], p. 73) argues that:
‘What the HMIC report “Training Matters” (2002) and the 2003 screening of the BBC documentary “The Secret Policeman” revealed was that both the formal and informal training of new police recruits needed a radical overhaul’.
The creation of the College of Policing in 2012 as well as the Coalition government’s approval of the professionalisation agenda of policing and recognition of policing as a graduate level occupation led to the introduction of the PEQF in 2016. It is worth mentioning that as an indirect impact of this new professional body, the world famous Police Staff College, which was relocated to Bramshill in 1960 from Ryton-on-Dunsmore, popularly known as Bramshill, was closed in 2015 where many senior police officers from the UK and Commonwealth countries have undergone professional development training since 1948.
In 2017, the Police Minister Brandon Lewis MP while speaking at the PEQF conference identified the successes of the College of Policing in introducing a code of ethics, beginning a culture of continuous professional development (CPD), continually growing the body of professional knowledge, and establishing the final pillar through the PEQF as standards of professional qualification for policing. The Minister identified the implementation of the PEQF in cooperation with HEIs as ‘a really big challenge’ and justified the argument for professionalisation of policing as he stated that:
‘... to those who say that policing isn’t and shouldn’t be a graduate job, I would ask you to just pause for a moment and encourage you to challenge that thought. Because policing needs to be prepared to meet the challenges of the future and the PEQF aims to give officers access to the knowledge and skills they need to succeed in a fast changing environment’ ([40], online).
3. Professionalisation agenda: policing as a graduate level occupation
The notion of the police as a profession is not new [41]. Across different professions, professionalism is changing and being challenged and changed as professionals now increasingly work at scale [42]. However, the policing professionalisation agenda of the College of Policing and the ‘Policing Vision 2025’ recognise policing as a graduate level occupation similar to those professions requiring specialist degrees in the relevant subjects such as doctor, social worker, and teacher [43]. This ‘Policing Vision 2025’ has been developed by the Association of Police and Crime Commissioners (APCC) and the National Police Chiefs’ Council (NPCC) in consultation with the College of Policing, National Crime Agency, staff associations, and other policing and community partners. Neyroud [44] refers to a new professionalism in policing in England and argues that it focuses on improving and developing effective practice and building partnerships between higher education and police practitioners.
It is imperative that as a professional, police officers must be allowed a high degree of individual autonomy and they should have independence of judgement. The common elements of any profession to serve in a professional manner include a specialist knowledge and ethical practice related to that profession, scope for CPD, and certain standards set out to educate for that profession [45, 46]. But critics argued that knowledge-based policing in practice promotes a concept of knowledge that indirectly threatens the police officers’ traditional experience-based knowledge and professional discretion [47].
According to the College of Policing [13], there is a lack of consistency in relation to nationwide educational background or qualifications for all roles or ranks within the police forces, which provide knowledge and skills to meet the current and future challenges. It also says that:
‘PEQF aims to bring consistent practice in terms of the implementation, assessment and accreditation of initial police training across the 43 forces in England and Wales. This consistency can contribute to the professionalism of the police service and put policing in line with other professions with regard to its formal education standards’ ([13]: Online).
It noted that the PEQF supports the NPCC and APCC’s ‘Policing Vision 2025’ that ‘By 2025 policing will be a profession with a more representative workforce that will align the right skills, powers and experience to meet challenging requirements’ ([13], online).
After long consultations, the College of Policing introduced the PEQF and three routes to recruit police constables. Before the PEQF, the IPLDP was introduced in 2006 as a level 3 Diploma in Policing [48] that replaced the Foundation Training (still carried out by many police organisations around the world), which is still in use in some forces including the largest force London Metropolitan Police.
For clarity, it is worth mentioning here that Scottish Police runs Police Officer Recruit Training in line with the Police Scotland National Framework for Quality Assurance in Training and Education and therefore they are not part of the PEQF. Police Service of Northern Ireland runs its own foundation training for the recruit constables at the Northern Ireland Police College, which includes a 23-week Student Officer Training Programme that follows attestation ceremony and Probationer Development Programme. Due to the length, discussion about these programmes is beyond the scope of this chapter.
In 2016, the College of Policing announced that new police officers in England and Wales would have to be educated to degree level from 2020 onwards [49] as the ‘Policing Vision 2025’ recognises policing as a graduate level occupation. With record numbers of British students attending universities, it would be the best opportunity for preparing the next-generation professional on police studies. A formal possession of specialised knowledge credentials is considered as a key characteristic for the enclosure of a profession [50]. That is why Livingstone and Antonelli ([51], p. 26) argue that ‘The most powerful professions have historically used the requirement of a high level of academic education as a primary criterion for entry into the profession’. They also highlight that:
‘University training programs have been the most pertinent vehicles for providing codified professional knowledge and of testing potential entrants to verify they have obtained a basic grasp of the body of knowledge of the respective professional discipline’ ([51], p. 26).
As an advocate of the professional model, Stone recommends that ‘a college or university degree (or comparable educational qualification) to be adopted as the basic educational requirement of a professional police officer’ [52]. Providing the Government of the UK learns its lesson from cutting funding in Nursing and ensures sufficient financial support for all new Policing students, HEIs could be able to train 5000 new police officers a year, based on last year’s intake into the police force [51]. It is expected that ‘By 2025 British policing will have risen effectively to new challenges and will continue to be highly regarded by both the British public and internationally as a model for others’ ([52], p. 5).
The recommendations of Neyroud Report (2011) [53] ‘represent a fundamental overhaul of existing practices’ ([53], p. 67). From these recommendations, Stanislas [54] focuses on four specific recommendations ([53], pp. 47-48) such as ‘full professionalisation of the police which in his view is critical to improving its status, clarifying areas of accountability and meeting public expectations’; establishment of a single professional body responsible for important aspects of policing, which will set national standards for entry and progression within the service, in particular a new pre-entry national qualification and a new qualification for police managers; and finally that ‘the police training and education be devolved outside the police training establishment and delivered in partnership with HEIs and specialist police training centres’ ([53], p. 67).
In 2012, the College of Policing was established as a national professional body to improve police training in England and Wales drastically. There were arguments from academics and professionals for acknowledging policing as a graduate level occupation similar to doctors, teachers, and social workers who need a relevant degree to be qualified for their job [55, 56, 57, 58, 59, 60, 61]. From this realisation, the then Home Secretary, Theresa May, was in favour of this major shift and asked the College of Policing to develop a qualification framework for police officers to get a relevant degree.
David Cameron’s coalition government (2010–2015) approved this qualification framework. Wood ([62], p. 1) argued that the development of the PEQF was ‘Bolstered by the recommendations of Neyroud [53] and Winsor [63], both of which promoted closer collaboration between policing and academia’ in their reports of two government reviews entitled ‘Review of Police Leadership and Training’ [53] and ‘The Independent Review of Police Officer and Staff Remuneration and Conditions’ [63].
4.3 Partnership between forces and universities
In building the evidence base in policing, it is very important to ensure that police officers can develop their skills, build their knowledge and expertise about what really works in policing and crime reduction so that they can put it into their practice [64, 65]. Through the partnerships, the police forces will be trained by the experts from a wide range of academic disciplines including policing, criminology, criminal justice, forensics, law, psychology, and cyber security from HEIs [66]. They will be able to learn new skills, understand more about why crimes are committed, the relationship between crime and society, and use that evidence in innovative ways in their policing practice. However, the aim is to establish long-term partnerships between police forces and HEIs to deliver a recognised body of knowledge, evidence, and expertise on policing and crime reduction, and have the potential to meet the needs of the challenging environment through innovative solutions [67, 68].
There are many partnerships across the UK between a police force and a university or a consortium of universities with several forces. Universities or consortiums need to bid to obtain a contract to provide education and training programmes, for example for 5 years with a force to provide their services. A force cannot award the contract to a local university without a competitive bidding process. Several successful procurement processes have already been run. So, for instance, Cumbria Constabulary and Lancashire Constabulary went for a joint tender and the contract was awarded to the University of Central Lancashire. Liverpool John Moores University obtained a partnership contract from Merseyside Police. It established the Liverpool Centre for Advanced Policing Studies (2015) and provides teaching to the trainee officers of their local force. University of West of England received the PEQF contract from Avon and Somerset Constabulary while the University of Northumbria runs similar programmes for Durham Constabulary and Northumbria Police [69, 70].
Some universities individually received contracts with several forces while some HEIs formed consortiums and are in contract with several forces. For example, Staffordshire University is running the PEQF programmes for four forces in the Midlands, that is Staffordshire, Warwickshire, West Mercia, and West Midlands, and their academic staff travel to the forces’ headquarters [71]. The Police Education Consortium has been formed by four universities, namely the University of Middlesex, the University of Cumbria, Canterbury Christ Church University, and the University of Portsmouth, which is in a contract with Surrey and Sussex Police and Hampshire Constabulary to run the PCDA programme and DHEP.
In November 2019, Babcock International, an engineering organisation in the security and defence sector, which also offer recruitment services, received the £309m worth contract valid until 2028 as the learning partner of the London Metropolitan Police [72]. They formed a consortium with four universities namely Brunel University London, the University of West London, the University of East London, and Anglia Ruskin University to teach the newly recruited officers of the largest police service in the UK with 31,746 police officers (as of March 2020) and 25% of the budget for the police in England and Wales [73].
Regarding the current partnerships, one of the interesting observations is that only the post-92 universities came forward to develop police partnerships and run the PCDA programme and DHEP. Most of those involved such as Middlesex, Portsmouth, and Liverpool John Moores University have long-standing reputation for teaching and researching policing, criminology, and criminal justice. However, some HEIs without an established presence in teaching and research in policing, criminology, and criminal justice stepped in for the PCDA programme and DHEP.
This partnership is an opportunity for HEIs to support the police services for professional development of their officers through enhanced education techniques and research-informed teaching utilising an established evidence base. It is one of the main reasons for the universities to develop their partnerships with the police forces to design, develop, and deliver these academic programmes. Undoubtedly as part of these contracts, HEIs will receive a considerable number of students as the police forces are continuously recruiting to meet their recruitment targets. In addition to regular recruitments, the Government promised (publicly known as ‘Boris 20,000’) to recruit extra 20,000 new police officers [74], which is again an extra boost for both the forces and HEIs. In fact, the partner HEIs will receive several cohorts of student officers throughout the year and they need to be flexible concerning the start date of the cohorts and compromise their traditional term dates to accommodate several intakes in an academic year.
The PCDA is a 3-year apprenticeship degree programme titled BSc (Honours) Professional Policing Practice for someone who has already completed their A levels or BTEC at level 2 and 3 or who are the former members of the Armed Forces. To enrol for this work-based learning programme where the uniformed students will study alongside their operational duties, one needs to join as a police officer first and then pursue the 3-year course as apprentices and will progress from academic level 4 to level 6 (degree level) when student officers need to spend 20% of their contract hours for their academic learning. However, this is a requirement set out by the College of Policing, which is different to the funding rules within the PCDA set by the Education and Skills Funding Agency (ESFA). This 20% protected learning time has been seen very much as an abstraction issue rather than how it is as an ‘investment in learning and development’. This 20% has become a significant barrier in the development of some programmes and disproportionately influenced the design of some programmes. This again hampers the opportunity to reach the full potential and development opportunities of these programmes and partnerships.
This is an opportunity for someone who wants to earn £20,880 per annum (varied from force to force) while achieving a professional degree in government’s expenses [75]. Entry requirements also vary from force to force. However, within the Derbyshire Constabulary, the entry requirements for policing apprenticeship is Level 2 Qualification in Maths and English (Grade C/4 and above), for example GCSE, Functional Skills and a Level 3 Qualification (A-level or equivalent) equal to 64 UCAS points for anyone aged between 18 and 55 years and the UK, EU, or Commonwealth citizen with no restrictions on leave to remain in the UK [75].
The College of Policing has outlined the National Police Curriculum (NPC) for the three new routes to become a police constable under the PEQF, and HEIs in consultation with their partner force(s) develop their programme and modules in line with the national curriculum for the PCDA, DHEP, and Pre Join degree in Professional Policing Practice and obtain approval from the college [76]. Even officers and police trainers are involved in developing learning materials. However, the name of the modules may not be the same. But the overall programme and modules need to fulfil the requirements of the NPC. Williams et al. ([77], p. 260) are critical about the development of the curriculum that ‘on implementation, academia has a responsibility to develop police education in ways that it can achieve this critical feature of the PEQF’ and indicate ‘a risk of limiting the opportunities provided by the PEQF to deliver a real change to current police training unless the curriculum includes wider forms of knowledge, from the historical research on policing to the evaluative research tantamount to the “what works” agenda’. However, the NPC is very prescriptive about what should be taught and as a result of this prescriptive nature, this could prevent all the benefits of higher education being accessed by the students who undertake these programmes. This is particularly relevant where the PCDA is compared to the DHEP as same content is delivered at different levels.
As prescribed by the NPC, the 3-year programme will be divided into several phases, which is a very traditional approach to delivery. For example, at the beginning of the PCDA student officers will continue 22 weeks of learning that will follow guided practical learning with a one-to-one mentor for 10 weeks. In addition to reflective practice and formative assessment, students’ operational progression will be assessed continuously while summative assessments will be done for every module. However, it is very important to move forward from this prescribed delivery approach by adapting a more work-integrated professional practice approach [78].
Programme design and development vary from university to university. Some HEIs run the following modules for their PCDA programmes, which starts gradually some from the beginning, some during the company period when officers will learn more about practical policing with their employer and some modules when they achieve independent patrol status to become operational:
Modules: (Titles of the modules could be different offered by different universities or partnerships. For example, following modules are offered by a university of a partnership).
Year 1 (level 4): 6 modules (6x20= 120 credits): Introduction to Policing, Studying Criminology, Community Policing, Operational Policing, Vulnerability, and Reflective Practice Based Learning.
Year 2 (level 5): 6 modules (6x20= 120 credits): Policing, Operational Policing 2, Community Policing 2, Vulnerability 2, Studying Criminology 2, and Reflective Practice Based Learning 2.
Year 3 (level 6): 3 modules (2 compulsory modules and one specialist module) and a project (2x20+40+40= 120 credits): Coaching and mentoring; Professional Policing Competence; one specialist module (such as Response policing, Community policing, Roads policing, Information and Intelligence, and Investigation) (This is worth 40 credits); and Professional Policing Practice Project. (This is similar to undergraduate dissertation as the preparation towards the final End Point Assessment (EPA), which will include submission of the project and a presentation to be assessed finally. However, confirmation of permanent employment as a fully operational police constable is subject to successful completion of EPA).
Some other partnership developed the PCDA programme in slightly different way, for example Derbyshire Constabulary adopted the following 3-year programme (Table 1).
INITIAL PROFESSIONAL DEVELOPMENT
Year 1
Academic Level 4
Operational Deployment
Tutor Patrol Phase
Obtain Independent Patrol Status
CONTINUOUS PROFESSIONAL DEVELOPMENT
Year 2
Academic Level 5
Response Policing
Community Policing
Policing the Roads
Information and Intelligence
Conducting Investigations
ADVANCED PROFESSIONAL DEVELOPMENT
Year 3
Academic Level 6
Specialism from Year 2
Evidence Based Research Project
Academic Assessment
Reflective Presentation and Panel Discussion
Operational Competence Portfolio
Table 1.
Adopted from Derbyshire Constabulary ([75], online).
Currently, faculty members from partnership universities go to police headquarters to teach and tripartite review of the PCDA students in makeshift temporary classrooms. Blended learning approaches are used to provide learning support including delivering little face-to-face master classes, and making all teaching and learning materials available to students via online workbooks and reading lists. Student constables rely upon their handheld devices, that is iPads and laptops connected via Wi-Fi access at force headquarters, police stations where they are attached for their field training and also at their home as the trainee officers stay at home and travel to police headquarters and police stations.
4.3.2 Degree Holder Entry Programme (DHEP)
The DHEP is a 2-year Graduate Diploma in Professional Policing Practice programme in academic level 6. This programme is for the newly recruited constables who have a university degree in any subject except in policing. They pursue this 2-year course to learn the theoretical knowledge of policing while they in fact apply their knowledge in operational policing. The student officers recruited under the DHEP pursue work-based learning while they work as trainee officers with respective forces in various locations. They can access the online learning materials including audio-visual materials and use them at any time from any location and can engage in their academic learning activities. They earn £24,177 per annum (varied from force to force) as an officer from day one while they pursue on and off-the-job learning through this graduate diploma programme at the expense of the government during their probation period [79].
Some forces post attractive videos as part of their recruitment campaign, which outlines the recruitment process in particular how the candidates will spend half a day at the force’s assessment or recruitment centre undertaking a written test, taking part in role-play, and finally being interviewed to become a police officer [80]. Fast track detectives are also recruited under the DHEP and they follow the same syllabus except learning one or two specialist modules and spending a significant period of time at specialist departments such as CID (Criminal Investigation Department). It is understood that the forces received overwhelming response from the potential detectives for the exciting and challenging Fast-Track Detective Development Programme [81]. However, confirmation of permanent employment as a police constable is subject to the successful completion of the course. Structure of this graduate diploma programme is described below:
Modules: Total of 6 modules (may run throughout the course), each module weight 20 credits and requires 20x10= 200 study hours.
Year 1(level 6): 3 modules (3x20 credits): Policing in Context; Communities, Intelligence and Information; Law, Policy and Practice.
Year 2 (level 6): 3 modules (3x20 credits): Ethics and the Policing Professional; Advance Policing Skills; and one policing in practice specialism module from the following Response Policing; Community Policing; Roads Policing; Information and Intelligence; and Investigation. Finally, the completion of a portfolio as an evidence of Full Operational Competence is required to become a fully operational police officer.
4.3.3 Pre-Join Degree (PJD) programme
This PJD programme is a standard 3-year university degree programme entitled BSc (Hons) in Professional Policing. The prospective police officers pursue this course at their own expense and upon successful completion of the degree they can apply to join any police force in England and Wales. They need to learn theoretical knowledge of policing, criminology, and criminal justice as well as various aspects of operational policing over 3 years.
Year 1 (level 4): 6 modules (6x20 credits): Understanding the role of a police constable; Policing, decisions and ethics; Policing vulnerability in contemporary society; Police Legislation; Information and Intelligence; Academic skills and applied social sciences.
Year 2 (level 5): 6 modules (6x20 credits): Operational policing; Professionalism, Values and Standards; Vulnerability and risks; Specialist procedures; Academic research skills; Criminological concepts.
Year 3 (level 6): 6 modules (6x20 credits): Coaching and mentoring; Response policing; Community policing; Specialism—Police investigation; Specialism—Information; and Intelligence; Dissertation.
4.4 Cultural change
The police role was heavily criticised in dealing during Miner’s strike (1984-85), Brixton riot (1981), Hillsborough tragedy (1989), and Stephen Lawrence’s murder (1993). Reiner [13] noted that despite initial opposition of the establishment of the Metropolitan Police by the London working class, the police achieved legitimacy over 100 years (1856–1959) through ‘policing by consent’, but he argued that the police again lost public’s trust and confidence for its politicisation in 1960. It again deteriorated after the Metropolitan Police was labelled for being institutionally racist by Sir Macpherson in his report [82] on Stephen Lawrence’s murder and the Metropolitan Police’s total failure in dealing with the investigation was exposed in this unprovoked racial attack in South London.
In the context of strong criticism of police application of unreasonable force against the protesters in the 1960s and 1970s, the Royal Commission on Criminal Procedure in its report (1981) proposed specific legislation and code for police work to ensure its accountability and as a result the Police and Criminal Evidence Act 1984 (PACE) was introduced with specific codes for police conduct. Following the Brixton riots (1981), Lord Scarman Report (1981) identified socio-economic factors for violent protest. Policing became a political agenda when Tony Blair declared during the 1997 election campaign that labour would be ‘tough on crime, tough on the causes of crime’. He introduced the ‘Crime and Disorder Act 1998’ just after the election that included Anti-Social Behaviour Order (ABSO) in section 1 and later brought the ‘Police Reform Act 2002’.
In answering the question ‘Why degree level education?’, the College of Policing justified that the existing recruit training (IPLDP) was not designed to meet the demands of policing to analyse and solve the complex problems where officers have to make difficult decisions and take responsibility for their actions. However, the serving officers mostly learn to do these on the job with additional training. The new academic professional qualifications ‘will give probationary officers the best chance of reaching the level of expertise found in serving officers’ ([13]: Online). The college further explains the nature of the new programmes:
‘The empathy, compassion and common sense needed in policing will be supported, not replaced by the new programmes, and will allow officers to get recognition for the complexity of their job’ ([13]: Online).
It is expected that through the higher education programmes, police education and training will make expected changes for developing professionalism with the policing practice and make a cultural shift [83, 84, 85].
4.5 Challenges of newly introduced academic programmes
As has been mentioned, the idea of introducing academic qualifications for policing was challenged by the Chief Constable of Lincolnshire in July 2019 arguing that it will put an extra burden on the police forces due to time and resource constraints [86]. The review petition relied on the academic argument of Brown ([8], p. 9) that ‘the current body of research evidence is methodologically weak and there remains a gap in the literature for the provision of a convincing, unambiguous empirical case demonstrating the value added by graduates to policing’. The High Court rejected the application for permission for judicial review of the PEQF in December 2019. However, it is still in a very early stage to determine the success and failure of the three newly introduced routes [87, 88].
Several HEIs started running the College of Policing’s approved 3-year Pre-Join degree BSc (Honours) in Professional Policing degree programmes from September 2019. As it is run as a regular academic programme by the universities, licensed by the College of Policing that approve the universities’ programmes in line with the syllabus given by them, it will be easier to successfully run the course. But it is difficult for the HEIs to recruit enough university staff with experience of operational policing, and knowledge of policing, criminology, and law to run this degree programme.
There is no alternative for the student police officers to learn both on-the-job and off-the-job as they need to learn the operational aspects, that is the real-life policing as well as theoretical aspects of policing to apply the knowledge to the relevant police work [89]. It is anticipated that there is a division of labour between the HEI and the force, although how this is implemented in practice varies across the country. However, in summary, the force is expected to deliver basic training such as how to handcuff suspects while the HEI is to provide the evidence base and critical arguments concerning their efficacy. It is rather like a driving theory and practical tests that one needs to successfully go through to be allowed to drive vehicles on the road to ensure his/her own safety as well as the safety of the other road users. Therefore, the nature and scope of the PCDA and DHEP courses and learning are characteristically different from regular degree courses as these involve students gaining knowledge, acquiring skills, and developing attitudes and behaviours to prepare themselves to face the challenges of modern-day policing.
As a profession-oriented course, the PEQF programmes are aimed to prepare professional police officers and one of the major challenges the teachers face is in bringing ‘the field into the classroom’ and ‘the classroom to the field’ [90]. Incorporation of practice is essential in professional degree courses. It is proven that successful professional courses need to integrate theory and practice to bring the field into the classroom as well as take the classroom into the field [91]—so that student officers can learn theoretical knowledge about crime and policing as well as legislation and procedures in the classroom and return to field learning at their units. Following application of their knowledge in practical policing, students can pursue further learning online and come back to the classroom. According to Wrenn and Wrenn [92], then they share their experience with their tutors or trainers and ask, ‘How did you handle that?’ Following further discussions the teacher can present more scenarios and ask them, ‘What would you do in a case like that?’ ([92], p. 259). The trainee officers find this method is really helpful and effective for learning as Boud et al. [93] suggest that when an example from one\'s own experience is shared learning occurs. Therefore, emphasis on experience is hugely significant rather than mere listening. As a result, ‘the theory becomes clearer and more easily applicable to the real cases they face in a practice situation’ ([92], p. 259).
Practice needs to be embedded in knowledge only Pre-Join Degree in Professional Policing, however, critical reflective thinking also needs to be embedded in the overall academic programmes based on the PEQF [10]. As degrees in Professional Policing Practice are professional and service-related studies, the main focus is not only to learn theories but also to learn how to apply the theories in practice. Hutchings ([94], p. 1) argues that ‘What’s at stake is the capacity to perform, to put what one knows into practice’ to help students develop as professionals who are able to deal with real-world problems [95]. In learning programmes such as police education, the ability to gain and utilise knowledge from practice [96] and skill building [97] is pivotal as the best learning environment is created when experience and knowledge are integrated within a course such as the DHEP and PCDA.
Experience of police training in various parts of the world shows that the police students prefer on-the-job training to academic studies such as driving police vehicles, shadowing patrol teams, or practising situations for quick and better understanding of practical policing [98]. Therefore, bringing field experience to the classroom of the DHEP and PCDA learners is mandatory as the popularity of reality TV shows proves that people prefer watching other\'s lives unfold. Enhanced learning models should be applied in police training so that learning can be made relevant, useful, and effective by bringing the real world of policing into the classroom. This will create an opportunity to stimulate the innovative, common sense, and dynamic learners as McCarthy [99] emphasises on educating the ‘whole brain’ in addition to educating all types of learners. Most importantly, student officers\' voices should be heard and their views should be taken into account in planning, designing, and delivering these academic programmes. Their learning expectations should also be considered as the potential police officers consider policing as a job as practical, exercised on the street, close to people, and with hands-on duties rather than sitting behind an office desk [100]. At the same time, it needs to be appreciated that the aim of the newly introduced three routes of police recruitment is to ultimately help to develop police studies as a well-established academic discipline.
Wrenn and Wrenn ([92], p. 258) argued that ‘Educators in professional or service-related fields desire their students not only to learn theory and understand why theories are important but also to learn how to apply the theoretical frameworks in practice’. This is absolutely applicable in the case of teaching and learning in Professional Policing Practice degree programmes. Lecturers and police trainers should assist the students to learn how to apply their knowledge and skills in practical policing and help them to develop their attitude and behaviours accordingly. Integration of practice and theory is the central consideration of all learning [93] and students learn by doing and solving problems in real-life contexts [101, 102]. Rief ([103], p. 53) noted that students retain ‘10% of what they read, 20% of what they hear, 30% of what they see, 50% of what they see and hear, 70% of what they say and 90% of what they say and do’. A study by Kramer et al. [104] found that students taught by a practising faculty member scored higher as Good and Schubert [105] argue that they are able to relate theory to practice effectively. Genuine knowledge, understanding, and skills derive not from abstract thoughts, but rather by integrating thinking and practical application of the same.
Undoubtedly an active learning environment enhances the integration of practice and theory in the classroom involving students [106]. However, a substantial amount of materials provided for these academic programmes is self-learning materials access through Virtual Learning Environment (VLE). It is, therefore, essential to make the online learning materials more interactive as most of the time the trainee officers have to engage with their online materials. These also need to be presented in an organised way so that student officers from diverse academic backgrounds find the provided materials user-friendly and to help them to bridge their knowledge and skill gaps to provide a comfortable and enjoyable learning experience.
Because of the nature and structure of these programmes, different blending learning approaches are useful as the students can access their learning materials at any time from anywhere [107]. Apart from online live sessions, all electronic course materials could be downloaded in their devices and used offline. However, for online access they would require internet connection whether they are at their homes or workplaces (police headquarters or police stations). In practice, some may struggle to have uninterrupted broadband access and some of them struggle to obtain proper connections at police premises due to existing restrictions.
In Australia, Charles Sturt University works with the NSW Police Academy where university lecturers and experienced police trainers teach and run university courses and officers are awarded a degree by the university. Police trainers need to involve students in the classroom and keep in mind that an active learning environment enhances the integration of practice and theory in the classroom by engaging students. As part of online learning and face-to-face master classes, students need to be involved in various activities as activities allow students to clarify, question, consolidate, and appropriate new knowledge [108]. However, although experience may be the foundation of learning, it does not automatically lead to it [93] and experiences alone is not enough for learning to take place and it requires a theoretical base.
Unlike previous contents for police training, the modules developed for the PEQF programmes highlight vulnerability, legitimacy, equality, diversity, and ethical issues along with the National Decision Model [109]. These are the changes that highlight transformation of police education, in particular to prepare the newly recruited officers with necessary knowledge and skills to fulfil demands of time as well as to develop their skills, attitudes, and behaviours to bring them outside the traditional rank and file mindset and police culture.
5. Major challenges
5.1 Leadership of the partnership
One of the key issues about the nature of partnership related to the leadership could be a challenge. There could be debates whether this academic and professional partnership should be led by HEIs or the police forces. In most cases, these are HEIs which lead the partnerships so that they can comply with the national Apprenticeship Standard for the PCDA programme [110]. Some forces may choose co-delivery approach and some may decide for their programme to be the police force led where they will develop course materials in line with the NPC and will be approved by the partner HEIs. In those cases, the main workload will be on the partner forces to implement the programme. Questions may be raised about the quality assurance and student learning experience of this type of programme. Within the HEIs, there are discussions whether the PCDA, DHEP, and Pre-Join degree programmes should be led by a pure academic or a practitioner-turned-academic as they are involved in curriculum design, development of course materials, coordinating modules and assessments, and running the overall programme. However, they need to decide on the availability of people with relevant knowledge, skills, and experience. The differing partnerships may also raise issues in regards to the uniformity of delivery across the country.
5.2 University faculty recruitment
There has been a reduction in the number of police officers, trainers, and training facilities [111, 112]. To address the shortage of police officers, when the Prime Minister Boris Johnson announced in 2019 to recruit 20000 new officers for the police forces across the country, neither the police forces, nor the HEIs were prepared although some universities in the UK have a long-standing working relationship with the police service as they helped the forces in developing their training programmes ([54], pp. 62-63). Though the College of Policing welcome the policing pledge to address the shortage of police officers by recruiting 20,000 new officers, but warned of ‘logistical challenges’ at the time to achieve the goal, following the closure of police stations across the country as well as concerns over the lack of training instructors [113]. In particular it is argued here that there is a scarcity of academics in policing and practitioners-turned-academics into policing as there is a shortage of suitable teaching staff. Against the advertisement for recruiting faculty members, the response rate is very low. HEIs need a good number of staff to run the PCDA programme and DHEP.
As part of the role, the academic staff, that is programme leader, module leaders, and work-based tutors and assessors need to travel to the police forces’ premises. Therefore, it is a mandatory requirement for them to go through level 2 Non-Police Personnel Vetting (NPPV) or Disclosure and Barring Services (DBS) process by the relevant forces. Some academics may not be necessarily willing to go through the process, which will ultimately limit their access and contribution to the police headquarters, police stations as well as specialised software such as Aptem as access is strictly maintained by the forces. Students will have access to the College of Policing’s Managed Learning Environment (MLE) for further reading such as Authorised Professional Practice (APP) in addition to HEI’s VLE, for example BlackBoard, Canvas, or Moodle for online learning materials.
Some HEIs are in favour of recruiting former police officers and in some cases officers from the same force they are in a contract with as they know the force well. While other HEIs are in favour of recruiting pure academics and practitioner-turned-academics to lead the programme and modules by ensuring academic standards. They argue that police trainers are enough to teach the practical aspects of policing and, therefore, ex-cops are not necessarily important to link theory into practice. In the context of police education in the USA, Sherman [114, 115] recommends based on a 2-year national study that full-time faculty members with PhD should be employed, not to make prior criminal justice experience as one of the essential criteria for recruiting faculties to run the academic programmes. However, there is a set of factors, as we are discussing in this chapter, for understanding the processes linking demands for further development in police education and practices [54].
As an example, Babcock International recruited lecturers and tutors, a mixture of former police officers and traditional academics, to run the PEQF programmes in conjunction with the consortium universities in London. Some universities are still in the process of recruiting programme leaders and module leaders and are facing difficulties due to lack of suitable candidates. Moreover, other universities also recruit teaching and research staff with similar backgrounds to run their existing programmes in criminology, policing, and criminal justice as this is a rapidly expanding subject area. Jones ([116], p. 232) noted that ‘in 2015, the Universities and Colleges Admissions Service (UCAS) identifies 48 higher education institutions (HEIs) in England and Wales offering undergraduate policing degree programmes’. HEIs also need to recruit work based tutor and assessor to help the module leaders and police trainers in particular to do tripartite reviews of the PCDA and DHEP students and to provide them pastoral support.
5.3 Tripartite engagement and collaboration
Pursuing an effective tripartite review involving three parties, namely the student officer, university, and the police force (employer) is a major challenge for the successful continuation of the PCDA. Although there is no such mandatory requirement for the DHEP, it will use the best practice of the PCDA to pursue tripartite review. Academic staff and work-based tutor-assessors face practical difficulty to travel to various locations of police units in the force area, where the student officers are attached, to run face-to-face tripartite review. Throughout the tripartite engagement and collaboration, the complex process of quality assurance to satisfy both HEI regulations and College of Policing requirements is a real challenge in addition to meeting the requirements of the Institute for Apprenticeships and Technical Education that approved the PCDA programme for delivery in March 2018 and Office for Students [117]. The effective relationship between university staff (i.e. lecturers, module coordinators, or programme leaders) and police trainers is very important for this tripartite engagement and collaboration.
5.4 Diversity and recruitment
Since Macpherson’s report published in 1999, there is still significant challenge for the police service to diversify its profile. The expectation of the NPCC is that by 2025 policing will be a profession with a more diverse workforce which mirrors the UK’s population. While there has been a large increase in the numbers of female officers over time, there are still ongoing issues in regards to the recruitment of BAME staff and in particular black police officers. For example, in London, the Met head of recruitment, Clare Davies [118] commented, “If we continue even with the great progress we’ve made it would take over 100 years to be representative” of London. Currently, 58.4% of black people live in London, a population of between 1.1 and 1.2 million. Black people make up 15.6% of London’s population whereas they number only 3.3% of metropolitan police officers. The PEQF routes should be an excellent opportunity for this community as for black Londoners, on average in 2016, 8% of first-year undergraduates across the UK were black. In the same year, London has the highest proportion of black students, making up 17% of students overall [119]. However, initial impressions from recruitment outside of London are not positive as the initial cohorts do not reflect this aspiration for diversity.
Although, the Macpherson’s report recommended the recruitment of more black officers and this has been followed by further diversity initiatives, it is still the case that either members of the BAME community are not able to satisfy the criteria and successfully go through the selection process or more likely, are not willing to serve in the force. Nevertheless, forces are still encouraging application from under-represented black and ethnic minority candidates to apply to become a police constable [79]. Apart from diversity in recruitment, interestingly some forces received a tremendous response for fast track detective roles [120].
5.5 Higher education sector-wide engagement
According to the Guardian’s list of top universities, no university in the top 20 applied to deliver the PEQF programmes. In London, all the top-ranking universities did not show any interest to be involved in running PEQF courses although London School of Economics and Political Science (LSE), Kings’ College London, and the University College London (UCL) lead policing and criminology research globally. Only HEIs such as the University of East London, the University of Law, the University of Cumbria (London Campus), and Coventry University (CU London) offer pre-join degrees in policing.
5.6 Academic contact hours and blended learning approach
While designing learning materials for police studies to teach student officers, the ‘diverse range of operational challenges’ identified by Reiner and Newburn need to be considered [121]. In designing, developing, and delivering the academic programmes, the ‘peculiar features of late-modern society’ [10] need to be underscored for ensuring equity and social justice as ‘one-size-fits-all’ blueprints are not applicable in the changing world of policing. Emerging communication technologies and media indeed brought changes and complexity in police work [122].
In practice, academics and students may find it insufficient to spend only 20% of working hours towards the academic degree while students in regular university programmes are required to study and learn throughout the week. Although it is appreciated that the PCDA and DHEP are perfect examples of blended learning, the syllabus given by the College of Policing is vast and students need to work more and more to learn the course materials, given the fact that most of the materials are online and that involves self-study, although they can contact their module coordinators or trainers at any time for further understanding or clarifications. Moreover, the PCDA programme and DHEP, as technology enhanced blended learning programmes, face significant challenges as there are no PEQF-specific textbooks available although Bryant and Bryant [123] suggest that Blackstone’s Handbook for Policing Students 2020 ‘Covers the learning requirements of all major entry routes into the police service, including pre-join degree courses and degree apprenticeships’.
In particular, the students may struggle to understand legislation and interact more in workshops. It should be considered that the PCDA and DHEP students are not learning to pass their assessments or to obtain university degrees, they will need this knowledge throughout their policing career as the constables are independent decision-makers who attend crime scene, instantly gather information and intelligence, and analyse and make decisions on their next steps to tackle the situation. In doing that, they need to continuously consider the National Decision Model (NDM) as well as National Intelligence Model (NIM) with an emphasis of ethics at the core of the decision-making process as the officers are accountable for their actions and may be liable for any wrongdoings or mistakes for which they may face departmental proceedings or even lose their jobs. Therefore, they need to properly understand the legislation, policy, and guidance such as Police and Criminal Evidence Act 1984 (PACE) and its codes that outline clear guidelines for various police work.
5.7 Multidisciplinary professional understanding
Officers need to understand the paradigm shift of applying their own judgement, common law fairness, and Wednesbury reasonableness to specific legislations such as the Human Rights Act 1998, which makes it mandatory to be considered in any police actions with a minor exception in cases related to counterterrorism actions. Savage [124] argues that the 1998 human rights legislation that incorporated the European Convention on Human Rights has significance for all institutions in the UK but particularly for the police. Officers are required to understand the English Legal System and procedures in the criminal justice system such as how the Magistrates Court and Crown Court operate and what role the defence and prosecution play to ensure justice. Students of Law degrees study the laws and legal procedures throughout their programmes. However, the student police officers will have limited time to cover relevant laws, policies, and guidance from few classroom-based lessons.
6. Future of police education
6.1 Progress made so far
One of the major achievements of the PEQF is to shift the main focus of the initial policing training from rigorous physical training to developing knowledge, skills, attitude, and behaviours in addition to the empathy, compassion, and common sense that the British police officers already have. Through the academic programmes, personal and professional development of an individual officer will continuously focus on ethics at the centre of their learning and preparation for their professional career. As a result, police practice will be able to put in first place mandatory consideration of human rights and respect for equality to maintain the pride for democracy and the rule of law in the diverse British society. It is appreciated that police officers, as the law enforcers, need to be physically and mentally fit to perform their challenging duties efficiently. They necessarily need to learn drills, first aid, and law; however, the PEQF will put less emphasis on quasi-military style drill and parade. Rather they will go through essential Officer Safety Training (OST) before they become operational.
The police forces should afford a residential accommodation for the trainee officers in a purpose-built campus with technology-facilitated master classrooms, small classrooms for seminars and group discussions, and assessment centre with required facilities for student officers who need additional support. This is also essential to have the facilities for physical training, arms training, safety training as well as gym, sports centre, and hydra simulation suit to facilitate immersive learning. Should the students reside in the police education premises, they could have time and space for protected learning and they could access library facilities in addition to existing access to the HEI’s library and online resources.
To fulfil the demands of the twenty-first century, successful implementation of the PEQF will assist the society in achieving sustainable development goals (SDGs) related to peace and prosperity through reasonable policing by graduate officers who will be able to make informed decisions by applying their cognitive, affective, and psychomotor skills. As the UK historically led the development of professional policing, if the academic professional qualification programmes based on the PEQF are successfully implemented (as the first PCDA cohort is expected to be qualified in 2021 and the first Pre-Join Degree students will be graduated in 2022), this model of ultimate police education will be followed in other parts of the world especially where countries are seeking effective police reform to overcome the crises of legitimacy and efficacy. However, this model of new policing will bring a significant change in police occupational culture, which has been blamed for many decades for lack of police legitimacy. Savage [123] describes policing as a performing art and its paradigm shift as a process of reform.
Despite the Government of Australia has not recognised policing as a graduate level occupation, the NSW Police Force (NSWPF) has developed a unique programme in partnership with Charles Sturt University (CSU) where the prospective candidates first need to complete the University Certificate in Workforce Essentials (UCWE), a foundation level programme [125]. Then they go through the recruitment process to be offered a police recruit position and enrolment for the CSU-run Associate Degree in Policing Practice (ADPP) at the NSW Police Academy. CSU’s School of Policing Studies is located at the NSW Police Academy to jointly run this course where student officers need to reside at the Academy throughout the week [126]. This 2-year programme also includes a field observation placement in Year 1 that will follow attestation and then the students will pursue the Year 2 studies as probationary constables. However, their employment as police constables will be subject to successful completion of the Year 2 [127].
The Bangladesh Police Academy, Sardah, which was established in 1912 in British-ruled Bengal, still runs the fully residential basic police training [128] with significant emphasis on physical training such as early morning exercise, morning parade, afternoon parade, horse training (for the probationer Assistant Superintendents who join through the national civil service) and less focus on academic learning, arms training, safety training, and driving lessons. However, since 2008 probationer Assistant Superintendents of Police receive a Masters of Police Science degree from the University of Rajshahi upon successful completion of this police-led training. The UNDP-DFID sponsored Police Reform Programme in Bangladesh failed to bring a paradigm shift in police training and culture due to constant opposition of civil bureaucracy and lack of a strong political will as the policy-makers want to keep their strong control over the force [129]. Similarly, many police organisations in the developed and developing world have their own police academies, police training centres such as Louisiana State Police Training Academy, USA that has a residential academy in Baton Rouge with a massive training area including Joint Emergency Services Training Center [130].
The physical learning environment is also crucial for an enjoyable learning experience. In practice, it is argued here that the lack of adequately equipped on-site residential facilities for the uniformed PCDA and DHEP students may have a negative impact in their learning as well as their team spirit as the members of a disciplined force. In this aspect, more could be learnt from the other professional qualifications offered by the universities and should be adapted for these programmes.
6.2 Leadership development
Developing Police Leadership is one of the crucial priorities for the twenty-first century’s policing across the globe including the UK [131]. The apprentice-turned-graduates under the PCDA programme, officers with a graduate diploma under the DHEP, and policing graduates-turned-officers are qualified enough to be promoted in leadership roles in 43 forces in England and Wales in the days to come. Although there are five entry routes into policing, namely constable, police staff, Fast Track to Inspector, Direct Entry at Superintendent, and Direct Entry at Chief Constable (for eligible overseas chief officers), most of the senior officers begin as a constable and follow the traditional route to be promoted to lead the forces. Undoubtedly the Fast Track for both new candidates and experienced officers as well as Police Now, which runs the National Graduate Leadership Programme and the National Detective Programme, will play a pivotal role in creating future leaders. However, the question for debate is ‘will the NPC really allow this level of development, or do these programmes set the foundations on which to build leadership more strongly than current training provision?’ which is beyond the scope of this chapter.
According to Bergan and Damian ([132], p. 8), ‘[e]ducation is about acquiring skills but also about acquiring values and attitudes’ which are essential characteristics for leadership in an ethically and economically diverse society’ that also needs a ‘diverse student body’ ([132], p. 9). In the same vein, Bok ([133], p. 19), a former President of Harvard University, emphasises that ‘Our institutions are now the leading sources of all three of the most important ingredients for progress and prosperity in modern societies: new discoveries, expert knowledge and highly trained people’. He further argues that ‘universities are the essential institutions for preparing leaders throughout society. Every politician, every civil servant, every judge, doctor, priest and virtually every top business executive will attend our universities. Although this often goes unnoticed, more and more of these leaders are also returning to universities in mid-career for further education’.
Therefore, university education will help the forces to have more prudent police leaders who can bring diversity of thought and perspective into policing. They should pursue continuing professional development courses throughout their career to obtain up-to-date knowledge and prepare them to lead the forces and achieve legitimacy and set examples for the world. The College of Policing’s Leadership Review ([134], p. 31) recommended to ‘Create a new model of leadership and management training and development which is accessible to all within policing’. It has also echoed the Peelian principles of 1829, which are still relevant for public approval of police work as it states:
‘From the origins of British policing in the 19th century, an emphasis on preventing crime was established as the most important duty of the police, along with the notion that securing public approval and cooperation are fundamental to achieving police objectives’ ([134], p. 15).
Leadership is the one of the keys for an organisation to be efficient, effective, and successful in managing people and achieving goals. Bowling et al. ([135], p. 28) argue that ‘The police are supposedly a “totalizing institution” with a “chain of command”’. Therefore, this is very important for the police forces to develop well-prepared future leadership so that they can lead their respective forces. According to the College of Policing ([134], p. 6),
‘The ideal police leader is driven by the core values of policing, seeks out challenge and is quick to adapt. … This is a leader who empowers, trusts and supports every individual to succeed among their peers, within their teams and across their organisations; who copes with the challenges of emerging crime and public safety issues; who values difference and diversity; and who readily accepts personal accountability while retaining the trust of communities’.
6.3 Pedagogical aspects
Generally, police education has been based on a top-down, instructor-led form of teaching by focusing on a student officer’s technical competencies [5]. These approaches are contrasted with the mainstream higher education pedagogies, that is learner-led participatory teaching and learning where critical thinking and innovative ideas are the keys to success [2]. However, very little has been known from research regarding the pedagogical impact of different educational and training pathways into policing [136]. In this light, we are hoping to see wider discussion on the relationship between the NPC and higher education elsewhere between academics and practitioners [136, 137, 138, 139].
In the professional contexts, the police officers’ learning must be followed by reflective thought and internal processing that links the experience with previous learning as learning takes place within a cycle of action, reflection, and application [140]. A study on graduates from a professional graduate programme of Social Work found that class work had not adequately prepared them for real-world practice [91]. Failure to incorporate knowledge in a relevant and meaningful way creates a barrier for effective learning. Practical examples help the learners to understand and apply theories from the textbook to real situations, which enhanced their learning experiences. Similar views were expressed in The Relation of Theory to Practice in Education [141] that content knowledge should not be remote from practical issues. In the initial stage of academic police education programmes, learning may be found difficult by fresh students due to the lack of experiences. However, examples from their earlier life could be created and delivered through a virtual learning environment to assist the trainees in understanding the contexts and link with the theories. They should be given the opportunity to deal with real-life scenarios as student police officers who are too afraid to test their abilities will probably be worried police officers, which is not expected at all.
6.4 Interpersonal communication and critical thinking
As a professional course, interpersonal communication skills including critical thinking are very important in police education [142]. The nine Peelian principles of policing are the main mantra of policing, which suggests police officers are citizens in uniform and they cannot succeed without the support and approval from the community [143]. Throughout the curriculum of the professional education programmes, there should be an effective structure for teaching essential interpersonal skills so that student officers get a solid foundation, which enables them to remove some of the barriers between the police force and the public. Initial training through academic programmes builds an essential foundation for new officers because they need to master communication skills before they execute tactical and legal tasks in practice.
Effective policing occurs when police officers and members of the public become partners to create safe and crime-free communities. This partnership requires well-prepared police officers who display not only strong technical capabilities but also interpersonal skills. Therefore, police forces as the law enforcement agencies must train their officers on how to interact effectively with the public and work with them. In the professional setting, technical and interpersonal skills help the offers to perform their police work well.
Police officers face unique challenges and critical discourse as part of their role and they need to constantly reflect on their learning and experience to overcome the situations successfully. It is therefore a key focus of the PCDA and DHEP to make the officers critical reflective thinkers and students reflect and write their reflective journals throughout these work-based learning. There is a pressing need to incorporate the practice into degree programmes for effective learning and developing skills as Hornyak et al. [144] suggest that people learn best from direct experience with guided reflection and analysis. It is also essential for the best student learning experience and to develop necessary knowledge, behaviours, and skills for the student officers to become fully operationally competent police constables.
According to a recent study [145], students who are studying police studies at HEIs quickly assimilated a police identity, which affected their attitudes and behaviour. For fulfilling the potential of the PEQF, police services need to embrace, promote, and enable their police officers to become reflective practitioners through critical thinking and policing must be a reflective practice in the fullest sense [62]. If the recently developed academic police studies programmes are able to provide interpersonal communication skills and critical thinking, only then HEIs will be able to provide radically transformed and well-equipped policing degrees for the better future.
6.5 Policing in emergencies
In times of crises or emergencies, there are more constraints imposed on the police forces, for instance, the recent COVID-19 pandemic restricted individuals’ movements and mass gatherings. As a result, education and training programmes have to be put on hold advised by the College of Policing as the situation demanded the forces to deploy more officers to support the operations throughout the country, to such an extent that the Metropolitan Police Service requested the retired officers to come back on a paid or unpaid role and the officers who are approaching their retirement age to not leave the force [146]. Again, due to the emergency situation and imposed restrictions, student officers have been grappling with different problems, for example, staying at home and even looking after some family members, having less time to engage with their ongoing courses. In some cases, they have been struggling to connect with stable internet connections to access the virtual learning environments, in particular during their assessment day to participate in exams or submitting their work on time. In the changed circumstances, they have to sit for online examinations, in some cases for a fixed 2-hour assessment in a 24-hour window. There were concerns about these exams\' compatibility, credibility, and integrity as there was no physical surveillance and learning materials might be available to them during these exams. Although the PCDA student officers were at the very beginning of their academic learning, still there was a pressure on the forces due to the crisis to deploy them operationally after completing their safety training and public order training.
7. Conclusion
Incorporating practice into professional learning is essential as Clapton and Cree [91] suggest to integrate theory and practice to bring the experiences of the field into the classroom as well as take the classroom into the field. It is commonly accepted that experience is a great teacher; however, it cannot replace a classroom, for example for learning law and legal procedure, and vice versa. To find a balance between theory and experience, similarly in between classroom and practice, the professional policing practice needs to be embedded in its entirety in the Pre-Join degree, PCDA programme, and DHEP. Policing is a life-long learning process; indeed it is a part of the professionalisation agenda, and to ensure this life-long learning to happen the police should be a learning organisation [147, 148, 149, 150, 151].
Recently introduced, these three academic professional programmes are still under experiment as HEIs are running the programmes for the first time in partnerships with the police forces. HEIs and police forces need to learn from their partnerships through different approaches and efforts of ‘trial and error’ to find better ways to prepare future police workforce and they must work out their ways to develop effective partnerships to learn from each other to be successful in achieving the goals of the ‘Policing Vision 2025’. Then this model of partnership for providing police education can be a beacon for other police organisations around the world as the Leadership Review ([134], p. 5) suggests that many around the world envy the British police service and respect it ‘for its strength of purpose and public service ethos’. Especially Commonwealth countries such as Bangladesh, India, Pakistan, Malaysia, and Nigeria, where those countries still are continuing their colonial legacy may be able to reform the recruitment process and education and training programmes of their forces to make a graduate level occupation through academic professional qualifications.
Although the newly introduced police education programmes are at the very early stage of their implementation as none of the three programmes has completed its cycle for its first cohort since introduction, continuous careful consideration is required to understand the challenges and overcome them in due course. This ongoing learning by doing effort is like ‘trying to build an airplane while you are flying it’ as the Chief US Training Officer for the Iraqi National Police Force said while expressing his experience of police capacity building in Iraq [152]. Indeed the recent developments ‘offer new and potentially unprecedented opportunities for HEIs to play a major role in the education of police officers at all levels’ ([54], p. 67). The success of the academic professional qualification programmes based on the PEQF will depend on how stakeholders provide the opportunities to the HEIs to experiment their innovative administrative and pedagogical approaches and assist them to run the programmes as smoothly and flexibly as possible bearing in mind that ‘the politics of the police and policing is complicated’ ([135], p. 20).
\n',keywords:"police education, Policing Education Qualification Framework (PEQF), Police Constable Degree Apprenticeship (PCDA), Degree Holder Entry Programme (DHEP), Pre-Join Degree (PJD), United Kingdom",chapterPDFUrl:"https://cdn.intechopen.com/pdfs/72435.pdf",chapterXML:"https://mts.intechopen.com/source/xml/72435.xml",downloadPdfUrl:"/chapter/pdf-download/72435",previewPdfUrl:"/chapter/pdf-preview/72435",totalDownloads:1078,totalViews:0,totalCrossrefCites:2,dateSubmitted:"March 5th 2020",dateReviewed:"May 2nd 2020",datePrePublished:"August 17th 2020",datePublished:"November 19th 2020",dateFinished:"June 8th 2020",readingETA:"0",abstract:"This chapter outlines the historical development of police education in the United Kingdom, more precisely in England and Wales, and highlights new strategies and planning for the professional development of the police. There is a plethora of research carried out regarding professionalism in policing to meet the needs and challenges of the twenty-first century. Considering the recent developments in police education and training, this chapter mainly discusses three newly introduced routes for recruitment and education of police constables under the Policing Education Qualifications Framework (PEQF), namely Police Constable Degree Apprenticeship (PCDA), Degree Holder Entry Programme (DHEP), and Pre-Join Degree (PJD). Higher education institutions (HEIs), in partnership with the police forces, are providing professional qualifications for policing as a graduate level profession. Though they have made remarkable progress in developing police education programmes, they are facing various challenges in implementing the qualification framework. This chapter also explores pedagogical aspects of police education including the effectiveness and contrast between different forms of teaching and learning. While featuring the challenges and prospects of the new police education programmes, this chapter also outlines different aspects of partnership for delivering these professional qualification programmes.",reviewType:"peer-reviewed",bibtexUrl:"/chapter/bibtex/72435",risUrl:"/chapter/ris/72435",signatures:"M. Mahruf C. Shohel, Gias Uddin, Julian Parker-McLeod and Daniel Silverstone",book:{id:"6950",type:"book",title:"Education, Human Rights and Peace in Sustainable Development",subtitle:null,fullTitle:"Education, Human Rights and Peace in Sustainable Development",slug:"education-human-rights-and-peace-in-sustainable-development",publishedDate:"November 19th 2020",bookSignature:"Maigul Nugmanova, Heimo Mikkola, Alexander Rozanov and Valentina Komleva",coverURL:"https://cdn.intechopen.com/books/images_new/6950.jpg",licenceType:"CC BY 3.0",editedByType:"Edited by",isbn:"978-1-83969-042-6",printIsbn:"978-1-83969-041-9",pdfIsbn:"978-1-83969-043-3",isAvailableForWebshopOrdering:!0,editors:[{id:"290871",title:"Dr.",name:"Maigul",middleName:null,surname:"Nugmanova",slug:"maigul-nugmanova",fullName:"Maigul Nugmanova"}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"}},authors:[{id:"94099",title:"Dr.",name:"M. Mahruf C.",middleName:null,surname:"Shohel",fullName:"M. Mahruf C. Shohel",slug:"m.-mahruf-c.-shohel",email:"mahruf.shohel@yahoo.co.uk",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/94099/images/system/94099.png",institution:{name:"University of Surrey",institutionURL:null,country:{name:"United Kingdom"}}},{id:"319810",title:"Mr.",name:"Gias",middleName:null,surname:"Uddin",fullName:"Gias Uddin",slug:"gias-uddin",email:"gias.uddin@port.ac.uk",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",institution:{name:"University of Portsmouth",institutionURL:null,country:{name:"United Kingdom"}}},{id:"321004",title:"Dr.",name:"Julian",middleName:null,surname:"Parker-McLeod",fullName:"Julian Parker-McLeod",slug:"julian-parker-mcleod",email:"julian.parker-mcleod@port.ac.uk",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",institution:null},{id:"321005",title:"Dr.",name:"Daniel",middleName:null,surname:"Silverstone",fullName:"Daniel Silverstone",slug:"daniel-silverstone",email:"d.m.silverstone@ljmu.ac.uk",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",institution:{name:"Liverpool John Moores University",institutionURL:null,country:{name:"United Kingdom"}}}],sections:[{id:"sec_1",title:"1. Introduction",level:"1"},{id:"sec_2",title:"2. Historical development of police education and training",level:"1"},{id:"sec_3",title:"3. Professionalisation agenda: policing as a graduate level occupation",level:"1"},{id:"sec_4",title:"4. Current development",level:"1"},{id:"sec_4_2",title:"4.1 Policing Vision 2025: graduate level occupation",level:"2"},{id:"sec_5_2",title:"4.2 Policing Education Qualifications Framework (PEQF)",level:"2"},{id:"sec_6_2",title:"4.3 Partnership between forces and universities",level:"2"},{id:"sec_6_3",title:"Table 1.",level:"3"},{id:"sec_7_3",title:"4.3.2 Degree Holder Entry Programme (DHEP)",level:"3"},{id:"sec_8_3",title:"4.3.3 Pre-Join Degree (PJD) programme",level:"3"},{id:"sec_10_2",title:"4.4 Cultural change",level:"2"},{id:"sec_11_2",title:"4.5 Challenges of newly introduced academic programmes",level:"2"},{id:"sec_13",title:"5. Major challenges",level:"1"},{id:"sec_13_2",title:"5.1 Leadership of the partnership",level:"2"},{id:"sec_14_2",title:"5.2 University faculty recruitment",level:"2"},{id:"sec_15_2",title:"5.3 Tripartite engagement and collaboration",level:"2"},{id:"sec_16_2",title:"5.4 Diversity and recruitment",level:"2"},{id:"sec_17_2",title:"5.5 Higher education sector-wide engagement",level:"2"},{id:"sec_18_2",title:"5.6 Academic contact hours and blended learning approach",level:"2"},{id:"sec_19_2",title:"5.7 Multidisciplinary professional understanding",level:"2"},{id:"sec_21",title:"6. Future of police education",level:"1"},{id:"sec_21_2",title:"6.1 Progress made so far",level:"2"},{id:"sec_22_2",title:"6.2 Leadership development",level:"2"},{id:"sec_23_2",title:"6.3 Pedagogical aspects",level:"2"},{id:"sec_24_2",title:"6.4 Interpersonal communication and critical thinking",level:"2"},{id:"sec_25_2",title:"6.5 Policing in emergencies",level:"2"},{id:"sec_27",title:"7. Conclusion",level:"1"}],chapterReferences:[{id:"B1",body:'Tong S, Hallenberg KM. Education and the police professionalisation agenda: A perspective from England and Wales. In: Rogers C, Frevel B, editors. Higher Police Education: An International View. Palgrave Macmillan; 2017. pp. 17-34'},{id:"B2",body:'Simmill-Binning C, Towers J. Education, training and learning in policing in England and Wales. In: N8 Policing Research Partnership. Lancaster: Lancaster University; 2017'},{id:"B3",body:'Green T, Gates A. Understanding the process of professionalisation in the police organisation. Police Journal: Theory, Practice and Principles. 2014;87:75-91'},{id:"B4",body:'Martin D, Wooff A. Treading the front-line: Tartanisation and police academic partnerships. Policing: A Journal of Policy and Practice. 2020;14(2):325-336. DOI: 10.1093/police/pay065'},{id:"B5",body:'Paterson C. Adding value? A review of the international literature on the role of higher education in police training and education. Police Practice and Research. 2011;12(4):286-297'},{id:"B6",body:'Ramshaw P, Soppitt S. Educating the recruited and recruiting the educated: Can the new police education qualifications framework in England and Wales succeed where others have faltered. International Journal of Police Science and Management. 2018;20(4):243-250'},{id:"B7",body:'Cordner G, Shain C. The changing landscape of police education and training. Police Practice and Research. 2011;12(4):281'},{id:"B8",body:'Brown J. Do graduate police officers make a difference to policing? Results of an integrative literature review. Policing. 2018;14(1):9-30'},{id:"B9",body:'Paterson C. Higher education, police training, and police reform: A review of police-academic educational collaborations. In: Kratcoski PC, Edelbacher M, editors. Collaborative Policing: Police, Academics, Professionals, and Communities Working Together for Education, Training, and Program Implementation. London, UK: CRC Press; 2016. pp. 119-136'},{id:"B10",body:'Christopher S. The police service can be a critical reflective practice … if it wants. Policing: A Journal of Policy and Practice. 2015;9(4):326-339'},{id:"B11",body:'Strong J. Policing education qualifications framework (PEQF) implementation: Frequently asked questions. In: Research and Policy Support Briefing Paper. Bedford, UK: Police Federation; 2019'},{id:"B12",body:'College of Policing. Police education qualifications framework: Police constable entry programmes. 2018. Available from: http://www.college.police.uk/What-we-do/Learning/Policing-Education-Qualifications-Framework/Pages/Policing-Education-Qualifications-Framework.aspx [Accessed: 20 April 2020]'},{id:"B13",body:'College of Policing. Legal challenge around training for new officers rejected. 2019. Available from: https://www.college.police.uk/News/College-news/Pages/PEQF-Judicial-Review-Outcome-December-2019.aspx [Accessed: 19 April 2020]'},{id:"B14",body:'College of Policing. Entry routes for police constables. 2020. Available from: https://www.college.police.uk/What-we-do/Learning/Policing-Education-Qualifications-Framework/Entry-routes-for-police-constables/Pages/Entry-routes-for-police-constables.aspx [Accessed: 16 April 2020]'},{id:"B15",body:'Farrell A. Crime, Class and Corruption: The Politics of the Police. London, UK: Bookmarks; 1993'},{id:"B16",body:'Skolnick JH. Justice without Trial: Law Enforcement in Democratic Society. 3rd ed. London, UK: Wiley; 1994'},{id:"B17",body:'Cockcroft T. Police Culture: Themes and Concepts. London, UK: Routledge; 2013'},{id:"B18",body:'Reiner R. The Politics of the Police. 4th ed. Oxford, UK: Oxford University Press; 2010'},{id:"B19",body:'Halsey P. Police officer professional standards. Metropolitan Police. 2011. Available from: http://www.met.police.uk/msctraining/documents/police_officer_professional_standards.pdf [Accessed: 15 April 2020]'},{id:"B20",body:'Stone DC. The control and the discipline of police forces. The Annals of the American Academy of Political and Social Science. 1929;146:63-73'},{id:"B21",body:'Hilton J. Instructions to the new police. The Police Journal: Theory, Practice and Principles. 1977;50(1):23-28'},{id:"B22",body:'Goldstein H. Problem-Oriented Policing. New York, USA: McGraw Hill; 1990. Cited in Marks M, Sklansky D, editors. Police Reform the Bottom Up: Officers and their Unions as Agents of Change. London, UK: Routledge; 2012'},{id:"B23",body:'Parliament UK. Commons Select Committee: Policing for the future inquiry launched. 2017. Available from: https://www.parliament.uk/business/committees/committees-a-z/commons-select/home-affairs-committee/news-parliament-2015/170111-new-inquiry-policing-future/ [Accessed: 16 April 2020]'},{id:"B24",body:'College of Policing. College of policing analysis: Estimating demand on the police service. 2015. Available from: https://www.college.police.uk/News/College-news/Documents/Demand%20Report%2023_1_15_noBleed.pdf [Accessed: 18 April 2020]'},{id:"B25",body:'Emsley C. The English Police: A Political and Social History. London, UK: Longman; 1996'},{id:"B26",body:'Martin JP, Gail Wilson G. Police: A Study in Manpower. London, UK: Heinemann; 1969'},{id:"B27",body:'Williams CA. British police training in the 1940s and 1950s: the inculcation of skills and class. n.d. Available from: https://www.academia.edu/7075837/British_Police_Training_in_the_1940s_and_1950s_the_Inculcation_of_Skills_and_Class [Accessed: 30 April 2020]'},{id:"B28",body:'Watt I. Police Higher Education and Training in the United Kingdom. Chicago, USA: University of Illinois at Chicago; 1988'},{id:"B29",body:'Miller W. Cops and Bobbies. Chicago: University of Chicago Press; 1977'},{id:"B30",body:'Reiner R. Police research in the United Kingdom: A critical review. Crime and Justice. 1992;15:435-508'},{id:"B31",body:'Open University. Policeman as a Worker. 2009. Available from: http://www.open.ac.uk/Arts/history-from-police-archives/Met6Kt/PoliceWorker/pwTrain.html [Accessed: 29 April 2020]'},{id:"B32",body:'Lee M, Punch M. Policing by degrees: Police officers’ experience of university education. Policing and Society. 2004;14(3):233-249'},{id:"B33",body:'Shernock SK. The effects of college education on professional attitudes among police. Journal of Criminal Justice Education. 1992;3(1):71-92'},{id:"B34",body:'Select Committee on Home Affairs. Appendices to the Minutes of Evidence. Annex A. 1999. Available from: https://publications.parliament.uk/pa/cm199899/cmselect/cmhaff/81/81ap35.htm [Accessed: 01 May 2020]'},{id:"B35",body:'Charman S. Police Socialisation, Identity and Culture: Becoming Blue. London, UK: Palgrave Macmillan; 2017'},{id:"B36",body:'Select Committee on Home Affairs. Appendices to the Minutes of Evidence. Appendix 10. 1999. Available from: https://publications.parliament.uk/pa/cm199899/cmselect/cmhaff/81/81ap34.htm [Accessed: 01 May 2020]'},{id:"B37",body:'HMIC. Central Police Training and Development Authority 2003 Inspection. 2003. Available from: http://library.college.police.uk/docs/hmic/centrex03.pdf [Accessed: 27 April 2020]'},{id:"B38",body:'Government UK. Policing a new century—A blueprint for reform. 2001. Available from: https://www.gov.uk/government/publications/policing-a-new-century-a-blueprint-for-reform [Accessed: 17 April 2020]'},{id:"B39",body:'Her Majesty’s Inspectorate of Constabulary (HMIC). Training Matters. London, UK: Her Majesty’s Inspectorate of Constabulary; 2002'},{id:"B40",body:'Government UK. Speech to the Police Education Qualification Framework Conference: Minister addresses the conference on the topic of police professionalism. 2017. Available from: https://www.gov.uk/government/speeches/speech-to-the-police-education-qualification-framework-conference [Accessed: 16 April 2020]'},{id:"B41",body:'Holdaway S. The re-professionalization of the police in England and Wales. Criminology and Criminal Justice. 2017;17(5):588-604'},{id:"B42",body:'Evetts J. The new professionalism? Challenges and opportunities. Current Sociology. 2011;59(4):406-422'},{id:"B43",body:'National Police Chief’s Council (NPCC). Policing Vision 2025. 2016. Available from: https://www.npcc.police.uk/documents/Policing%20Vision.pdf [Accessed: 19 April 2020]'},{id:"B44",body:'Neyroud P. Leading policing in the 21st century: Leadership, democracy, deficit and the new professionalism. Public Money and Management. 2011;31(5):347-355'},{id:"B45",body:'Clapton G, Cree VE, Allan M, Edwards R, Forbes R, Irwin M, et al. Thinking ‘outside the box’: A new approach to integration of learning for practice. Social Work Education. 2008;27(3):334-340'},{id:"B46",body:'Stout B. Professional ethics and academic integrity in police education. Policing: A Journal of Policy and Practice. 2011;4(4):300-309'},{id:"B47",body:'Gundhus HI. Experience or knowledge? Perspectives on new knowledge regimes and control of police professionalism. Policing. 2012;7(2):178-194'},{id:"B48",body:'National Policing Improvement Agency (NPIA). A Guide to the Diploma in Policing—The New National Minimum Qualification for Student Police Officers. London: National Policing Improvement Agency; 2008'},{id:"B49",body:'Bekhradnia B, Beech D. Demand for Higher Education to 2030. Oxford, UK: Higher Education Policy Institute; 2018'},{id:"B50",body:'Derber C, Schwartz WA, Magrass Y. Power in the Highest Degree: Professionals and the Rise of a New Mandarin Order. New York: Oxford University Press; 1990'},{id:"B51",body:'Livingstone DW, Antonelli F. Teachers and other professionals: A comparison of professionals’ occupational requirements, class positions and workplace power. In: Clark R, Livingstone DW, Smaller H, editors. Teacher Learning and Power in the Knowledge Society. Rotterdam, Netherlands: Sense Publishers; 2012'},{id:"B52",body:'Stone R. The Stephen Lawrence review: An independent commentary to mark the 10th anniversary of the Stephen Lawrence Inquiry. London: Uniting Britain Trust; 2009'},{id:"B53",body:'Neyroud P. Review of Police Leadership and Training: Volume 1. Home Office: The Government of the United Kingdom; 2011. Available from: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/118227/report.pdf [Accessed: 16 April 2020]'},{id:"B54",body:'Stanislas P, editor. International Perspectives on Police Education and Training. London, UK: Routledge; 2014'},{id:"B55",body:'Hough M, Stanko B. Developing an Evidence-based Police Degree-holder Entry Programme: Final Report. London, UK: Office for Policing and Crime, Mayor of London; 2018. Available from: https://www.london.gov.uk/sites/default/files/debpdhp_pages_5.6.18.pdf [Accessed: 29 April 2020]'},{id:"B56",body:'Tong S, Wood D. Graduate police officers: Releasing the potential for pre-employment university programmes for aspiring officers. The Police Journal. 2011;84:69-74'},{id:"B57",body:'Dominey J, Hill A. The higher education contribution to police and probation training: Essential, desirable or an indulgence? The British Journal of Community Justice. 2010;8(2):5-16'},{id:"B58",body:'Hallenberg K. Scholarly Detectives: Police Professionalisation via Academic Education [unpublished doctoral thesis]. School of Law, The University of Manchester; 2012'},{id:"B59",body:'Hallenberg K, Cockcroft T. Police and Higher Education. Canterbury Christ Church University; 2014'},{id:"B60",body:'Hallenberg K, Cockcroft T. From indifference to hostility: Police officers, organizational responses and the symbolic value of ‘in-service’ higher education in policing. Policing. 2017;11(3):273-288'},{id:"B61",body:'Heath L. Preparing new police officers for their careers: In-house training or university education? Widening Participation and Lifelong Learning. 2011;12(2):105-123'},{id:"B62",body:'Wood DA. Embedding learning and assessment within police practice: The opportunities and challenges arising from the introduction of the PEQF in England and Wales. Policing: A Journal of Policy and Practice. 2020;14(2):374-382. DOI: 10.1093/police/pay087'},{id:"B63",body:'Winsor T. The Independent Review of Police Officer and Staff Remuneration and Conditions. Home Office; 2012. Available from: https://webarchive.nationalarchives.gov.uk/20130312170837/http://review.police.uk/publications/part-2-report/ [Accessed: 16 April 2020]'},{id:"B64",body:'Blakemore B, Simpson K. A comparison of the effectiveness of pre-and post-employment modes of higher education for student police officers. Police Journal. 2010;83(1):29-41'},{id:"B65",body:'Bryant R, Cockcroft T, Tong S, Wood D. Police training and education: past, present and future. In: Brown J, editor. The Future of Policing. London, UK: Routledge; 2014. pp. 383-397'},{id:"B66",body:'Tilley N, Laycock G. Engineering a safer society. Public Safety Leadership: Research Focus. 2016;4(2):1-6'},{id:"B67",body:'Fleming J. Learning to work together: police and academics. Policing; A Journal of Policy and Practice. 2010;4(2):139-145'},{id:"B68",body:'Goode J, Lumsden K. The McDonaldization of police-academic partnerships: Organisational and cultural barriers encountered. Policing and Society. 2016;28(1):75-89'},{id:"B69",body:'Durham Constabulary. Major recruitment drive launched by Durham Constabulary. 2019. Available from: https://www.durham.police.uk/news-and-events/Pages/News%20Articles/Major-recruitment-drive-launched-by-Durham-Constabulary.aspx [Accessed: 17 April 2020]'},{id:"B70",body:'Northumbria University. Partners in detecting and preventing crime: university and police join forces. 2019. Available from: https://www.northumbria.ac.uk/about-us/news-events/news/police-partnership/ [Accessed: 17 April 2020]'},{id:"B71",body:'Staffordshire University. All new West Midlands police recruits will ‘earn and learn’ to gain a Staffordshire University award. 2019. Available from: https://www.staffs.ac.uk/news/2019/04/all-new-west-midlands-police-recruits-will-earn-and-learn-to-gain-a-staffordshire-university-award [Accessed: 18 April 2020]'},{id:"B72",body:'Babcock. Babcock awarded contract to provide services to London’s Police. 2019. Available from: https://www.babcockinternational.com/news/babcock-awarded-contract-to-provide-services-to-londons-police/ [Accessed: 20 April 2020]'},{id:"B73",body:'Metropolitan Police. The structure of the Met. 2020. Available from: https://www.met.police.uk/police-forces/metropolitan-police/areas/about-us/about-the-met/structure/ [Accessed: 20 April 2020]'},{id:"B74",body:'Government UK. National campaign to recruit 20,000 police officers launches today. 2019. Available from: https://www.gov.uk/government/news/national-campaign-to-recruit-20000-police-officers-launches-today [Accessed: 16 April 2020]'},{id:"B75",body:'Derbyshire Constabulary. The opportunity to obtain a fully-funded degree while working and earning a salary. 2020. Available from: https://careers.derbyshire.police.uk/what-you-could-be-doing/police-officers/police-constable-degree-apprenticeship [Accessed: 15 April 2020]'},{id:"B76",body:'College of Policing. Policing education qualifications framework. 2016. Available from: https://www.college.police.uk/What-we-do/Learning/Policing-Education-Qualifications-Framework/Pages/Policing-Education-Qualifications-Framework.aspx [Accessed: 15 April 2020]'},{id:"B77",body:'Williams E, Norman J, Rowe M. The police education qualification framework: A professional agenda or building professionals? Police Practice and Research. 2019;20(3):259-272'},{id:"B78",body:'Copley S. Reflective Practice for Policing Students. Exeter, UK: Learning Matters Ltd.; 2011'},{id:"B79",body:'Surrey Police. Police Constable degree holder entry programme (DHEP). 2020. Available from: https://www.lumesse-engage.com/policejobssurreyandsussex/jobs/police-constable-degree-holder-entry-programme-dhep--sysx-unfm00027 [Accessed: 20 April 2020]'},{id:"B80",body:'Hampshire Constabulary. Police officers recruiting now. 2020. Available from: https://www.hampshire.police.uk/police-forces/hampshire-constabulary/areas/careers/careers/police-officers/ [Accessed: 20 April 2020]'},{id:"B81",body:'Sussex Police. Fast-track detective development programme. 2020. Available from: https://www.sussex.police.uk/police-forces/sussex-police/areas/careers/jobs/fast-track-detective-development-programme/ [Accessed: 20 April 2020]'},{id:"B82",body:'Macpherson W. The Stephen Lawrence Inquiry. London, UK: Home Office; 1999. Available from: https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/277111/4262.pdf [Accessed: 28 April 2020]'},{id:"B83",body:'Jones T, Newburn T, Smith DJ. Democracy and Policing. London: Policy Studies Institute; 1994'},{id:"B84",body:'Paterson C, Pollock E, Robinson A, Senior P. Developments in police education in England and Wales: Values, culture and ‘common-sense’ policing. In: Cowburn M, Duggan M, editors. Values in Criminology and Community Justice. Bristol, UK: Policy Press; 2015. pp. 187-206'},{id:"B85",body:'Reiner R. The Politics of the Police. Oxford: Oxford University press; 2000'},{id:"B86",body:'Lincolnshire Police. PEQF—Judicial Review Action Launched. 2019. Available from: https://www.lincs.police.uk/news-campaigns/news/2019/peqf-judicial-review-action-launched/ [Accessed: 16 April 2020]'},{id:"B87",body:'Charman S. Changing landscapes, challenging identities—Policing in England and Wales. In: Wankhde P, McCann L, Murphy P, editors. Critical Perspectives on the Management and Organization of Emergency Services. Oxon, UK: Routledge; 2019'},{id:"B88",body:'Moeberg RJ, Pettersson O. Different educations—Different police recruits? In: Paper presented at the European Conference of Criminology; 22 September 2016'},{id:"B89",body:'White D, Heslop R. Educating, legitimising or accessorising? Alternative conceptions of professional training in UK higher education: A comparative study of teacher, nurse and police officer educators. Police Practice and Research. 2012;13(4):342-356'},{id:"B90",body:'Payne BK, Sumter M, Sun I. Bringing the field into the criminal justice classroom: Field trips, ride-alongs, and guest speakers. Journal of Criminal Justice Education. 2003;14(2):327-344'},{id:"B91",body:'Clapton G, Cree V. Integration of Learning for Practice: Literature Review. Edinburgh, UK: Scottish Institute for Excellence in Social Work Education; 2004'},{id:"B92",body:'Wrenn J, Wrenn B. Enhancing learning by integrating theory and practice. International Journal of Teaching and Learning in Higher Education. 2009;21(2):258-265'},{id:"B93",body:'Boud D, Cohen R, Walker D. Introduction: Understanding learning from experience. In: Boud D, Cohen R, Walker D, editors. Using Experience for Learning. Bristol, UK: Society for Research into Higher Education; 1993. pp. 1-17'},{id:"B94",body:'Hutchings P. Assessment and the Way it Works: Closing Plenary Address. Washington, DC: Association of Higher Education Conference on Assessment; 1990'},{id:"B95",body:'Choi I, Lee K. A case-based learning environment design for real-world classroom management problem solving. TechTrends. 2008;52(3):26-31'},{id:"B96",body:'Dorfman RA. Clinical Social Work: Definition, Practice and Vision. New York, USA: Brunner/Mazel; 1996'},{id:"B97",body:'Kramer BJ. Preparing social workers for the inevitable: A preliminary investigation of a course on death, grief, and loss. Journal of Social Work Education. 1998;34(2):211-227'},{id:"B98",body:'Lauritz LE, Astrom E, Nyman C, Klingvall M. Police students’ learning preferences, suitable responses from the learning environment. Policing. 2012;7:195-203'},{id:"B99",body:'McCarthy B. About Learning. Barrington, IL: Excel Inc.; 1996'},{id:"B100",body:'Lauritz LE. Police identities: A study of student police officers and new police officers’ professional identity [doctoral dissertation]. Umeå: Umea School of Business, Umeå University; 2009'},{id:"B101",body:'Knowles MS, Elwood R, Holton R, Swanson A. The Adult Learner: The Definitive Classic in Adult Education and Human Resource Development. 5th ed. New York, USA: Heinemann; 1998'},{id:"B102",body:'McMillan J, Forsyth D. What theories of motivation say about why learners learn. New Directions for Teaching and Learning. 1991;1991(45):39-52'},{id:"B103",body:'Rief S. How to Reach and Teach ADD/ADHD Children. New York: The Centre for Applied Research in Education; 1993'},{id:"B104",body:'Kramer M, Polifroni C, Organek N. Effects of faculty practice on students learning outcomes. Journal of Professional Nursing. 1986;2:289-301'},{id:"B105",body:'Good DM, Schubert CR. Faculty practice: How it enhances teaching. Journal of Nursing Education. 2001;10(9):389-396'},{id:"B106",body:'Sheridan BJ. Police learning in the university context: Student perceptions of the classroom environment on a police foundation degree course [unpublished doctoral thesis]. Institute of Criminal Justice Studies, University of Portsmouth; 2014'},{id:"B107",body:'Shohel MMC, Cann R, Atherton S. Enhancing student engagement using a blended learning approach: Case studies of first-year undergraduate students. International Journal of Mobile and Blended Learning. 2020;12(4):article 4'},{id:"B108",body:'Meyers C, Jones TB. Promoting Active Learning: Strategies for the College Classroom. San Francisco, USA: Jossey-Bass Inc.; 1993'},{id:"B109",body:'College of Policing. National Decision Model. 2013. Available from: https://www.app.college.police.uk/app-content/national-decision-model/the-national-decision-model/ [Accessed: 19 April 2020]'},{id:"B110",body:'Universities UK. The future growth of degree apprenticeships. 2016. Available from: https://www.universitiesuk.ac.uk/policy-and-analysis/reports/downloads/FutureGrowthDegreeApprenticeships.pdf [Accessed: 19 April 2020]'},{id:"B111",body:'Institute for Government. Performance tracker 2019: Police. 2019. Available from: https://www.instituteforgovernment.org.uk/publication/performance-tracker-2019/police [Accessed: 28 April 2020]'},{id:"B112",body:'Neyroud P, Loader I, Brown J, Muir R. Policing for a Better Britain: Report of the Independent Police Commission. 2016. p. 25'},{id:"B113",body:'BBC. Recruitment of 20,000 new police officers to begin ‘within weeks’. 2019. Available from: https://www.bbc.co.uk/news/uk-49123319 [Accessed: 29 April 2020]'},{id:"B114",body:'Sherman LW. The Quality of Police Education: A Critical Review with Recommendations for improving Programs in Higher Education. San Francisco, USA: Jossey-Bass; 1978'},{id:"B115",body:'Sherman LW. College education for police: The reform that failed. Police Studies: The International Review of Police Development. 1978;1(4):32-38'},{id:"B116",body:'Jones M. Creating the ‘thinking police officer’: Exploring motivations and professional impact of part-time higher education. Policing. 2015;10(3):232-240'},{id:"B117",body:'Institute for Apprenticeships and Technical Education. 2017. Available from: https://www.instituteforapprenticeships.org/apprenticeship-standards/police-constable-degree/ [Accessed: 27 April 2020]'},{id:"B118",body:'Davis C. The Telegraph. It could take 100-years to make Met Police representative of London, the force admits. 2019. Available from: https://www.telegraph.co.uk/news/2019/02/19/could-take-100-years-make-met-police-representative-london-force/ [Accessed: 15 April 2020]'},{id:"B119",body:'BBC. Five charts that tell the story of diversity in UK universities. 2018. Available from: https://www.bbc.co.uk/news/education-44226434 [Accessed: 28 April 2020]'},{id:"B120",body:'James A, Silverstone D, Carr R, Kelly T, Karecha J. A report for the National Police Chiefs Council (NPCC) on innovative programmes for the recruitment and training of investigators. In: Currently in Operation in Police Forces in England & Wales. 2019. pp. 1-91'},{id:"B121",body:'Reiner R, Newburn T. Policing and the police. In: Maguire M, Morgan R, Reiner R, editors. The Oxford Handbook of Criminology. Oxford, UK: Oxford University Press; 2007. pp. 910-952'},{id:"B122",body:'Phillips WE, Burrell DN. Decision-making skills that encompass a critical thinking orientation for law enforcement professionals. International Journal of Police Science & Management. 2009;11(2):141-149'},{id:"B123",body:'Bryant R, Bryant S. Blackstone’s Handbook for Policing Students. Oxford, UK: Oxford University Press; 2019'},{id:"B124",body:'Savage SP. Police Reform: Forces for Change. Oxford, UK: Oxford University Press; 2007'},{id:"B125",body:'Wimshurst K, Ransley J. Police education and the university sector: Contrasting models from the Australian experience. Journal of Criminal Justice Education. 2007;18(1):106-122'},{id:"B126",body:'NSW Police. NSW Police Recruitment. 2020. Available from: https://www.police.nsw.gov.au/recruitment/the_training/associate_degree_in_policing_practice/accommodationmeals_for_students [Accessed: 16 April 2020]'},{id:"B127",body:'Green T, Woolston R. Police training and education and university collaboration in Australia. In: Stanislas P, editor. International Perspectives on Police Education and Training. London, UK: Routledge; 2014. pp. 42-56'},{id:"B128",body:'Bangladesh Police. Training. 2020. Available from: https://www.police.gov.bd/en/training [Accessed: 10 April 2020]'},{id:"B129",body:'Uddin G. The Politics of Police Reform in Bangladesh. Saarbrücken (Germany): Lambert Academic Publishing; 2011'},{id:"B130",body:'Louisiana State Police. Joint Emergency Services Training Center (JESTC). 2016. Available from: http://www.jestc.org/index.html [Accessed: 18 April 2020]'},{id:"B131",body:'Hoggett J, Redford P, Toher D, White P. Challenges for police leadership: Identity, experience, legitimacy and direct entry. Journal of Police and Criminal Psychology. 2019;34:145-155'},{id:"B132",body:'Bergan S, Damian R. A word from the editors. In: Bergan S, Damian R, editors. Higher Education for Modern Societies—Competences and Values. Strasbourg Cedex: Council of Europe Publishing; 2010'},{id:"B133",body:'Bok D. Converging for diversity and democracy: A higher education. In: Bergan S, Damian R, editors. Higher Education for Modern Societies—Competences and Values. Strasbourg Cedex: Council of Europe Publishing; 2010'},{id:"B134",body:'College of Policing. Leadership Review. 2015. Available from: https://www.college.police.uk/What-we-do/Development/Promotion/the-leadership-review/Documents/Leadership_Review_Final_June-2015.pdf [Accessed: 18 April 2020]'},{id:"B135",body:'Bowling B, Reiner R, Sheptycki J. The Politics of the Police. 5th ed. Oxford, UK: Oxford University Press; 2019'},{id:"B136",body:'Wheller L, Morris J. Evidence Reviews: What Works in Training, Behaviour Change and Implementing Guidance? London: National Policing Improvement Agency (NPIA); 2010. Available from: https://whatworks.college.police.uk/Research/Documents/What_Works_in_Training_and_Behaviour_change_REA.pdf [Accessed: 18 April 2020]'},{id:"B137",body:'Heslop R. Reproducing police culture in a British university: Findings from an exploratory case study of police foundation degrees. Police Practice and Research. 2011;12(4):298-312'},{id:"B138",body:'Loftus B, Skinns L, Munk T, Rice L. Police partnerships: Evidence review. N8 Policing Research Partnership. 2015. Available from: https://www.n8research.org.uk/media/PolicingPartnerships_EvidenceReview.pdf [Accessed: 19 April 2020]'},{id:"B139",body:'Macvean A, Cox C. Police education in a university setting: Emerging cultures and attitudes. Policing: A Journal of Policy and Practice. 2012;5(1):16-25'},{id:"B140",body:'Norman J, Williams E. Putting learning into practice: Self-reflections from cops. European Police Science and Research Bulletin. 2017;3:197-203'},{id:"B141",body:'Dewey J. The relation of theory to practice in education. In: McMurry CA, editor. The Third Yearbook of the National Society for the Scientific Study of Education, Part I. Chicago, USA: The University of Chicago Press; 1904. pp. 9-30'},{id:"B142",body:'Clare R. Global citizenship and critical thinking in higher education curricula and police education: A socially critical vocational perspective. Journal of Pedagogic Development. 2017;7(2):46-57'},{id:"B143",body:'Neyroud P, Loader I, Brown J, Muir R. Policing for a Better Britain: Report of the Independent Police Commission. 2016'},{id:"B144",body:'Hornyak M, Green SG, Heppard KA. Implementing experiential learning. In: Reynolds M, Vince R, editors. The Handbook of Experiential Learning and Management Education. New York, NY: Oxford University Press; 2007. pp. 137-152'},{id:"B145",body:'Cox C, Kirby S. Can higher education reduce the negative consequences of police occupational culture amongst new recruits? Policing: An International Journal of Police Strategies and Management. 2018;41(5):550-562'},{id:"B146",body:'Metropolitan Police. Call to retired officers to return to the Met. 2020. Available from: http://news.met.police.uk/news/call-to-retired-officers-to-return-to-the-met-398385 [Accessed: 15 April 2020]'},{id:"B147",body:'Wood D, Tong S. The future of initial police training: A university perspective. International Journal of Police Science and Management. 2009;11(3):294-305'},{id:"B148",body:'Jasper M. Professional Development, Reflection and Decision-Making. Oxford: Blackwell; 2006'},{id:"B149",body:'Marquardt MJ. Building the Learning Organisation. New York: McGraw-Hill; 1996'},{id:"B150",body:'Watkins KE, Marsick VJ. Sculpting the Learning Organisation: Lessons in the Art and Science of Systematic Change. San Francisco: Jossey-Bass; 1993'},{id:"B151",body:'Senge PM. The Fifth Discipline: The Art and Practice of the Learning Organization. New York, USA: Doubleday; 1990'},{id:"B152",body:'Hinton MS, Newburn T. Introduction: Policing developing democracies. In: Hinton MS, Newburn T, editors. Policing Developing Democracies. Oxon: Routledge; 2009. pp. 1-27'}],footnotes:[{id:"fn1",explanation:"It is worth noting here that this initiative was unsuccessfully challenged by the Chief Constable of Lincolnshire Police at the High Court [14]."}],contributors:[{corresp:"yes",contributorFullName:"M. Mahruf C. Shohel",address:"m.m.c.shohel@alumni.manchester.ac.uk;, mahruf.shohel@yahoo.co.uk",affiliation:'
Institute of Development Studies, University of Sussex, United Kingdom
School of Justice Studies, Liverpool John Moores University, United Kingdom
'}],corrections:null},book:{id:"6950",type:"book",title:"Education, Human Rights and Peace in Sustainable Development",subtitle:null,fullTitle:"Education, Human Rights and Peace in Sustainable Development",slug:"education-human-rights-and-peace-in-sustainable-development",publishedDate:"November 19th 2020",bookSignature:"Maigul Nugmanova, Heimo Mikkola, Alexander Rozanov and Valentina Komleva",coverURL:"https://cdn.intechopen.com/books/images_new/6950.jpg",licenceType:"CC BY 3.0",editedByType:"Edited by",isbn:"978-1-83969-042-6",printIsbn:"978-1-83969-041-9",pdfIsbn:"978-1-83969-043-3",isAvailableForWebshopOrdering:!0,editors:[{id:"290871",title:"Dr.",name:"Maigul",middleName:null,surname:"Nugmanova",slug:"maigul-nugmanova",fullName:"Maigul Nugmanova"}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"}}},profile:{item:{id:"193414",title:"Prof.",name:"Sevinç",middleName:null,surname:"Polat",email:"sfpolat@mynet.com",fullName:"Sevinç Polat",slug:"sevinc-polat",position:null,biography:null,institutionString:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",totalCites:0,totalChapterViews:"0",outsideEditionCount:0,totalAuthoredChapters:"2",totalEditedBooks:"0",personalWebsiteURL:null,twitterURL:null,linkedinURL:null,institution:null},booksEdited:[],chaptersAuthored:[{id:"54437",title:"Used of Complementary and Alternative Medicine on Symptoms Management and Quality of Life",slug:"used-of-complementary-and-alternative-medicine-on-symptoms-management-and-quality-of-life",abstract:"Introduction: Children with cancer experience serious difficulties due to the diagnosis, the hospitalization, the symptoms that accompany the long and exhausting treatment process. Unrelieved symptoms related to either cancer or chemotherapy also lead to poorer quality of life, including increased distress and negatively impact healing process. The families of children with cancer often try the complementary and alternative medicine (CAM) to reduce their children’s experience of physical discomfort.",signatures:"Ayşe Gürol and Sevinç Polat",authors:[{id:"192610",title:"Associate Prof.",name:"Ayşe",surname:"Gürol",fullName:"Ayşe Gürol",slug:"ayse-gurol",email:"ayseparlak42@gmail.com"},{id:"193414",title:"Prof.",name:"Sevinç",surname:"Polat",fullName:"Sevinç Polat",slug:"sevinc-polat",email:"sfpolat@mynet.com"}],book:{id:"5542",title:"Pediatric Cancer Survivors",slug:"pediatric-cancer-survivors",productType:{id:"1",title:"Edited Volume"}}},{id:"73932",title:"Safety of Herbal Medicines in Children",slug:"safety-of-herbal-medicines-in-children",abstract:"Herbal medicine is used by individuals of all ages, including children. Herbal medicine includes herbs, herbal materials and preparations, and finished herbal products. Herbal medicine or herbal products’ use for all ages have increased in recent years. Based on the data of the World Health Organization, almost 80% of the population in developing countries trust herbal medicines to meet their health needs. Herbal medicines use unconsciously as though these products are harmless. The use of herbal products in children is a concern because little information is available concerning the benefits and risks of these products in the pediatric population. This creates a serious problem in the treatment of children, and reveals a serious and under-recognized hazard in clinical care. The safety of most herbal medicinal products is absent since lack of suitable quality controls and not available of appropriate patient information. Owing to the possibility of serious health complications arising from the use of herbal products, it is mandatory to understand their use in the general population in order for appropriate measures to be put into place.",signatures:"Sevinç Polat and Ayşe Gürol",authors:[{id:"192610",title:"Associate Prof.",name:"Ayşe",surname:"Gürol",fullName:"Ayşe Gürol",slug:"ayse-gurol",email:"ayseparlak42@gmail.com"},{id:"193414",title:"Prof.",name:"Sevinç",surname:"Polat",fullName:"Sevinç Polat",slug:"sevinc-polat",email:"sfpolat@mynet.com"}],book:{id:"9445",title:"Alternative Medicine",slug:"alternative-medicine-update",productType:{id:"1",title:"Edited Volume"}}}],collaborators:[{id:"34869",title:"Dr.",name:"Enzo",surname:"Spisni",slug:"enzo-spisni",fullName:"Enzo Spisni",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"52860",title:"Dr.",name:"Karen",surname:"Wonders",slug:"karen-wonders",fullName:"Karen Wonders",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/52860/images/5489_n.jpg",biography:"Karen Wonders, Ph.D., is the Founder and Director of Maple Tree Cancer Alliance, and Professor of Exercise Physiology at Wright State University. She is also the best selling author of the 40-day devotional, Beauty from Ashes. Her passion is to advocate for exercise as part of the standard of care for cancer. Maple Tree provides free exercise training, nutrition counseling, and emotional support to hundreds of cancer survivors every month at several locations across Ohio. Dr. Wonders was recently recognized for her work by the Dayton Business Journal’s “Forty under 40” award. In addition, Maple Tree has been awarded “Best in Dayton” for Health and Fitness four years in a row. Dr. Wonders is committed to evidence-based practice in her facilities, and has a robust research program that has published two text books, four book chapters, and more than 30 peer reviewed manuscripts on the topic of exercise and cancer recovery. A gifted communicator, Dr. Wonders has given numerous professional presentations on the national, state, and local levels, including a talk at TEDxDayton 2017 on Exercising through Cancer Care. In addition, Dr. Wonders is in her final year of course work in the Master’s of Ministry program at Cedarville University. Dr. Wonders is married and has seven children.",institutionString:null,institution:null},{id:"192302",title:"Associate Prof.",name:"Orsolya",surname:"Németh",slug:"orsolya-nemeth",fullName:"Orsolya Németh",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Semmelweis University",institutionURL:null,country:{name:"Hungary"}}},{id:"192552",title:"Dr.",name:"Jake",surname:"Kleinmahon",slug:"jake-kleinmahon",fullName:"Jake Kleinmahon",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"University of Colorado Denver",institutionURL:null,country:{name:"United States of America"}}},{id:"192610",title:"Associate Prof.",name:"Ayşe",surname:"Gürol",slug:"ayse-gurol",fullName:"Ayşe Gürol",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/192610/images/14056_n.jpg",biography:null,institutionString:null,institution:{name:"Erzurum Technical University",institutionURL:null,country:{name:"Turkey"}}},{id:"192650",title:"B.Sc.",name:"Christopher",surname:"Kuo",slug:"christopher-kuo",fullName:"Christopher Kuo",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Rush University Medical Center",institutionURL:null,country:{name:"United States of America"}}},{id:"192807",title:"Dr.",name:"Paul",surname:"Kent",slug:"paul-kent",fullName:"Paul Kent",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"193398",title:"Dr.",name:"Bruce",surname:"Landeck",slug:"bruce-landeck",fullName:"Bruce Landeck",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"194608",title:"Dr.",name:"Nupur",surname:"Mittal",slug:"nupur-mittal",fullName:"Nupur Mittal",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"324774",title:"Dr.",name:"Mihael",surname:"Drofenik",slug:"mihael-drofenik",fullName:"Mihael Drofenik",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null}]},generic:{page:{slug:"WIS-cost",title:"What Does It Cost?",intro:"
Open Access publishing helps remove barriers and allows everyone to access valuable information, but article and book processing charges also exclude talented authors and editors who can’t afford to pay. The goal of our Women in Science program is to charge zero APCs, so none of our authors or editors have to pay for publication.
",metaTitle:"What Does It Cost?",metaDescription:"Open Access publishing helps remove barriers and allows everyone to access valuable information, but article and book processing charges also exclude talented authors and editors who can’t afford to pay. The goal of our Women in Science program is to charge zero APCs, so none of our authors or editors have to pay for publication.",metaKeywords:null,canonicalURL:null,contentRaw:'[{"type":"htmlEditorComponent","content":"
We are currently in the process of collecting sponsorship. If you have any ideas or would like to help sponsor this ambitious program, we’d love to hear from you. Contact us at info@intechopen.com.
\\n\\n
All of our IntechOpen sponsors are in good company! The research in past IntechOpen books and chapters have been funded by:
\\n\\n
\\n\\t
European Commission
\\n\\t
Bill and Melinda Gates Foundation
\\n\\t
Wellcome Trust
\\n\\t
National Institute of Health (NIH)
\\n\\t
National Science Foundation (NSF)
\\n\\t
National Institute of Standards and Technology (NIST)
We are currently in the process of collecting sponsorship. If you have any ideas or would like to help sponsor this ambitious program, we’d love to hear from you. Contact us at info@intechopen.com.
\n\n
All of our IntechOpen sponsors are in good company! The research in past IntechOpen books and chapters have been funded by:
\n\n
\n\t
European Commission
\n\t
Bill and Melinda Gates Foundation
\n\t
Wellcome Trust
\n\t
National Institute of Health (NIH)
\n\t
National Science Foundation (NSF)
\n\t
National Institute of Standards and Technology (NIST)
\n\t
Research Councils United Kingdom (RCUK)
\n\t
Foundation for Science and Technology (FCT)
\n\t
Chinese Academy of Sciences
\n\t
Natural Science Foundation of China (NSFC)
\n\t
German Research Foundation (DFG)
\n\t
Max Planck Institute
\n\t
Austrian Science Fund (FWF)
\n\t
Australian Research Council (ARC)
\n
\n'}]},successStories:{items:[]},authorsAndEditors:{filterParams:{sort:"featured,name"},profiles:[],filtersByRegion:[],offset:0,limit:12,total:null},chapterEmbeded:{data:{}},editorApplication:{success:null,errors:{}},ofsBooks:{filterParams:{hasNoEditors:"1",sort:"dateEndThirdStepPublish",src:"EDCMP",topicId:"10"},books:[{type:"book",id:"11834",title:"Steppe Geography",subtitle:null,isOpenForSubmission:!0,hash:"363517fa6f079daf94c51ea1b91fed2a",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/11834.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"11836",title:"Estuary Research",subtitle:null,isOpenForSubmission:!0,hash:"ef822fc9eee5600aeb7e45492e04a6e7",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/11836.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"11837",title:"The Mediterranean",subtitle:null,isOpenForSubmission:!0,hash:"bbb25987a982d61da4f47fb13614ba3c",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/11837.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"11846",title:"Seabed",subtitle:null,isOpenForSubmission:!0,hash:"1b1698a2d8d36b5ec3571c20486eb2c9",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/11846.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"12002",title:"Oceanography",subtitle:null,isOpenForSubmission:!0,hash:"b48da2053b7a270a24db1eeaea08f16b",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/12002.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"12003",title:"Rural Areas",subtitle:null,isOpenForSubmission:!0,hash:"5d6bf787bf04690d8773b4d47bc54353",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/12003.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"12004",title:"Tropical Forests",subtitle:null,isOpenForSubmission:!0,hash:"1478a073e834c74e589098e43f49d1d8",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/12004.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"12008",title:"Soil Erosion",subtitle:null,isOpenForSubmission:!0,hash:"1eaa50d78d66b865dad58f70ea80a0cb",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/12008.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"12010",title:"New Findings on Black Holes",subtitle:null,isOpenForSubmission:!0,hash:"5e31be1486a9d2981dcadb9451f33793",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/12010.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"11999",title:"Earthquakes - New Insights",subtitle:null,isOpenForSubmission:!0,hash:"911a25fd67eda2c5dd5dc068885ab6c1",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/11999.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"12000",title:"Natural Hazards",subtitle:null,isOpenForSubmission:!0,hash:"d9fad96ccf42b288f2134775f6a8a1be",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/12000.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"12001",title:"Polar Climate",subtitle:null,isOpenForSubmission:!0,hash:"b226f7ff46cf93d4dc25aa49b23cc118",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/12001.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}],filtersByTopic:[{group:"topic",caption:"Agricultural and Biological Sciences",value:5,count:39},{group:"topic",caption:"Biochemistry, Genetics and Molecular Biology",value:6,count:11},{group:"topic",caption:"Business, Management and Economics",value:7,count:7},{group:"topic",caption:"Chemistry",value:8,count:17},{group:"topic",caption:"Computer and Information Science",value:9,count:16},{group:"topic",caption:"Earth and Planetary Sciences",value:10,count:15},{group:"topic",caption:"Engineering",value:11,count:32},{group:"topic",caption:"Environmental Sciences",value:12,count:7},{group:"topic",caption:"Immunology and Microbiology",value:13,count:11},{group:"topic",caption:"Materials Science",value:14,count:11},{group:"topic",caption:"Mathematics",value:15,count:6},{group:"topic",caption:"Medicine",value:16,count:100},{group:"topic",caption:"Nanotechnology and Nanomaterials",value:17,count:2},{group:"topic",caption:"Neuroscience",value:18,count:7},{group:"topic",caption:"Pharmacology, Toxicology and Pharmaceutical Science",value:19,count:11},{group:"topic",caption:"Physics",value:20,count:2},{group:"topic",caption:"Psychology",value:21,count:7},{group:"topic",caption:"Robotics",value:22,count:2},{group:"topic",caption:"Social Sciences",value:23,count:32},{group:"topic",caption:"Technology",value:24,count:1}],offset:12,limit:12,total:15},popularBooks:{featuredBooks:[{type:"book",id:"9974",title:"E-Learning and Digital Education in the Twenty-First Century",subtitle:null,isOpenForSubmission:!1,hash:"88b58d66e975df20425fc1dfd22d53aa",slug:"e-learning-and-digital-education-in-the-twenty-first-century",bookSignature:"M. Mahruf C. Shohel",coverURL:"https://cdn.intechopen.com/books/images_new/9974.jpg",editors:[{id:"94099",title:"Dr.",name:"M. Mahruf C.",middleName:null,surname:"Shohel",slug:"m.-mahruf-c.-shohel",fullName:"M. Mahruf C. Shohel"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"11001",title:"Density Functional Theory",subtitle:"Recent Advances, New Perspectives and Applications",isOpenForSubmission:!1,hash:"82d53383af78ab41eb982086c02fb2bb",slug:"density-functional-theory-recent-advances-new-perspectives-and-applications",bookSignature:"Daniel Glossman-Mitnik",coverURL:"https://cdn.intechopen.com/books/images_new/11001.jpg",editors:[{id:"198499",title:"Dr.",name:"Daniel",middleName:null,surname:"Glossman-Mitnik",slug:"daniel-glossman-mitnik",fullName:"Daniel Glossman-Mitnik"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10356",title:"Natural Medicinal Plants",subtitle:null,isOpenForSubmission:!1,hash:"943e56ccaaf19ff696d25aa638ae37d6",slug:"natural-medicinal-plants",bookSignature:"Hany A. El-Shemy",coverURL:"https://cdn.intechopen.com/books/images_new/10356.jpg",editors:[{id:"54719",title:"Prof.",name:"Hany",middleName:null,surname:"El-Shemy",slug:"hany-el-shemy",fullName:"Hany El-Shemy"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"11752",title:"Natural Drugs from Plants",subtitle:null,isOpenForSubmission:!1,hash:"a0a83c0822608ef7592bf16a5ed0ada4",slug:"natural-drugs-from-plants",bookSignature:"Hany A. El-Shemy",coverURL:"https://cdn.intechopen.com/books/images_new/11752.jpg",editors:[{id:"54719",title:"Prof.",name:"Hany",middleName:null,surname:"El-Shemy",slug:"hany-el-shemy",fullName:"Hany El-Shemy"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10251",title:"Plankton Communities",subtitle:null,isOpenForSubmission:!1,hash:"e11e441ca2d2d5f631b1b4704505cfb6",slug:"plankton-communities",bookSignature:"Leonel Pereira and Ana Marta Gonçalves",coverURL:"https://cdn.intechopen.com/books/images_new/10251.jpg",editors:[{id:"279788",title:"Dr.",name:"Leonel",middleName:null,surname:"Pereira",slug:"leonel-pereira",fullName:"Leonel Pereira"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10830",title:"Animal Feed Science and Nutrition",subtitle:"Production, Health and Environment",isOpenForSubmission:!1,hash:"79944fc8fbbaa329aed6fde388154832",slug:"animal-feed-science-and-nutrition-production-health-and-environment",bookSignature:"Amlan Kumar Patra",coverURL:"https://cdn.intechopen.com/books/images_new/10830.jpg",editors:[{id:"310962",title:"Dr.",name:"Amlan",middleName:"Kumar",surname:"Patra",slug:"amlan-patra",fullName:"Amlan Patra"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10584",title:"Engineered Wood Products for Construction",subtitle:null,isOpenForSubmission:!1,hash:"421757c56a3735986055250821275a51",slug:"engineered-wood-products-for-construction",bookSignature:"Meng Gong",coverURL:"https://cdn.intechopen.com/books/images_new/10584.jpg",editors:[{id:"274242",title:"Dr.",name:"Meng",middleName:null,surname:"Gong",slug:"meng-gong",fullName:"Meng Gong"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9670",title:"Current Trends in Wheat Research",subtitle:null,isOpenForSubmission:!1,hash:"89d795987f1747a76eee532700d2093d",slug:"current-trends-in-wheat-research",bookSignature:"Mahmood-ur-Rahman Ansari",coverURL:"https://cdn.intechopen.com/books/images_new/9670.jpg",editors:[{id:"185476",title:"Dr.",name:"Mahmood-ur-Rahman",middleName:null,surname:"Ansari",slug:"mahmood-ur-rahman-ansari",fullName:"Mahmood-ur-Rahman Ansari"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9032",title:"Corporate Social Responsibility",subtitle:null,isOpenForSubmission:!1,hash:"f609bf3251d7cc7bae0099a4374adfc3",slug:"corporate-social-responsibility",bookSignature:"Beatrice Orlando",coverURL:"https://cdn.intechopen.com/books/images_new/9032.jpg",editors:[{id:"232969",title:"Prof.",name:"Beatrice",middleName:null,surname:"Orlando",slug:"beatrice-orlando",fullName:"Beatrice Orlando"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10681",title:"Biodegradation Technology of Organic and Inorganic Pollutants",subtitle:null,isOpenForSubmission:!1,hash:"9a6e10e02788092872fd249436898e97",slug:"biodegradation-technology-of-organic-and-inorganic-pollutants",bookSignature:"Kassio Ferreira Mendes, Rodrigo Nogueira de Sousa and Kamila Cabral Mielke",coverURL:"https://cdn.intechopen.com/books/images_new/10681.jpg",editors:[{id:"197720",title:"Ph.D.",name:"Kassio",middleName:null,surname:"Ferreira Mendes",slug:"kassio-ferreira-mendes",fullName:"Kassio Ferreira Mendes"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9808",title:"Contemporary Topics in Patient Safety",subtitle:"Volume 1",isOpenForSubmission:!1,hash:"fb6371607c2c6c02c6a2af8892765aba",slug:"contemporary-topics-in-patient-safety-volume-1",bookSignature:"Stanislaw P. Stawicki and Michael S. Firstenberg",coverURL:"https://cdn.intechopen.com/books/images_new/9808.jpg",editors:[{id:"181694",title:"Dr.",name:"Stanislaw P.",middleName:null,surname:"Stawicki",slug:"stanislaw-p.-stawicki",fullName:"Stanislaw P. Stawicki"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9544",title:"Global Trade in the Emerging Business Environment",subtitle:null,isOpenForSubmission:!1,hash:"fb8cb09b9599246add78d508a98273d5",slug:"global-trade-in-the-emerging-business-environment",bookSignature:"Muhammad Mohiuddin, Jingbin Wang , Md. Samim Al Azad and Selim Ahmed",coverURL:"https://cdn.intechopen.com/books/images_new/9544.jpg",editors:[{id:"418514",title:"Dr.",name:"Muhammad",middleName:null,surname:"Mohiuddin",slug:"muhammad-mohiuddin",fullName:"Muhammad Mohiuddin"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}}],offset:12,limit:12,total:4380},hotBookTopics:{hotBooks:[],offset:0,limit:12,total:null},publish:{},publishingProposal:{success:null,errors:{}},books:{featuredBooks:[{type:"book",id:"9974",title:"E-Learning and Digital Education in the Twenty-First Century",subtitle:null,isOpenForSubmission:!1,hash:"88b58d66e975df20425fc1dfd22d53aa",slug:"e-learning-and-digital-education-in-the-twenty-first-century",bookSignature:"M. Mahruf C. Shohel",coverURL:"https://cdn.intechopen.com/books/images_new/9974.jpg",publishedDate:"May 18th 2022",numberOfDownloads:3385,editors:[{id:"94099",title:"Dr.",name:"M. Mahruf C.",middleName:null,surname:"Shohel",slug:"m.-mahruf-c.-shohel",fullName:"M. Mahruf C. Shohel"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"11001",title:"Density Functional Theory",subtitle:"Recent Advances, New Perspectives and Applications",isOpenForSubmission:!1,hash:"82d53383af78ab41eb982086c02fb2bb",slug:"density-functional-theory-recent-advances-new-perspectives-and-applications",bookSignature:"Daniel Glossman-Mitnik",coverURL:"https://cdn.intechopen.com/books/images_new/11001.jpg",publishedDate:"May 18th 2022",numberOfDownloads:1875,editors:[{id:"198499",title:"Dr.",name:"Daniel",middleName:null,surname:"Glossman-Mitnik",slug:"daniel-glossman-mitnik",fullName:"Daniel Glossman-Mitnik"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10356",title:"Natural Medicinal Plants",subtitle:null,isOpenForSubmission:!1,hash:"943e56ccaaf19ff696d25aa638ae37d6",slug:"natural-medicinal-plants",bookSignature:"Hany A. El-Shemy",coverURL:"https://cdn.intechopen.com/books/images_new/10356.jpg",publishedDate:"May 11th 2022",numberOfDownloads:3842,editors:[{id:"54719",title:"Prof.",name:"Hany",middleName:null,surname:"El-Shemy",slug:"hany-el-shemy",fullName:"Hany El-Shemy"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"11752",title:"Natural Drugs from Plants",subtitle:null,isOpenForSubmission:!1,hash:"a0a83c0822608ef7592bf16a5ed0ada4",slug:"natural-drugs-from-plants",bookSignature:"Hany A. El-Shemy",coverURL:"https://cdn.intechopen.com/books/images_new/11752.jpg",publishedDate:"May 11th 2022",numberOfDownloads:3008,editors:[{id:"54719",title:"Prof.",name:"Hany",middleName:null,surname:"El-Shemy",slug:"hany-el-shemy",fullName:"Hany El-Shemy"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10251",title:"Plankton Communities",subtitle:null,isOpenForSubmission:!1,hash:"e11e441ca2d2d5f631b1b4704505cfb6",slug:"plankton-communities",bookSignature:"Leonel Pereira and Ana Marta Gonçalves",coverURL:"https://cdn.intechopen.com/books/images_new/10251.jpg",publishedDate:"May 18th 2022",numberOfDownloads:1109,editors:[{id:"279788",title:"Dr.",name:"Leonel",middleName:null,surname:"Pereira",slug:"leonel-pereira",fullName:"Leonel Pereira"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10830",title:"Animal Feed Science and Nutrition",subtitle:"Production, Health and Environment",isOpenForSubmission:!1,hash:"79944fc8fbbaa329aed6fde388154832",slug:"animal-feed-science-and-nutrition-production-health-and-environment",bookSignature:"Amlan Kumar Patra",coverURL:"https://cdn.intechopen.com/books/images_new/10830.jpg",publishedDate:"May 18th 2022",numberOfDownloads:1010,editors:[{id:"310962",title:"Dr.",name:"Amlan",middleName:"Kumar",surname:"Patra",slug:"amlan-patra",fullName:"Amlan Patra"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10584",title:"Engineered Wood Products for Construction",subtitle:null,isOpenForSubmission:!1,hash:"421757c56a3735986055250821275a51",slug:"engineered-wood-products-for-construction",bookSignature:"Meng Gong",coverURL:"https://cdn.intechopen.com/books/images_new/10584.jpg",publishedDate:"April 28th 2022",numberOfDownloads:3918,editors:[{id:"274242",title:"Dr.",name:"Meng",middleName:null,surname:"Gong",slug:"meng-gong",fullName:"Meng Gong"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9670",title:"Current Trends in Wheat Research",subtitle:null,isOpenForSubmission:!1,hash:"89d795987f1747a76eee532700d2093d",slug:"current-trends-in-wheat-research",bookSignature:"Mahmood-ur-Rahman Ansari",coverURL:"https://cdn.intechopen.com/books/images_new/9670.jpg",publishedDate:"May 11th 2022",numberOfDownloads:1654,editors:[{id:"185476",title:"Dr.",name:"Mahmood-ur-Rahman",middleName:null,surname:"Ansari",slug:"mahmood-ur-rahman-ansari",fullName:"Mahmood-ur-Rahman Ansari"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9032",title:"Corporate Social Responsibility",subtitle:null,isOpenForSubmission:!1,hash:"f609bf3251d7cc7bae0099a4374adfc3",slug:"corporate-social-responsibility",bookSignature:"Beatrice Orlando",coverURL:"https://cdn.intechopen.com/books/images_new/9032.jpg",publishedDate:"March 16th 2022",numberOfDownloads:7686,editors:[{id:"232969",title:"Prof.",name:"Beatrice",middleName:null,surname:"Orlando",slug:"beatrice-orlando",fullName:"Beatrice Orlando"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10681",title:"Biodegradation Technology of Organic and Inorganic Pollutants",subtitle:null,isOpenForSubmission:!1,hash:"9a6e10e02788092872fd249436898e97",slug:"biodegradation-technology-of-organic-and-inorganic-pollutants",bookSignature:"Kassio Ferreira Mendes, Rodrigo Nogueira de Sousa and Kamila Cabral Mielke",coverURL:"https://cdn.intechopen.com/books/images_new/10681.jpg",publishedDate:"April 20th 2022",numberOfDownloads:3444,editors:[{id:"197720",title:"Ph.D.",name:"Kassio",middleName:null,surname:"Ferreira Mendes",slug:"kassio-ferreira-mendes",fullName:"Kassio Ferreira Mendes"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}}],latestBooks:[{type:"book",id:"10251",title:"Plankton Communities",subtitle:null,isOpenForSubmission:!1,hash:"e11e441ca2d2d5f631b1b4704505cfb6",slug:"plankton-communities",bookSignature:"Leonel Pereira and Ana Marta Gonçalves",coverURL:"https://cdn.intechopen.com/books/images_new/10251.jpg",editedByType:"Edited by",publishedDate:"May 18th 2022",editors:[{id:"279788",title:"Dr.",name:"Leonel",middleName:null,surname:"Pereira",slug:"leonel-pereira",fullName:"Leonel Pereira"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10830",title:"Animal Feed Science and Nutrition",subtitle:"Production, Health and Environment",isOpenForSubmission:!1,hash:"79944fc8fbbaa329aed6fde388154832",slug:"animal-feed-science-and-nutrition-production-health-and-environment",bookSignature:"Amlan Kumar Patra",coverURL:"https://cdn.intechopen.com/books/images_new/10830.jpg",editedByType:"Edited by",publishedDate:"May 18th 2022",editors:[{id:"310962",title:"Dr.",name:"Amlan",middleName:"Kumar",surname:"Patra",slug:"amlan-patra",fullName:"Amlan Patra"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10853",title:"Recent Advances in Polynomials",subtitle:null,isOpenForSubmission:!1,hash:"9e8671bae09ccaa8b8e276c639a737fc",slug:"recent-advances-in-polynomials",bookSignature:"Kamal Shah",coverURL:"https://cdn.intechopen.com/books/images_new/10853.jpg",editedByType:"Edited by",publishedDate:"May 18th 2022",editors:[{id:"231748",title:"Dr.",name:"Kamal",middleName:null,surname:"Shah",slug:"kamal-shah",fullName:"Kamal Shah"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10871",title:"Computed-Tomography (CT) Scan",subtitle:null,isOpenForSubmission:!1,hash:"966d8cf74fa27eea1b9cbc9a6ee94993",slug:"computed-tomography-ct-scan",bookSignature:"Reda R. Gharieb",coverURL:"https://cdn.intechopen.com/books/images_new/10871.jpg",editedByType:"Edited by",publishedDate:"May 18th 2022",editors:[{id:"225387",title:"Prof.",name:"Reda R.",middleName:"R.",surname:"Gharieb",slug:"reda-r.-gharieb",fullName:"Reda R. Gharieb"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10903",title:"Genetically Modified Plants and Beyond",subtitle:null,isOpenForSubmission:!1,hash:"4d7ed4faab99c92cd4d676dc86501df9",slug:"genetically-modified-plants-and-beyond",bookSignature:"Idah Sithole Niang",coverURL:"https://cdn.intechopen.com/books/images_new/10903.jpg",editedByType:"Edited by",publishedDate:"May 18th 2022",editors:[{id:"90172",title:"Prof.",name:"Idah",middleName:null,surname:"Sithole-Niang",slug:"idah-sithole-niang",fullName:"Idah Sithole-Niang"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10904",title:"Fusarium",subtitle:"An Overview of the Genus",isOpenForSubmission:!1,hash:"49d9063e43f94bd1517d65fbc58b93c3",slug:"fusarium-an-overview-of-the-genus",bookSignature:"Seyed Mahyar Mirmajlessi",coverURL:"https://cdn.intechopen.com/books/images_new/10904.jpg",editedByType:"Edited by",publishedDate:"May 18th 2022",editors:[{id:"100573",title:"Dr.",name:"Seyed Mahyar",middleName:null,surname:"Mirmajlessi",slug:"seyed-mahyar-mirmajlessi",fullName:"Seyed Mahyar Mirmajlessi"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10654",title:"Brain-Computer Interface",subtitle:null,isOpenForSubmission:!1,hash:"a5308884068cc53ed31c6baba756857f",slug:"brain-computer-interface",bookSignature:"Vahid Asadpour",coverURL:"https://cdn.intechopen.com/books/images_new/10654.jpg",editedByType:"Edited by",publishedDate:"May 18th 2022",editors:[{id:"165328",title:"Dr.",name:"Vahid",middleName:null,surname:"Asadpour",slug:"vahid-asadpour",fullName:"Vahid Asadpour"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10676",title:"Recent Applications in Graph Theory",subtitle:null,isOpenForSubmission:!1,hash:"900c60742d224080732bd16bd25ccba8",slug:"recent-applications-in-graph-theory",bookSignature:"Harun Pirim",coverURL:"https://cdn.intechopen.com/books/images_new/10676.jpg",editedByType:"Edited by",publishedDate:"May 18th 2022",editors:[{id:"146092",title:"Dr.",name:"Harun",middleName:null,surname:"Pirim",slug:"harun-pirim",fullName:"Harun Pirim"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"11196",title:"New Updates in E-Learning",subtitle:null,isOpenForSubmission:!1,hash:"6afaadf68e2a0a4b370ac5ceb5ca89c6",slug:"new-updates-in-e-learning",bookSignature:"Eduard Babulak",coverURL:"https://cdn.intechopen.com/books/images_new/11196.jpg",editedByType:"Edited by",publishedDate:"May 18th 2022",editors:[{id:"10086",title:"Prof.",name:"Eduard",middleName:null,surname:"Babulak",slug:"eduard-babulak",fullName:"Eduard Babulak"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9974",title:"E-Learning and Digital Education in the Twenty-First Century",subtitle:null,isOpenForSubmission:!1,hash:"88b58d66e975df20425fc1dfd22d53aa",slug:"e-learning-and-digital-education-in-the-twenty-first-century",bookSignature:"M. Mahruf C. Shohel",coverURL:"https://cdn.intechopen.com/books/images_new/9974.jpg",editedByType:"Edited by",publishedDate:"May 18th 2022",editors:[{id:"94099",title:"Dr.",name:"M. Mahruf C.",middleName:null,surname:"Shohel",slug:"m.-mahruf-c.-shohel",fullName:"M. Mahruf C. Shohel"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}]},subject:{topic:{id:"221",title:"Astrophysics",slug:"astrophysics",parent:{id:"20",title:"Physics",slug:"physics"},numberOfBooks:3,numberOfSeries:0,numberOfAuthorsAndEditors:42,numberOfWosCitations:17,numberOfCrossrefCitations:16,numberOfDimensionsCitations:19,videoUrl:null,fallbackUrl:null,description:null},booksByTopicFilter:{topicId:"221",sort:"-publishedDate",limit:12,offset:0},booksByTopicCollection:[{type:"book",id:"7357",title:"New Ideas Concerning Black Holes and the Universe",subtitle:null,isOpenForSubmission:!1,hash:"0c081ffdc6173f4c7d7d2d47231f61b9",slug:"new-ideas-concerning-black-holes-and-the-universe",bookSignature:"Eugene Tatum",coverURL:"https://cdn.intechopen.com/books/images_new/7357.jpg",editedByType:"Edited by",editors:[{id:"261441",title:"Dr.",name:"Eugene",middleName:"Terry",surname:"Tatum",slug:"eugene-tatum",fullName:"Eugene Tatum"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"6768",title:"Cosmic Rays",subtitle:null,isOpenForSubmission:!1,hash:"1578350f18d0bc3abfbcf62278630739",slug:"cosmic-rays",bookSignature:"Zbigniew Szadkowski",coverURL:"https://cdn.intechopen.com/books/images_new/6768.jpg",editedByType:"Edited by",editors:[{id:"67836",title:"Prof.",name:"Zbigniew Piotr",middleName:null,surname:"Szadkowski",slug:"zbigniew-piotr-szadkowski",fullName:"Zbigniew Piotr Szadkowski"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"5918",title:"Trends in Modern Cosmology",subtitle:null,isOpenForSubmission:!1,hash:"6fbfd7e2f33ac06d54517d3b52005231",slug:"trends-in-modern-cosmology",bookSignature:"Abraao Jesse Capistrano de Souza",coverURL:"https://cdn.intechopen.com/books/images_new/5918.jpg",editedByType:"Edited by",editors:[{id:"52362",title:"Dr.",name:"Abraao",middleName:"Jesse",surname:"Capistrano",slug:"abraao-capistrano",fullName:"Abraao Capistrano"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}],booksByTopicTotal:3,seriesByTopicCollection:[],seriesByTopicTotal:0,mostCitedChapters:[{id:"54849",doi:"10.5772/68113",title:"Superfluid Quantum Space and Evolution of the Universe",slug:"superfluid-quantum-space-and-evolution-of-the-universe",totalDownloads:1759,totalCrossrefCites:5,totalDimensionsCites:6,abstract:"We assume that dark energy and dark matter filling up the whole cosmic space behave as a special superfluid, here named “superfluid quantum space.” We analyze the relationship between intrinsic pressure of SQS (dark energy's repulsive force) and gravity, described as an inflow of dark energy into massive particles, causing a negative pressure gradient around massive bodies. Since no superfluid has exact zero viscosity, we analyze the consequences of SQS’s viscosity on light propagation, and we show that a static Universe could be possible, by solving a modified Navier-Stokes equation. Indeed, Hubble’s law may actually refer to tired light, though described as energy loss due to SQS’s nonzero viscosity instead of Compton scattering, bypassing known historical problems concerning tired light. We see that SQS’s viscosity may also account for the Pioneer anomaly. Our evaluation gives a magnitude of the anomalous acceleration aP = −HΛc = −8.785°10−10 ms−2. Here, HΛ is the Hubble parameter loaded by the cosmological constant Λ. Furthermore, the vorticity equation stemming from the modified Navier-Stokes equation gives a solution for flat profile of the orbital speed of spiral galaxies and discloses what one might call a breathing of galaxies due to energy exchange between the galactic vortex and dark energy.",book:{id:"5918",slug:"trends-in-modern-cosmology",title:"Trends in Modern Cosmology",fullTitle:"Trends in Modern Cosmology"},signatures:"Valeriy I. Sbitnev and Marco Fedi",authors:[{id:"93881",title:"Dr.",name:"Valeriy",middleName:null,surname:"Sbitnev",slug:"valeriy-sbitnev",fullName:"Valeriy Sbitnev"},{id:"200600",title:"Dr.",name:"Marco",middleName:null,surname:"Fedi",slug:"marco-fedi",fullName:"Marco Fedi"}]},{id:"60002",doi:"10.5772/intechopen.75426",title:"Cosmic Ray Muons as Penetrating Probes to Explore the World around Us",slug:"cosmic-ray-muons-as-penetrating-probes-to-explore-the-world-around-us",totalDownloads:1362,totalCrossrefCites:3,totalDimensionsCites:5,abstract:"Secondary cosmic muons provide a powerful probe to explore various aspects of the world around us. Various physical processes have been employed over the last years for such applications. Muon absorption was used to probe the interior of natural and man-made structures, from the Egypt pyramids to big volcanoes, contributing to interdisciplinary studies. Multiple scattering was employed to reconstruct the location of scattering centres, producing 2D and 3D images of the interior of hidden volumes (muon tomography). Additional possibilities of cosmic muons have been exploited even for the alignment of large civil structures and in the study of their stability. All these applications benefit from the development of advanced detection techniques and improvement in software algorithms. This contribution surveys the state of the art of these applications, with special emphasis on their possibilities and limitations.",book:{id:"6768",slug:"cosmic-rays",title:"Cosmic Rays",fullTitle:"Cosmic Rays"},signatures:"Paola La Rocca, Domenico Lo Presti and Francesco Riggi",authors:[{id:"18197",title:"Dr.",name:"Francesco",middleName:null,surname:"Riggi",slug:"francesco-riggi",fullName:"Francesco Riggi"},{id:"18200",title:"Dr.",name:"Paola",middleName:null,surname:"La Rocca",slug:"paola-la-rocca",fullName:"Paola La Rocca"},{id:"243971",title:"Dr.",name:"Domenico",middleName:null,surname:"Lo Presti",slug:"domenico-lo-presti",fullName:"Domenico Lo Presti"}]},{id:"54705",doi:"10.5772/68116",title:"The Impact of Baryons on the Large-Scale Structure of the Universe",slug:"the-impact-of-baryons-on-the-large-scale-structure-of-the-universe",totalDownloads:1455,totalCrossrefCites:3,totalDimensionsCites:3,abstract:"Numerical simulations play an important role in current astronomy researches. Previous dark-matter-only simulations have represented the large-scale structure of the Universe. However, nowadays, hydro-dynamical simulations with baryonic models, which can directly present realistic galaxies, may twist these results from dark-matter-only simulations. In this chapter, we mainly focus on these three statistical methods: power spectrum, two-point correlation function and halo mass function, which are normally used to characterize the large-scale structure of the Universe. We review how these baryon processes influence the cosmology structures from very large scale to quasi-linear and non-linear scales by comparing dark-matter-only simulations with their hydro-dynamical counterparts. At last, we make a brief discussion on the impacts coming from different baryon models and simulation codes.",book:{id:"5918",slug:"trends-in-modern-cosmology",title:"Trends in Modern Cosmology",fullTitle:"Trends in Modern Cosmology"},signatures:"Weiguang Cui and Youcai Zhang",authors:[{id:"199688",title:"Dr.",name:"Weiguang",middleName:null,surname:"Cui",slug:"weiguang-cui",fullName:"Weiguang Cui"},{id:"205491",title:"Dr.",name:"Youcai",middleName:null,surname:"Zhang",slug:"youcai-zhang",fullName:"Youcai Zhang"}]},{id:"61637",doi:"10.5772/intechopen.76283",title:"Gamma Ray Bursts: Progenitors, Accretion in the Central Engine, Jet Acceleration Mechanisms",slug:"gamma-ray-bursts-progenitors-accretion-in-the-central-engine-jet-acceleration-mechanisms",totalDownloads:919,totalCrossrefCites:0,totalDimensionsCites:1,abstract:"The collapsar model was proposed to explain the long-duration gamma ray bursts (GRBs), while the short GRBs are associated with the mergers of compact objects. In the first case, mainly the energetics of the events is consistent with the proposed progenitor models, while the duration, time variability, as well as the afterglow emission may shed some light on the detailed properties of the collapsing massive stars. In the latter case, the recent discovery of the binary neutron star (NS-NS) merger in the gravitational wave observation made by LIGO (GW170817) and the detection of associated electromagnetic counterparts, for the first time, gave a direct proof of the NS-NS merger being a progenitor of a short GRB. In general, all GRBs are believed to be powered by accretion through a rotationally supported torus, or by fast rotation of a compact object. For long ones, the rotation of the progenitor star is a key property in order to support accretion over relatively long activity periods and also to sustain the rotation of the black hole itself. The latter is responsible for ejection of the relativistic jets, which are powered due to the extraction of the BH rotational energy, mitigated by the accretion torus, and magnetic fields. The jets must break through the stellar envelope though, which poses a question on the efficiency of this process. Similar mechanisms of powering the jet ejection may act in short GRBs, which in this case may freely propagate through the interstellar medium. The power of the jets launched from the rotating black hole is at first associated mostly with the magnetic Poynting flux, and then, at large distances it is transferred to the kinetic and finally radiative energy of the expanding shells. Beyond the radiative processes expected to take place in the jet propagation phase after the stellar envelope crossing, the significant fraction of the jet acceleration is expected to take place inside the stellar envelope and just right after it in the case of a significant decrease of the exterior pressure support. The implications of the hot cocoon formed during the penetration of the stellar body and the interaction of the outflow with the surrounding material are crucial not only for the outflow collimation but also provide specific observational imprints with most notorious observed panchromatic break in the afterglow lightcurves. Thus a significant number of models have been developed for both matter and Poynting dominated otuflows. In this chapter, we discuss these processes from the theoretical point of view and we highlight the mechanisms responsible for the ultimate production of electromagnetic transients called GRBs. We also speculate on the possible GRB-GW associacion scenarios. Finally, in the context of the recently discovered short GRB and its extended multiwalength emission, we present a model that connects the neutron-rich ejecta launched from the accreting torus in the GRB engine with the production of the unstable heavy isotopes produced in the so-called r-process. The radioactive decay of these isotopes is the source of additional emission observed in optical/infrared wavelengths and was confirmed to be found in a number of sources.",book:{id:"6768",slug:"cosmic-rays",title:"Cosmic Rays",fullTitle:"Cosmic Rays"},signatures:"Agnieszka Janiuk and Konstantinos Sapountzis",authors:[{id:"239614",title:"Associate Prof.",name:"Agnieszka",middleName:null,surname:"Janiuk",slug:"agnieszka-janiuk",fullName:"Agnieszka Janiuk"},{id:"240376",title:"Dr.",name:"Konstantinos",middleName:null,surname:"Sapountzis",slug:"konstantinos-sapountzis",fullName:"Konstantinos Sapountzis"}]},{id:"61639",doi:"10.5772/intechopen.77052",title:"Exploration of Solar Cosmic Ray Sources by Means of Particle Energy Spectra",slug:"exploration-of-solar-cosmic-ray-sources-by-means-of-particle-energy-spectra",totalDownloads:976,totalCrossrefCites:0,totalDimensionsCites:1,abstract:"Through the analysis of the energy spectrum of 12 ground level enhancements (GLE) of solar protons, a contribution in the understanding of the generation process of flare particles is attempted. Theoretical spectra of protons are derived by considering either they do not lose energy within the acceleration volume or that they are decelerated during the acceleration process. By comparing the theoretical source spectra with the experimental spectra, it is claimed that the generation process of solar particles develops under three main temperature regimes: the efficiency of particles acceleration is relatively high in cold-regimens decreasing while increasing the temperature of the medium. It is shown that in some events energy losses are able to modulate the acceleration spectrum within the source during the short time scale of the phenomenon, whereas in other events energy losses are completely negligible during the acceleration. It is argued that acceleration takes place in closed magnetic field lines and predicted the expansion and compression of the source material in association with the generation process of particles. This study allows us to estimate the range of variation from event to event of several parameters of the source and the acceleration process itself.",book:{id:"6768",slug:"cosmic-rays",title:"Cosmic Rays",fullTitle:"Cosmic Rays"},signatures:"Jorge Perez-Peraza and Juan C. Márquez-Adame",authors:[{id:"92548",title:"Dr.",name:"Jorge",middleName:null,surname:"Perez-Peraza",slug:"jorge-perez-peraza",fullName:"Jorge Perez-Peraza"},{id:"248825",title:"Dr.",name:"Juan Carlos",middleName:null,surname:"Marquez Adame",slug:"juan-carlos-marquez-adame",fullName:"Juan Carlos Marquez Adame"}]}],mostDownloadedChaptersLast30Days:[{id:"54580",title:"The Importance of Cosmology in Culture: Contexts and Consequences",slug:"the-importance-of-cosmology-in-culture-contexts-and-consequences",totalDownloads:3258,totalCrossrefCites:1,totalDimensionsCites:1,abstract:"Scientific cosmology is the study of the universe through astronomy and physics. However, cosmology also has a significant cultural impact. People construct anthropological cosmologies (notions about the way the world works), drawing in scientific theories in order to construct models for activities in disciplines, such as politics and psychology. In addition, the arts (literature, film and painting, for example) comment on cosmological ideas and use them to develop plot lines and content. This chapter illustrates examples of such work, arguing that scientific cosmology should be understood as a significant cultural influence.",book:{id:"5918",slug:"trends-in-modern-cosmology",title:"Trends in Modern Cosmology",fullTitle:"Trends in Modern Cosmology"},signatures:"Nicholas Campion",authors:[{id:"200410",title:"Dr.",name:"Nicholas",middleName:null,surname:"Campion",slug:"nicholas-campion",fullName:"Nicholas Campion"}]},{id:"55416",title:"Constraining the Parameters of a Model for Cold Dark Matter",slug:"constraining-the-parameters-of-a-model-for-cold-dark-matter",totalDownloads:1259,totalCrossrefCites:0,totalDimensionsCites:0,abstract:"This chapter aims at reviewing how modeling cold dark matter as weakly interacting massive particles (WIMPs) gets increasingly constrained as models have to face stringent cosmological and phenomenological experimental results as well as internal theoretical requirements like those coming from a renormalization-group analysis. The review is based on the work done on a two-singlet extension of the Standard Model of elementary particles. We conclude that the model stays viable in physically meaningful regions that soon will be probed by direct-detection experiments.",book:{id:"5918",slug:"trends-in-modern-cosmology",title:"Trends in Modern Cosmology",fullTitle:"Trends in Modern Cosmology"},signatures:"Abdessamad Abada and Salah Nasri",authors:[{id:"54894",title:"Prof.",name:"Salah",middleName:null,surname:"Nasri",slug:"salah-nasri",fullName:"Salah Nasri"},{id:"61340",title:"Dr.",name:"Abdessamad",middleName:null,surname:"Abada",slug:"abdessamad-abada",fullName:"Abdessamad Abada"}]},{id:"69434",title:"Applications of the Abelian Vortex Model to Cosmic Strings and the Universe Evolution",slug:"applications-of-the-abelian-vortex-model-to-cosmic-strings-and-the-universe-evolution",totalDownloads:761,totalCrossrefCites:0,totalDimensionsCites:0,abstract:"Due to the wide range of applications and effects of the Abelian vortex model of Nielsen and Olesen in the many areas of physics, ranging from condensed matter to astrophysical effects, some work in the literature is necessary to approach this topic in a succinct form that the undergraduate student in both physics and related areas has the possibility to know and understand. The mechanisms associated with this vortex model indicate him as a strong candidate for the source for the topological defects proposed by Vilenkin.",book:{id:"7357",slug:"new-ideas-concerning-black-holes-and-the-universe",title:"New Ideas Concerning Black Holes and the Universe",fullTitle:"New Ideas Concerning Black Holes and the Universe"},signatures:"Mikael Souto Maior de Sousa and Anderson Alves de Lima",authors:[{id:"274390",title:"Dr.",name:"Mikael Souto",middleName:null,surname:"Maior De Sousa",slug:"mikael-souto-maior-de-sousa",fullName:"Mikael Souto Maior De Sousa"},{id:"284103",title:"Dr.",name:"Anderson",middleName:null,surname:"Alves De Lima",slug:"anderson-alves-de-lima",fullName:"Anderson Alves De Lima"}]},{id:"54849",title:"Superfluid Quantum Space and Evolution of the Universe",slug:"superfluid-quantum-space-and-evolution-of-the-universe",totalDownloads:1759,totalCrossrefCites:5,totalDimensionsCites:6,abstract:"We assume that dark energy and dark matter filling up the whole cosmic space behave as a special superfluid, here named “superfluid quantum space.” We analyze the relationship between intrinsic pressure of SQS (dark energy's repulsive force) and gravity, described as an inflow of dark energy into massive particles, causing a negative pressure gradient around massive bodies. Since no superfluid has exact zero viscosity, we analyze the consequences of SQS’s viscosity on light propagation, and we show that a static Universe could be possible, by solving a modified Navier-Stokes equation. Indeed, Hubble’s law may actually refer to tired light, though described as energy loss due to SQS’s nonzero viscosity instead of Compton scattering, bypassing known historical problems concerning tired light. We see that SQS’s viscosity may also account for the Pioneer anomaly. Our evaluation gives a magnitude of the anomalous acceleration aP = −HΛc = −8.785°10−10 ms−2. Here, HΛ is the Hubble parameter loaded by the cosmological constant Λ. Furthermore, the vorticity equation stemming from the modified Navier-Stokes equation gives a solution for flat profile of the orbital speed of spiral galaxies and discloses what one might call a breathing of galaxies due to energy exchange between the galactic vortex and dark energy.",book:{id:"5918",slug:"trends-in-modern-cosmology",title:"Trends in Modern Cosmology",fullTitle:"Trends in Modern Cosmology"},signatures:"Valeriy I. Sbitnev and Marco Fedi",authors:[{id:"93881",title:"Dr.",name:"Valeriy",middleName:null,surname:"Sbitnev",slug:"valeriy-sbitnev",fullName:"Valeriy Sbitnev"},{id:"200600",title:"Dr.",name:"Marco",middleName:null,surname:"Fedi",slug:"marco-fedi",fullName:"Marco Fedi"}]},{id:"60002",title:"Cosmic Ray Muons as Penetrating Probes to Explore the World around Us",slug:"cosmic-ray-muons-as-penetrating-probes-to-explore-the-world-around-us",totalDownloads:1363,totalCrossrefCites:3,totalDimensionsCites:5,abstract:"Secondary cosmic muons provide a powerful probe to explore various aspects of the world around us. Various physical processes have been employed over the last years for such applications. Muon absorption was used to probe the interior of natural and man-made structures, from the Egypt pyramids to big volcanoes, contributing to interdisciplinary studies. Multiple scattering was employed to reconstruct the location of scattering centres, producing 2D and 3D images of the interior of hidden volumes (muon tomography). Additional possibilities of cosmic muons have been exploited even for the alignment of large civil structures and in the study of their stability. All these applications benefit from the development of advanced detection techniques and improvement in software algorithms. This contribution surveys the state of the art of these applications, with special emphasis on their possibilities and limitations.",book:{id:"6768",slug:"cosmic-rays",title:"Cosmic Rays",fullTitle:"Cosmic Rays"},signatures:"Paola La Rocca, Domenico Lo Presti and Francesco Riggi",authors:[{id:"18197",title:"Dr.",name:"Francesco",middleName:null,surname:"Riggi",slug:"francesco-riggi",fullName:"Francesco Riggi"},{id:"18200",title:"Dr.",name:"Paola",middleName:null,surname:"La Rocca",slug:"paola-la-rocca",fullName:"Paola La Rocca"},{id:"243971",title:"Dr.",name:"Domenico",middleName:null,surname:"Lo Presti",slug:"domenico-lo-presti",fullName:"Domenico Lo Presti"}]}],onlineFirstChaptersFilter:{topicId:"221",limit:6,offset:0},onlineFirstChaptersCollection:[],onlineFirstChaptersTotal:0},preDownload:{success:null,errors:{}},subscriptionForm:{success:null,errors:{}},aboutIntechopen:{},privacyPolicy:{},peerReviewing:{},howOpenAccessPublishingWithIntechopenWorks:{},sponsorshipBooks:{sponsorshipBooks:[],offset:0,limit:8,total:null},allSeries:{pteSeriesList:[{id:"14",title:"Artificial Intelligence",numberOfPublishedBooks:9,numberOfPublishedChapters:87,numberOfOpenTopics:6,numberOfUpcomingTopics:0,issn:"2633-1403",doi:"10.5772/intechopen.79920",isOpenForSubmission:!0},{id:"7",title:"Biomedical Engineering",numberOfPublishedBooks:12,numberOfPublishedChapters:98,numberOfOpenTopics:3,numberOfUpcomingTopics:0,issn:"2631-5343",doi:"10.5772/intechopen.71985",isOpenForSubmission:!0}],lsSeriesList:[{id:"11",title:"Biochemistry",numberOfPublishedBooks:27,numberOfPublishedChapters:288,numberOfOpenTopics:4,numberOfUpcomingTopics:0,issn:"2632-0983",doi:"10.5772/intechopen.72877",isOpenForSubmission:!0},{id:"25",title:"Environmental Sciences",numberOfPublishedBooks:1,numberOfPublishedChapters:9,numberOfOpenTopics:4,numberOfUpcomingTopics:0,issn:"2754-6713",doi:"10.5772/intechopen.100362",isOpenForSubmission:!0},{id:"10",title:"Physiology",numberOfPublishedBooks:11,numberOfPublishedChapters:139,numberOfOpenTopics:4,numberOfUpcomingTopics:0,issn:"2631-8261",doi:"10.5772/intechopen.72796",isOpenForSubmission:!0}],hsSeriesList:[{id:"3",title:"Dentistry",numberOfPublishedBooks:8,numberOfPublishedChapters:129,numberOfOpenTopics:0,numberOfUpcomingTopics:2,issn:"2631-6218",doi:"10.5772/intechopen.71199",isOpenForSubmission:!1},{id:"6",title:"Infectious Diseases",numberOfPublishedBooks:13,numberOfPublishedChapters:107,numberOfOpenTopics:3,numberOfUpcomingTopics:1,issn:"2631-6188",doi:"10.5772/intechopen.71852",isOpenForSubmission:!0},{id:"13",title:"Veterinary Medicine and Science",numberOfPublishedBooks:10,numberOfPublishedChapters:103,numberOfOpenTopics:3,numberOfUpcomingTopics:0,issn:"2632-0517",doi:"10.5772/intechopen.73681",isOpenForSubmission:!0}],sshSeriesList:[{id:"22",title:"Business, Management and Economics",numberOfPublishedBooks:1,numberOfPublishedChapters:12,numberOfOpenTopics:2,numberOfUpcomingTopics:1,issn:"2753-894X",doi:"10.5772/intechopen.100359",isOpenForSubmission:!0},{id:"23",title:"Education and Human Development",numberOfPublishedBooks:0,numberOfPublishedChapters:0,numberOfOpenTopics:2,numberOfUpcomingTopics:0,issn:null,doi:"10.5772/intechopen.100360",isOpenForSubmission:!1},{id:"24",title:"Sustainable Development",numberOfPublishedBooks:0,numberOfPublishedChapters:11,numberOfOpenTopics:4,numberOfUpcomingTopics:1,issn:null,doi:"10.5772/intechopen.100361",isOpenForSubmission:!0}],testimonialsList:[{id:"6",text:"It is great to work with the IntechOpen to produce a worthwhile collection of research that also becomes a great educational resource and guide for future research endeavors.",author:{id:"259298",name:"Edward",surname:"Narayan",institutionString:null,profilePictureURL:"https://mts.intechopen.com/storage/users/259298/images/system/259298.jpeg",slug:"edward-narayan",institution:{id:"3",name:"University of Queensland",country:{id:null,name:"Australia"}}}},{id:"13",text:"The collaboration with and support of the technical staff of IntechOpen is fantastic. The whole process of submitting an article and editing of the submitted article goes extremely smooth and fast, the number of reads and downloads of chapters is high, and the contributions are also frequently cited.",author:{id:"55578",name:"Antonio",surname:"Jurado-Navas",institutionString:null,profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0030O00002bRisIQAS/Profile_Picture_1626166543950",slug:"antonio-jurado-navas",institution:{id:"720",name:"University of Malaga",country:{id:null,name:"Spain"}}}}]},series:{item:{id:"11",title:"Biochemistry",doi:"10.5772/intechopen.72877",issn:"2632-0983",scope:"Biochemistry, the study of chemical transformations occurring within living organisms, impacts all areas of life sciences, from molecular crystallography and genetics to ecology, medicine, and population biology. Biochemistry examines macromolecules - proteins, nucleic acids, carbohydrates, and lipids – and their building blocks, structures, functions, and interactions. Much of biochemistry is devoted to enzymes, proteins that catalyze chemical reactions, enzyme structures, mechanisms of action and their roles within cells. Biochemistry also studies small signaling molecules, coenzymes, inhibitors, vitamins, and hormones, which play roles in life processes. Biochemical experimentation, besides coopting classical chemistry methods, e.g., chromatography, adopted new techniques, e.g., X-ray diffraction, electron microscopy, NMR, radioisotopes, and developed sophisticated microbial genetic tools, e.g., auxotroph mutants and their revertants, fermentation, etc. More recently, biochemistry embraced the ‘big data’ omics systems. Initial biochemical studies have been exclusively analytic: dissecting, purifying, and examining individual components of a biological system; in the apt words of Efraim Racker (1913 –1991), “Don’t waste clean thinking on dirty enzymes.” Today, however, biochemistry is becoming more agglomerative and comprehensive, setting out to integrate and describe entirely particular biological systems. The ‘big data’ metabolomics can define the complement of small molecules, e.g., in a soil or biofilm sample; proteomics can distinguish all the comprising proteins, e.g., serum; metagenomics can identify all the genes in a complex environment, e.g., the bovine rumen. This Biochemistry Series will address the current research on biomolecules and the emerging trends with great promise.",coverUrl:"https://cdn.intechopen.com/series/covers/11.jpg",latestPublicationDate:"May 24th, 2022",hasOnlineFirst:!0,numberOfPublishedBooks:27,editor:{id:"31610",title:"Dr.",name:"Miroslav",middleName:null,surname:"Blumenberg",slug:"miroslav-blumenberg",fullName:"Miroslav Blumenberg",profilePictureURL:"https://mts.intechopen.com/storage/users/31610/images/system/31610.jpg",biography:"Miroslav Blumenberg, Ph.D., was born in Subotica and received his BSc in Belgrade, Yugoslavia. He completed his Ph.D. at MIT in Organic Chemistry; he followed up his Ph.D. with two postdoctoral study periods at Stanford University. Since 1983, he has been a faculty member of the RO Perelman Department of Dermatology, NYU School of Medicine, where he is codirector of a training grant in cutaneous biology. Dr. Blumenberg’s research is focused on the epidermis, expression of keratin genes, transcription profiling, keratinocyte differentiation, inflammatory diseases and cancers, and most recently the effects of the microbiome on the skin. He has published more than 100 peer-reviewed research articles and graduated numerous Ph.D. and postdoctoral students.",institutionString:null,institution:{name:"New York University Langone Medical Center",institutionURL:null,country:{name:"United States of America"}}},editorTwo:null,editorThree:null},subseries:{paginationCount:9,paginationItems:[{id:"14",title:"Cell and Molecular Biology",coverUrl:"https://cdn.intechopen.com/series_topics/covers/14.jpg",editor:{id:"165627",title:"Dr.",name:"Rosa María",middleName:null,surname:"Martínez-Espinosa",slug:"rosa-maria-martinez-espinosa",fullName:"Rosa María Martínez-Espinosa",profilePictureURL:"https://mts.intechopen.com/storage/users/165627/images/system/165627.jpeg",biography:"Dr. Rosa María Martínez-Espinosa has been a Spanish Full Professor since 2020 (Biochemistry and Molecular Biology) and is currently Vice-President of International Relations and Cooperation development and leader of the research group 'Applied Biochemistry” (University of Alicante, Spain). Other positions she has held at the university include Vice-Dean of Master Programs, Vice-Dean of the Degree in Biology and Vice-Dean for Mobility and Enterprise and Engagement at the Faculty of Science (University of Alicante). She received her Bachelor in Biology in 1998 (University of Alicante) and her PhD in 2003 (Biochemistry, University of Alicante). She undertook post-doctoral research at the University of East Anglia (Norwich, U.K. 2004-2005; 2007-2008).\nHer multidisciplinary research focuses on investigating archaea and their potential applications in biotechnology. She has an H-index of 21. She has authored one patent and has published more than 70 indexed papers and around 60 book chapters.\nShe has contributed to more than 150 national and international meetings during the last 15 years. Her research interests include archaea metabolism, enzymes purification and characterization, gene regulation, carotenoids and bioplastics production, antioxidant\ncompounds, waste water treatments, and brines bioremediation.\nRosa María’s other roles include editorial board member for several journals related\nto biochemistry, reviewer for more than 60 journals (biochemistry, molecular biology, biotechnology, chemistry and microbiology) and president of several organizing committees in international meetings related to the N-cycle or respiratory processes.",institutionString:null,institution:{name:"University of Alicante",institutionURL:null,country:{name:"Spain"}}},editorTwo:null,editorThree:null,editorialBoard:[{id:"79367",title:"Dr.",name:"Ana Isabel",middleName:null,surname:"Flores",slug:"ana-isabel-flores",fullName:"Ana Isabel Flores",profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0030O00002bRpIOQA0/Profile_Picture_1632418099564",institutionString:null,institution:{name:"Hospital Universitario 12 De Octubre",institutionURL:null,country:{name:"Spain"}}},{id:"328234",title:"Ph.D.",name:"Christian",middleName:null,surname:"Palavecino",slug:"christian-palavecino",fullName:"Christian Palavecino",profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0033Y000030DhEhQAK/Profile_Picture_1628835318625",institutionString:null,institution:{name:"Central University of Chile",institutionURL:null,country:{name:"Chile"}}},{id:"186585",title:"Dr.",name:"Francisco Javier",middleName:null,surname:"Martin-Romero",slug:"francisco-javier-martin-romero",fullName:"Francisco Javier Martin-Romero",profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0030O00002bSB3HQAW/Profile_Picture_1631258137641",institutionString:null,institution:{name:"University of Extremadura",institutionURL:null,country:{name:"Spain"}}}]},{id:"15",title:"Chemical Biology",coverUrl:"https://cdn.intechopen.com/series_topics/covers/15.jpg",editor:{id:"441442",title:"Dr.",name:"Şükrü",middleName:null,surname:"Beydemir",slug:"sukru-beydemir",fullName:"Şükrü Beydemir",profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0033Y00003GsUoIQAV/Profile_Picture_1634557147521",biography:"Dr. Şükrü Beydemir obtained a BSc in Chemistry in 1995 from Yüzüncü Yıl University, MSc in Biochemistry in 1998, and PhD in Biochemistry in 2002 from Atatürk University, Turkey. He performed post-doctoral studies at Max-Planck Institute, Germany, and University of Florence, Italy in addition to making several scientific visits abroad. He currently works as a Full Professor of Biochemistry in the Faculty of Pharmacy, Anadolu University, Turkey. Dr. Beydemir has published over a hundred scientific papers spanning protein biochemistry, enzymology and medicinal chemistry, reviews, book chapters and presented several conferences to scientists worldwide. He has received numerous publication awards from various international scientific councils. He serves in the Editorial Board of several international journals. Dr. Beydemir is also Rector of Bilecik Şeyh Edebali University, Turkey.",institutionString:null,institution:{name:"Anadolu University",institutionURL:null,country:{name:"Turkey"}}},editorTwo:{id:"13652",title:"Prof.",name:"Deniz",middleName:null,surname:"Ekinci",slug:"deniz-ekinci",fullName:"Deniz Ekinci",profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0030O00002aYLT1QAO/Profile_Picture_1634557223079",biography:"Dr. Deniz Ekinci obtained a BSc in Chemistry in 2004, MSc in Biochemistry in 2006, and PhD in Biochemistry in 2009 from Atatürk University, Turkey. He studied at Stetson University, USA, in 2007-2008 and at the Max Planck Institute of Molecular Cell Biology and Genetics, Germany, in 2009-2010. Dr. Ekinci currently works as a Full Professor of Biochemistry in the Faculty of Agriculture and is the Head of the Enzyme and Microbial Biotechnology Division, Ondokuz Mayıs University, Turkey. He is a member of the Turkish Biochemical Society, American Chemical Society, and German Genetics society. Dr. Ekinci published around ninety scientific papers, reviews and book chapters, and presented several conferences to scientists. He has received numerous publication awards from several scientific councils. Dr. Ekinci serves as the Editor in Chief of four international books and is involved in the Editorial Board of several international journals.",institutionString:null,institution:{name:"Ondokuz Mayıs University",institutionURL:null,country:{name:"Turkey"}}},editorThree:null,editorialBoard:[{id:"241413",title:"Dr.",name:"Azhar",middleName:null,surname:"Rasul",slug:"azhar-rasul",fullName:"Azhar Rasul",profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0030O00002bRT1oQAG/Profile_Picture_1635251978933",institutionString:null,institution:{name:"Government College University, Faisalabad",institutionURL:null,country:{name:"Pakistan"}}},{id:"178316",title:"Ph.D.",name:"Sergey",middleName:null,surname:"Sedykh",slug:"sergey-sedykh",fullName:"Sergey Sedykh",profilePictureURL:"https://mts.intechopen.com/storage/users/178316/images/system/178316.jfif",institutionString:null,institution:{name:"Novosibirsk State University",institutionURL:null,country:{name:"Russia"}}}]},{id:"17",title:"Metabolism",coverUrl:"https://cdn.intechopen.com/series_topics/covers/17.jpg",editor:{id:"138626",title:"Dr.",name:"Yannis",middleName:null,surname:"Karamanos",slug:"yannis-karamanos",fullName:"Yannis Karamanos",profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0030O00002g6Jv2QAE/Profile_Picture_1629356660984",biography:"Yannis Karamanos, born in Greece in 1953, completed his pre-graduate studies at the Université Pierre et Marie Curie, Paris, then his Masters and Doctoral degree at the Université de Lille (1983). He was associate professor at the University of Limoges (1987) before becoming full professor of biochemistry at the Université d’Artois (1996). He worked on the structure-function relationships of glycoconjugates and his main project was the investigations on the biological roles of the de-N-glycosylation enzymes (Endo-N-acetyl-β-D-glucosaminidase and peptide-N4-(N-acetyl-β-glucosaminyl) asparagine amidase). From 2002 he contributes to the understanding of the Blood-brain barrier functioning using proteomics approaches. He has published more than 70 papers. His teaching areas are energy metabolism and regulation, integration and organ specialization and metabolic adaptation.",institutionString:null,institution:{name:"Artois University",institutionURL:null,country:{name:"France"}}},editorTwo:null,editorThree:null,editorialBoard:[{id:"243049",title:"Dr.",name:"Anca",middleName:null,surname:"Pantea Stoian",slug:"anca-pantea-stoian",fullName:"Anca Pantea Stoian",profilePictureURL:"https://mts.intechopen.com/storage/users/243049/images/system/243049.jpg",institutionString:null,institution:{name:"Carol Davila University of Medicine and Pharmacy",institutionURL:null,country:{name:"Romania"}}},{id:"203824",title:"Dr.",name:"Attilio",middleName:null,surname:"Rigotti",slug:"attilio-rigotti",fullName:"Attilio Rigotti",profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",institutionString:null,institution:{name:"Pontifical Catholic University of Chile",institutionURL:null,country:{name:"Chile"}}},{id:"300470",title:"Dr.",name:"Yanfei (Jacob)",middleName:null,surname:"Qi",slug:"yanfei-(jacob)-qi",fullName:"Yanfei (Jacob) Qi",profilePictureURL:"https://mts.intechopen.com/storage/users/300470/images/system/300470.jpg",institutionString:null,institution:{name:"Centenary Institute of Cancer Medicine and Cell Biology",institutionURL:null,country:{name:"Australia"}}}]},{id:"18",title:"Proteomics",coverUrl:"https://cdn.intechopen.com/series_topics/covers/18.jpg",editor:{id:"200689",title:"Prof.",name:"Paolo",middleName:null,surname:"Iadarola",slug:"paolo-iadarola",fullName:"Paolo Iadarola",profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0030O00002bSCl8QAG/Profile_Picture_1623568118342",biography:"Paolo Iadarola graduated with a degree in Chemistry from the University of Pavia (Italy) in July 1972. He then worked as an Assistant Professor at the Faculty of Science of the same University until 1984. In 1985, Prof. Iadarola became Associate Professor at the Department of Biology and Biotechnologies of the University of Pavia and retired in October 2017. Since then, he has been working as an Adjunct Professor in the same Department at the University of Pavia. His research activity during the first years was primarily focused on the purification and structural characterization of enzymes from animal and plant sources. During this period, Prof. Iadarola familiarized himself with the conventional techniques used in column chromatography, spectrophotometry, manual Edman degradation, and electrophoresis). Since 1995, he has been working on: i) the determination in biological fluids (serum, urine, bronchoalveolar lavage, sputum) of proteolytic activities involved in the degradation processes of connective tissue matrix, and ii) on the identification of biological markers of lung diseases. In this context, he has developed and validated new methodologies (e.g., Capillary Electrophoresis coupled to Laser-Induced Fluorescence, CE-LIF) whose application enabled him to determine both the amounts of biochemical markers (Desmosines) in urine/serum of patients affected by Chronic Obstructive Pulmonary Disease (COPD) and the activity of proteolytic enzymes (Human Neutrophil Elastase, Cathepsin G, Pseudomonas aeruginosa elastase) in sputa of these patients. More recently, Prof. Iadarola was involved in developing techniques such as two-dimensional electrophoresis coupled to liquid chromatography/mass spectrometry (2DE-LC/MS) for the proteomic analysis of biological fluids aimed at the identification of potential biomarkers of different lung diseases. He is the author of about 150 publications (According to Scopus: H-Index: 23; Total citations: 1568- According to WOS: H-Index: 20; Total Citations: 1296) of peer-reviewed international journals. He is a Consultant Reviewer for several journals, including the Journal of Chromatography A, Journal of Chromatography B, Plos ONE, Proteomes, International Journal of Molecular Science, Biotech, Electrophoresis, and others. He is also Associate Editor of Biotech.",institutionString:null,institution:{name:"University of Pavia",institutionURL:null,country:{name:"Italy"}}},editorTwo:{id:"201414",title:"Dr.",name:"Simona",middleName:null,surname:"Viglio",slug:"simona-viglio",fullName:"Simona Viglio",profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0030O00002bRKDHQA4/Profile_Picture_1630402531487",biography:"Simona Viglio is an Associate Professor of Biochemistry at the Department of Molecular Medicine at the University of Pavia. She has been working since 1995 on the determination of proteolytic enzymes involved in the degradation process of connective tissue matrix and on the identification of biological markers of lung diseases. She gained considerable experience in developing and validating new methodologies whose applications allowed her to determine both the amount of biomarkers (Desmosine and Isodesmosine) in the urine of patients affected by COPD, and the activity of proteolytic enzymes (HNE, Cathepsin G, Pseudomonas aeruginosa elastase) in the sputa of these patients. Simona Viglio was also involved in research dealing with the supplementation of amino acids in patients with brain injury and chronic heart failure. She is presently engaged in the development of 2-DE and LC-MS techniques for the study of proteomics in biological fluids. The aim of this research is the identification of potential biomarkers of lung diseases. She is an author of about 90 publications (According to Scopus: H-Index: 23; According to WOS: H-Index: 20) on peer-reviewed journals, a member of the “Società Italiana di Biochimica e Biologia Molecolare,“ and a Consultant Reviewer for International Journal of Molecular Science, Journal of Chromatography A, COPD, Plos ONE and Nutritional Neuroscience.",institutionString:null,institution:{name:"University of Pavia",institutionURL:null,country:{name:"Italy"}}},editorThree:null,editorialBoard:[{id:"72288",title:"Dr.",name:"Arli Aditya",middleName:null,surname:"Parikesit",slug:"arli-aditya-parikesit",fullName:"Arli Aditya Parikesit",profilePictureURL:"https://mts.intechopen.com/storage/users/72288/images/system/72288.jpg",institutionString:null,institution:{name:"Indonesia International Institute for Life Sciences",institutionURL:null,country:{name:"Indonesia"}}},{id:"40928",title:"Dr.",name:"Cesar",middleName:null,surname:"Lopez-Camarillo",slug:"cesar-lopez-camarillo",fullName:"Cesar Lopez-Camarillo",profilePictureURL:"https://mts.intechopen.com/storage/users/40928/images/3884_n.png",institutionString:null,institution:{name:"Universidad Autónoma de la Ciudad de México",institutionURL:null,country:{name:"Mexico"}}},{id:"81926",title:"Dr.",name:"Shymaa",middleName:null,surname:"Enany",slug:"shymaa-enany",fullName:"Shymaa Enany",profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0030O00002bRqB9QAK/Profile_Picture_1626163237970",institutionString:null,institution:{name:"Suez Canal University",institutionURL:null,country:{name:"Egypt"}}}]}]},overviewPageOFChapters:{paginationCount:0,paginationItems:[]},overviewPagePublishedBooks:{paginationCount:1,paginationItems:[{type:"book",id:"10843",title:"Persistent Organic Pollutants (POPs)",subtitle:"Monitoring, Impact and Treatment",coverURL:"https://cdn.intechopen.com/books/images_new/10843.jpg",slug:"persistent-organic-pollutants-pops-monitoring-impact-and-treatment",publishedDate:"April 13th 2022",editedByType:"Edited by",bookSignature:"Mohamed Nageeb Rashed",hash:"f5b1589f0a990b6114fef2dadc735dd9",volumeInSeries:1,fullTitle:"Persistent Organic Pollutants (POPs) - Monitoring, Impact and Treatment",editors:[{id:"63465",title:"Prof.",name:"Mohamed Nageeb",middleName:null,surname:"Rashed",slug:"mohamed-nageeb-rashed",fullName:"Mohamed Nageeb Rashed",profilePictureURL:"https://mts.intechopen.com/storage/users/63465/images/system/63465.gif",biography:"Prof. Mohamed Nageeb Rashed is Professor of Analytical and Environmental Chemistry and former vice-dean for environmental affairs, Faculty of Science, Aswan University, Egypt. He received his Ph.D. in Environmental Analytical Chemistry from Assiut University, Egypt, in 1989. His research interest is in analytical and environmental chemistry with special emphasis on: (1) monitoring and assessing biological trace elements and toxic metals in human blood, urine, water, crops, vegetables, and medicinal plants; (2) relationships between environmental heavy metals and human diseases; (3) uses of biological indicators for monitoring water pollution; (4) environmental chemistry of lakes, rivers, and well water; (5) water and wastewater treatment by adsorption and photocatalysis techniques; (6) soil and water pollution monitoring, control, and treatment; and (7) advanced oxidation treatment. Prof. Rashed has supervised several MSc and Ph.D. theses in the field of analytical and environmental chemistry. He served as an examiner for several Ph.D. theses in analytical chemistry in India, Kazakhstan, and Botswana. He has published about ninety scientific papers in peer-reviewed international journals and several papers in national and international conferences. He participated as an invited speaker at thirty international conferences. Prof. Rashed is the editor-in-chief and an editorial board member for several international journals in the fields of chemistry and environment. He is a member of several national and international societies. He received the Egyptian State Award for Environmental Research in 2001 and the Aswan University Merit Award for Basic Science in 2020. Prof. Rashed was recognized in Stanford University’s list of the World’s Top 2% Scientists in 2020 and 2021.",institutionString:null,institution:{name:"Aswan University",institutionURL:null,country:{name:"Egypt"}}}]}]},openForSubmissionBooks:{},onlineFirstChapters:{paginationCount:43,paginationItems:[{id:"81796",title:"Apoptosis-Related Diseases and Peroxisomes",doi:"10.5772/intechopen.105052",signatures:"Meimei Wang, Yakun Liu, Ni Chen, Juan Wang and Ye Zhao",slug:"apoptosis-related-diseases-and-peroxisomes",totalDownloads:3,totalCrossrefCites:0,totalDimensionsCites:0,authors:null,book:{title:"The Metabolic Role of Peroxisome in Health and Disease",coverURL:"https://cdn.intechopen.com/books/images_new/10837.jpg",subseries:{id:"11",title:"Cell Physiology"}}},{id:"81723",title:"Peroxisomal Modulation as Therapeutic Alternative for Tackling Multiple Cancers",doi:"10.5772/intechopen.104873",signatures:"Shazia Usmani, Shadma Wahab, Abdul Hafeez, Shabana Khatoon and Syed Misbahul Hasan",slug:"peroxisomal-modulation-as-therapeutic-alternative-for-tackling-multiple-cancers",totalDownloads:3,totalCrossrefCites:0,totalDimensionsCites:0,authors:null,book:{title:"The Metabolic Role of Peroxisome in Health and Disease",coverURL:"https://cdn.intechopen.com/books/images_new/10837.jpg",subseries:{id:"11",title:"Cell Physiology"}}},{id:"81638",title:"Aging and Neuropsychiatric Disease: A General Overview of Prevalence and Trends",doi:"10.5772/intechopen.103102",signatures:"Jelena Milić",slug:"aging-and-neuropsychiatric-disease-a-general-overview-of-prevalence-and-trends",totalDownloads:14,totalCrossrefCites:0,totalDimensionsCites:0,authors:null,book:{title:"Senescence",coverURL:"https://cdn.intechopen.com/books/images_new/10935.jpg",subseries:{id:"11",title:"Cell Physiology"}}},{id:"81566",title:"New and Emerging Technologies for Integrative Ambulatory Autonomic Assessment and Intervention as a Catalyst in the Synergy of Remote Geocoded Biosensing, Algorithmic Networked Cloud Computing, Deep Learning, and Regenerative/Biomic Medicine: Further Real",doi:"10.5772/intechopen.104092",signatures:"Robert L. Drury",slug:"new-and-emerging-technologies-for-integrative-ambulatory-autonomic-assessment-and-intervention-as-a-",totalDownloads:9,totalCrossrefCites:0,totalDimensionsCites:0,authors:null,book:{title:"Autonomic Nervous System - Special Interest Topics",coverURL:"https://cdn.intechopen.com/books/images_new/10835.jpg",subseries:{id:"12",title:"Human Physiology"}}},{id:"81576",title:"Carotenoids in Thermal Adaptation of Plants and Animals",doi:"10.5772/intechopen.104537",signatures:"Ivan M. Petyaev",slug:"carotenoids-in-thermal-adaptation-of-plants-and-animals",totalDownloads:18,totalCrossrefCites:0,totalDimensionsCites:0,authors:[{name:"Ivan",surname:"Petyaev"}],book:{title:"Carotenoids - New Perspectives and Application",coverURL:"https://cdn.intechopen.com/books/images_new/10836.jpg",subseries:{id:"13",title:"Plant Physiology"}}},{id:"81358",title:"New Insights on Carotenoid Production by Gordonia alkanivorans Strain 1B",doi:"10.5772/intechopen.103919",signatures:"Tiago P. Silva, Susana M. Paixão, Ana S. Fernandes, José C. Roseiro and Luís Alves",slug:"new-insights-on-carotenoid-production-by-gordonia-alkanivorans-strain-1b",totalDownloads:13,totalCrossrefCites:0,totalDimensionsCites:0,authors:null,book:{title:"Carotenoids - New Perspectives and Application",coverURL:"https://cdn.intechopen.com/books/images_new/10836.jpg",subseries:{id:"13",title:"Plant Physiology"}}},{id:"81298",title:"Roles of Extracellular Vesicles in Cancer Metastasis",doi:"10.5772/intechopen.103798",signatures:"Eman Helmy Thabet",slug:"roles-of-extracellular-vesicles-in-cancer-metastasis",totalDownloads:20,totalCrossrefCites:0,totalDimensionsCites:0,authors:null,book:{title:"Extracellular Vesicles - Role in Diseases, Pathogenesis and Therapy",coverURL:"https://cdn.intechopen.com/books/images_new/10796.jpg",subseries:{id:"11",title:"Cell Physiology"}}},{id:"81290",title:"Musculoskeletal Abnormalities Caused by Cystic Fibrosis",doi:"10.5772/intechopen.104591",signatures:"Mark Lambrechts",slug:"musculoskeletal-abnormalities-caused-by-cystic-fibrosis",totalDownloads:13,totalCrossrefCites:0,totalDimensionsCites:0,authors:null,book:{title:"Advances in Skeletal Muscle Health and Disease",coverURL:"https://cdn.intechopen.com/books/images_new/11675.jpg",subseries:{id:"11",title:"Cell Physiology"}}},{id:"81286",title:"Potassium Derangements: A Pathophysiological Review, Diagnostic Approach, and Clinical Management",doi:"10.5772/intechopen.103016",signatures:"Sairah Sharif and Jie Tang",slug:"potassium-derangements-a-pathophysiological-review-diagnostic-approach-and-clinical-management",totalDownloads:25,totalCrossrefCites:0,totalDimensionsCites:0,authors:null,book:{title:"Potassium in Human Health",coverURL:"https://cdn.intechopen.com/books/images_new/10794.jpg",subseries:{id:"12",title:"Human Physiology"}}},{id:"81246",title:"Role of Carotenoids in Cardiovascular Disease",doi:"10.5772/intechopen.102750",signatures:"Arslan Ahmad, Sakhawat Riaz, Muhammad Shahzaib Nadeem, Umber Mubeen and Khadija Maham",slug:"role-of-carotenoids-in-cardiovascular-disease",totalDownloads:27,totalCrossrefCites:0,totalDimensionsCites:0,authors:null,book:{title:"Carotenoids - New Perspectives and Application",coverURL:"https://cdn.intechopen.com/books/images_new/10836.jpg",subseries:{id:"13",title:"Plant Physiology"}}}]},subseriesFiltersForOFChapters:[{caption:"Plant Physiology",value:13,count:5,group:"subseries"},{caption:"Human Physiology",value:12,count:13,group:"subseries"},{caption:"Cell Physiology",value:11,count:25,group:"subseries"}],publishedBooks:{paginationCount:10,paginationItems:[{type:"book",id:"10830",title:"Animal Feed Science and Nutrition",subtitle:"Production, Health and Environment",coverURL:"https://cdn.intechopen.com/books/images_new/10830.jpg",slug:"animal-feed-science-and-nutrition-production-health-and-environment",publishedDate:"May 18th 2022",editedByType:"Edited by",bookSignature:"Amlan Kumar Patra",hash:"79944fc8fbbaa329aed6fde388154832",volumeInSeries:10,fullTitle:"Animal Feed Science and Nutrition - Production, Health and Environment",editors:[{id:"310962",title:"Dr.",name:"Amlan",middleName:"Kumar",surname:"Patra",slug:"amlan-patra",fullName:"Amlan Patra",profilePictureURL:"https://mts.intechopen.com/storage/users/310962/images/system/310962.jpg",institutionString:null,institution:{name:"West Bengal University of Animal and Fishery Sciences",institutionURL:null,country:{name:"India"}}}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null},{type:"book",id:"8737",title:"Rabies Virus at the Beginning of 21st Century",subtitle:null,coverURL:"https://cdn.intechopen.com/books/images_new/8737.jpg",slug:"rabies-virus-at-the-beginning-of-21st-century",publishedDate:"May 11th 2022",editedByType:"Edited by",bookSignature:"Sergey Tkachev",hash:"49cce3f548da548c718c865feb343509",volumeInSeries:9,fullTitle:"Rabies Virus at the Beginning of 21st Century",editors:[{id:"61139",title:"Dr.",name:"Sergey",middleName:null,surname:"Tkachev",slug:"sergey-tkachev",fullName:"Sergey Tkachev",profilePictureURL:"https://mts.intechopen.com/storage/users/61139/images/system/61139.png",institutionString:"Russian Academy of Sciences",institution:{name:"Russian Academy of Sciences",institutionURL:null,country:{name:"Russia"}}}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null},{type:"book",id:"10496",title:"Advanced Studies in the 21st Century Animal Nutrition",subtitle:null,coverURL:"https://cdn.intechopen.com/books/images_new/10496.jpg",slug:"advanced-studies-in-the-21st-century-animal-nutrition",publishedDate:"December 8th 2021",editedByType:"Edited by",bookSignature:"László Babinszky, Juliana Oliveira and Edson Mauro Santos",hash:"8ffe43a82ac48b309abc3632bbf3efd0",volumeInSeries:8,fullTitle:"Advanced Studies in the 21st Century Animal Nutrition",editors:[{id:"53998",title:"Prof.",name:"László",middleName:null,surname:"Babinszky",slug:"laszlo-babinszky",fullName:"László Babinszky",profilePictureURL:"https://mts.intechopen.com/storage/users/53998/images/system/53998.png",institutionString:"University of Debrecen",institution:{name:"University of Debrecen",institutionURL:null,country:{name:"Hungary"}}}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null},{type:"book",id:"10497",title:"Canine Genetics, Health and Medicine",subtitle:null,coverURL:"https://cdn.intechopen.com/books/images_new/10497.jpg",slug:"canine-genetics-health-and-medicine",publishedDate:"June 2nd 2021",editedByType:"Edited by",bookSignature:"Catrin Rutland",hash:"b91512e31ce34032e560362e6cbccc1c",volumeInSeries:7,fullTitle:"Canine Genetics, Health and Medicine",editors:[{id:"202192",title:"Dr.",name:"Catrin",middleName:null,surname:"Rutland",slug:"catrin-rutland",fullName:"Catrin Rutland",profilePictureURL:"https://mts.intechopen.com/storage/users/202192/images/system/202192.png",institutionString:null,institution:{name:"University of Nottingham",institutionURL:null,country:{name:"United Kingdom"}}}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null},{type:"book",id:"8545",title:"Animal Reproduction in Veterinary Medicine",subtitle:null,coverURL:"https://cdn.intechopen.com/books/images_new/8545.jpg",slug:"animal-reproduction-in-veterinary-medicine",publishedDate:"January 20th 2021",editedByType:"Edited by",bookSignature:"Faruk Aral, Rita Payan-Carreira and Miguel Quaresma",hash:"13aaddf5fdbbc78387e77a7da2388bf6",volumeInSeries:6,fullTitle:"Animal Reproduction in Veterinary Medicine",editors:[{id:"25600",title:"Prof.",name:"Faruk",middleName:null,surname:"Aral",slug:"faruk-aral",fullName:"Faruk Aral",profilePictureURL:"https://mts.intechopen.com/storage/users/25600/images/system/25600.jpg",institutionString:"Independent Researcher",institution:{name:"Harran University",institutionURL:null,country:{name:"Turkey"}}}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null},{type:"book",id:"9081",title:"Equine Science",subtitle:null,coverURL:"https://cdn.intechopen.com/books/images_new/9081.jpg",slug:"equine-science",publishedDate:"September 23rd 2020",editedByType:"Edited by",bookSignature:"Catrin Rutland and Albert Rizvanov",hash:"ac415ef2f5450fa80fdb9cf6cf32cd2d",volumeInSeries:5,fullTitle:"Equine Science",editors:[{id:"202192",title:"Dr.",name:"Catrin",middleName:null,surname:"Rutland",slug:"catrin-rutland",fullName:"Catrin Rutland",profilePictureURL:"https://mts.intechopen.com/storage/users/202192/images/system/202192.png",institutionString:null,institution:{name:"University of Nottingham",institutionURL:null,country:{name:"United Kingdom"}}}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null},{type:"book",id:"8460",title:"Reproductive Biology and Technology in Animals",subtitle:null,coverURL:"https://cdn.intechopen.com/books/images_new/8460.jpg",slug:"reproductive-biology-and-technology-in-animals",publishedDate:"April 15th 2020",editedByType:"Edited by",bookSignature:"Juan Carlos Gardón Poggi and Katy Satué Ambrojo",hash:"32ef5fe73998dd723d308225d756fa1e",volumeInSeries:4,fullTitle:"Reproductive Biology and Technology in Animals",editors:[{id:"251314",title:"Dr.",name:"Juan Carlos",middleName:null,surname:"Gardón",slug:"juan-carlos-gardon",fullName:"Juan Carlos Gardón",profilePictureURL:"https://mts.intechopen.com/storage/users/251314/images/system/251314.jpeg",institutionString:"Catholic University of Valencia San Vicente Mártir, Spain",institution:null}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null},{type:"book",id:"8524",title:"Lactation in Farm Animals",subtitle:"Biology, Physiological Basis, Nutritional Requirements, and Modelization",coverURL:"https://cdn.intechopen.com/books/images_new/8524.jpg",slug:"lactation-in-farm-animals-biology-physiological-basis-nutritional-requirements-and-modelization",publishedDate:"January 22nd 2020",editedByType:"Edited by",bookSignature:"Naceur M'Hamdi",hash:"2aa2a9a0ec13040bbf0455e34625504e",volumeInSeries:3,fullTitle:"Lactation in Farm Animals - Biology, Physiological Basis, Nutritional Requirements, and Modelization",editors:[{id:"73376",title:"Dr.",name:"Naceur",middleName:null,surname:"M'Hamdi",slug:"naceur-m'hamdi",fullName:"Naceur M'Hamdi",profilePictureURL:"https://mts.intechopen.com/storage/users/73376/images/system/73376.jpg",institutionString:null,institution:null}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null},{type:"book",id:"7144",title:"Veterinary Anatomy and Physiology",subtitle:null,coverURL:"https://cdn.intechopen.com/books/images_new/7144.jpg",slug:"veterinary-anatomy-and-physiology",publishedDate:"March 13th 2019",editedByType:"Edited by",bookSignature:"Catrin Sian Rutland and Valentina Kubale",hash:"75cdacb570e0e6d15a5f6e69640d87c9",volumeInSeries:2,fullTitle:"Veterinary Anatomy and Physiology",editors:[{id:"202192",title:"Dr.",name:"Catrin",middleName:null,surname:"Rutland",slug:"catrin-rutland",fullName:"Catrin Rutland",profilePictureURL:"https://mts.intechopen.com/storage/users/202192/images/system/202192.png",institutionString:null,institution:{name:"University of Nottingham",institutionURL:null,country:{name:"United Kingdom"}}}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null},{type:"book",id:"7233",title:"New Insights into Theriogenology",subtitle:null,coverURL:"https://cdn.intechopen.com/books/images_new/7233.jpg",slug:"new-insights-into-theriogenology",publishedDate:"December 5th 2018",editedByType:"Edited by",bookSignature:"Rita Payan-Carreira",hash:"74f4147e3fb214dd050e5edd3aaf53bc",volumeInSeries:1,fullTitle:"New Insights into Theriogenology",editors:[{id:"38652",title:"Prof.",name:"Rita",middleName:null,surname:"Payan-Carreira",slug:"rita-payan-carreira",fullName:"Rita Payan-Carreira",profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0030O00002bRiFPQA0/Profile_Picture_1614601496313",institutionString:null,institution:{name:"University of Évora",institutionURL:null,country:{name:"Portugal"}}}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null}]},subseriesFiltersForPublishedBooks:[{group:"subseries",caption:"Animal Nutrition",value:20,count:2},{group:"subseries",caption:"Animal Reproductive Biology and Technology",value:28,count:3},{group:"subseries",caption:"Animal Science",value:19,count:5}],publicationYearFilters:[{group:"publicationYear",caption:"2022",value:2022,count:2},{group:"publicationYear",caption:"2021",value:2021,count:3},{group:"publicationYear",caption:"2020",value:2020,count:3},{group:"publicationYear",caption:"2019",value:2019,count:1},{group:"publicationYear",caption:"2018",value:2018,count:1}],authors:{paginationCount:617,paginationItems:[{id:"158492",title:"Prof.",name:"Yusuf",middleName:null,surname:"Tutar",slug:"yusuf-tutar",fullName:"Yusuf Tutar",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/158492/images/system/158492.jpeg",biography:"Prof. Dr. Yusuf Tutar conducts his research at the Hamidiye Faculty of Pharmacy, Department of Basic Pharmaceutical Sciences, Division of Biochemistry, University of Health Sciences, Turkey. He is also a faculty member in the Molecular Oncology Program. He obtained his MSc and Ph.D. at Oregon State University and Texas Tech University, respectively. He pursued his postdoctoral studies at Rutgers University Medical School and the National Institutes of Health (NIH/NIDDK), USA. His research focuses on biochemistry, biophysics, genetics, molecular biology, and molecular medicine with specialization in the fields of drug design, protein structure-function, protein folding, prions, microRNA, pseudogenes, molecular cancer, epigenetics, metabolites, proteomics, genomics, protein expression, and characterization by spectroscopic and calorimetric methods.",institutionString:"University of Health Sciences",institution:null},{id:"180528",title:"Dr.",name:"Hiroyuki",middleName:null,surname:"Kagechika",slug:"hiroyuki-kagechika",fullName:"Hiroyuki Kagechika",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/180528/images/system/180528.jpg",biography:"Hiroyuki Kagechika received his bachelor’s degree and Ph.D. in Pharmaceutical Sciences from the University of Tokyo, Japan, where he served as an associate professor until 2004. He is currently a professor at the Institute of Biomaterials and Bioengineering (IBB), Tokyo Medical and Dental University (TMDU). From 2010 to 2012, he was the dean of the Graduate School of Biomedical Science. Since 2012, he has served as the vice dean of the Graduate School of Medical and Dental Sciences. He has been the director of the IBB since 2020. Dr. Kagechika’s major research interests are the medicinal chemistry of retinoids, vitamins D/K, and nuclear receptors. He has developed various compounds including a drug for acute promyelocytic leukemia.",institutionString:"Tokyo Medical and Dental University",institution:{name:"Tokyo Medical and Dental University",country:{name:"Japan"}}},{id:"40482",title:null,name:"Rizwan",middleName:null,surname:"Ahmad",slug:"rizwan-ahmad",fullName:"Rizwan Ahmad",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/40482/images/system/40482.jpeg",biography:"Dr. Rizwan Ahmad is a University Professor and Coordinator, Quality and Development, College of Medicine, Imam Abdulrahman bin Faisal University, Saudi Arabia. Previously, he was Associate Professor of Human Function, Oman Medical College, Oman, and SBS University, Dehradun. Dr. Ahmad completed his education at Aligarh Muslim University, Aligarh. He has published several articles in peer-reviewed journals, chapters, and edited books. His area of specialization is free radical biochemistry and autoimmune diseases.",institutionString:"Imam Abdulrahman Bin Faisal University",institution:{name:"Imam Abdulrahman Bin Faisal University",country:{name:"Saudi Arabia"}}},{id:"41865",title:"Prof.",name:"Farid A.",middleName:null,surname:"Badria",slug:"farid-a.-badria",fullName:"Farid A. Badria",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/41865/images/system/41865.jpg",biography:"Farid A. Badria, Ph.D., is the recipient of several awards, including The World Academy of Sciences (TWAS) Prize for Public Understanding of Science; the World Intellectual Property Organization (WIPO) Gold Medal for best invention; Outstanding Arab Scholar, Kuwait; and the Khwarizmi International Award, Iran. He has 250 publications, 12 books, 20 patents, and several marketed pharmaceutical products to his credit. He continues to lead research projects on developing new therapies for liver, skin disorders, and cancer. Dr. Badria was listed among the world’s top 2% of scientists in medicinal and biomolecular chemistry in 2019 and 2020. He is a member of the Arab Development Fund, Kuwait; International Cell Research Organization–United Nations Educational, Scientific and Cultural Organization (ICRO–UNESCO), Chile; and UNESCO Biotechnology France",institutionString:"Mansoura University",institution:{name:"Mansoura University",country:{name:"Egypt"}}},{id:"329385",title:"Dr.",name:"Rajesh K.",middleName:"Kumar",surname:"Singh",slug:"rajesh-k.-singh",fullName:"Rajesh K. Singh",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/329385/images/system/329385.png",biography:"Dr. Singh received a BPharm (2003) and MPharm (2005) from Panjab University, Chandigarh, India, and a Ph.D. (2013) from Punjab Technical University (PTU), Jalandhar, India. He has more than sixteen years of teaching experience and has supervised numerous postgraduate and Ph.D. students. He has to his credit more than seventy papers in SCI- and SCOPUS-indexed journals, fifty-five conference proceedings, four books, six Best Paper Awards, and five projects from different government agencies. He is currently an editorial board member of eight international journals and a reviewer for more than fifty scientific journals. He received Top Reviewer and Excellent Peer Reviewer Awards from Publons in 2016 and 2017, respectively. He is also on the panel of The International Reviewer for reviewing research proposals for grants from the Royal Society. He also serves as a Publons Academy mentor and Bentham brand ambassador.",institutionString:"Punjab Technical University",institution:{name:"Punjab Technical University",country:{name:"India"}}},{id:"142388",title:"Dr.",name:"Thiago",middleName:"Gomes",surname:"Gomes Heck",slug:"thiago-gomes-heck",fullName:"Thiago Gomes Heck",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/142388/images/7259_n.jpg",biography:null,institutionString:null,institution:{name:"Universidade Regional do Noroeste do Estado do Rio Grande do Sul",country:{name:"Brazil"}}},{id:"336273",title:"Assistant Prof.",name:"Janja",middleName:null,surname:"Zupan",slug:"janja-zupan",fullName:"Janja Zupan",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/336273/images/14853_n.jpeg",biography:"Janja Zupan graduated in 2005 at the Department of Clinical Biochemistry (superviser prof. dr. Janja Marc) in the field of genetics of osteoporosis. Since November 2009 she is working as a Teaching Assistant at the Faculty of Pharmacy, Department of Clinical Biochemistry. In 2011 she completed part of her research and PhD work at Institute of Genetics and Molecular Medicine, University of Edinburgh. She finished her PhD entitled The influence of the proinflammatory cytokines on the RANK/RANKL/OPG in bone tissue of osteoporotic and osteoarthritic patients in 2012. From 2014-2016 she worked at the Institute of Biomedical Sciences, University of Aberdeen as a postdoctoral research fellow on UK Arthritis research project where she gained knowledge in mesenchymal stem cells and regenerative medicine. She returned back to University of Ljubljana, Faculty of Pharmacy in 2016. She is currently leading project entitled Mesenchymal stem cells-the keepers of tissue endogenous regenerative capacity facing up to aging of the musculoskeletal system funded by Slovenian Research Agency.",institutionString:null,institution:{name:"University of Ljubljana",country:{name:"Slovenia"}}},{id:"357453",title:"Dr.",name:"Radheshyam",middleName:null,surname:"Maurya",slug:"radheshyam-maurya",fullName:"Radheshyam Maurya",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/357453/images/16535_n.jpg",biography:null,institutionString:null,institution:{name:"University of Hyderabad",country:{name:"India"}}},{id:"311457",title:"Dr.",name:"Júlia",middleName:null,surname:"Scherer Santos",slug:"julia-scherer-santos",fullName:"Júlia Scherer Santos",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/311457/images/system/311457.jpg",biography:"Dr. Júlia Scherer Santos works in the areas of cosmetology, nanotechnology, pharmaceutical technology, beauty, and aesthetics. Dr. Santos also has experience as a professor of graduate courses. Graduated in Pharmacy, specialization in Cosmetology and Cosmeceuticals applied to aesthetics, specialization in Aesthetic and Cosmetic Health, and a doctorate in Pharmaceutical Nanotechnology. Teaching experience in Pharmacy and Aesthetics and Cosmetics courses. She works mainly on the following subjects: nanotechnology, cosmetology, pharmaceutical technology, aesthetics.",institutionString:"Universidade Federal de Juiz de Fora",institution:{name:"Universidade Federal de Juiz de Fora",country:{name:"Brazil"}}},{id:"219081",title:"Dr.",name:"Abdulsamed",middleName:null,surname:"Kükürt",slug:"abdulsamed-kukurt",fullName:"Abdulsamed Kükürt",position:null,profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0030O00002bRNVJQA4/Profile_Picture_2022-03-07T13:23:04.png",biography:"Dr. Kükürt graduated from Uludağ University in Turkey. He started his academic career as a Research Assistant in the Department of Biochemistry at Kafkas University. In 2019, he completed his Ph.D. program in the Department of Biochemistry at the Institute of Health Sciences. He is currently working at the Department of Biochemistry, Kafkas University. He has 27 published research articles in academic journals, 11 book chapters, and 37 papers. He took part in 10 academic projects. He served as a reviewer for many articles. He still serves as a member of the review board in many academic journals.",institutionString:null,institution:{name:"Kafkas University",country:{name:"Turkey"}}},{id:"178366",title:"Associate Prof.",name:"Volkan",middleName:null,surname:"Gelen",slug:"volkan-gelen",fullName:"Volkan Gelen",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/178366/images/system/178366.jpg",biography:"Volkan Gelen is a Physiology specialist who received his veterinary degree from Kafkas University in 2011. Between 2011-2015, he worked as an assistant at Atatürk University, Faculty of Veterinary Medicine, Department of Physiology. In 2016, he joined Kafkas University, Faculty of Veterinary Medicine, Department of Physiology as an assistant professor. Dr. Gelen has been engaged in various academic activities at Kafkas University since 2016. There he completed 5 projects and has 3 ongoing projects. He has 60 articles published in scientific journals and 20 poster presentations in scientific congresses. His research interests include physiology, endocrine system, cancer, diabetes, cardiovascular system diseases, and isolated organ bath system studies.",institutionString:"Kafkas University",institution:{name:"Kafkas University",country:{name:"Turkey"}}},{id:"418963",title:"Dr.",name:"Augustine Ododo",middleName:"Augustine",surname:"Osagie",slug:"augustine-ododo-osagie",fullName:"Augustine Ododo Osagie",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/418963/images/16900_n.jpg",biography:"Born into the family of Osagie, a prince of the Benin Kingdom. I am currently an academic in the Department of Medical Biochemistry, University of Benin. Part of the duties are to teach undergraduate students and conduct academic research.",institutionString:null,institution:{name:"University of Benin",country:{name:"Nigeria"}}},{id:"192992",title:"Prof.",name:"Shagufta",middleName:null,surname:"Perveen",slug:"shagufta-perveen",fullName:"Shagufta Perveen",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/192992/images/system/192992.png",biography:"Prof. Shagufta Perveen is a Distinguish Professor in the Department of Pharmacognosy, College of Pharmacy, King Saud University, Riyadh, Saudi Arabia. Dr. Perveen has acted as the principal investigator of major research projects funded by the research unit of King Saud University. She has more than ninety original research papers in peer-reviewed journals of international repute to her credit. She is a fellow member of the Royal Society of Chemistry UK and the American Chemical Society of the United States.",institutionString:"King Saud University",institution:{name:"King Saud University",country:{name:"Saudi Arabia"}}},{id:"49848",title:"Dr.",name:"Wen-Long",middleName:null,surname:"Hu",slug:"wen-long-hu",fullName:"Wen-Long Hu",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/49848/images/system/49848.jpg",biography:"Wen-Long Hu is Chief of the Division of Acupuncture, Department of Chinese Medicine at Kaohsiung Chang Gung Memorial Hospital, as well as an adjunct associate professor at Fooyin University and Kaohsiung Medical University. Wen-Long is President of Taiwan Traditional Chinese Medicine Medical Association. He has 28 years of experience in clinical practice in laser acupuncture therapy and 34 years in acupuncture. He is an invited speaker for lectures and workshops in laser acupuncture at many symposiums held by medical associations. He owns the patent for herbal preparation and producing, and for the supercritical fluid-treated needle. Dr. Hu has published three books, 12 book chapters, and more than 30 papers in reputed journals, besides serving as an editorial board member of repute.",institutionString:"Kaohsiung Chang Gung Memorial Hospital",institution:{name:"Kaohsiung Chang Gung Memorial Hospital",country:{name:"Taiwan"}}},{id:"298472",title:"Prof.",name:"Andrey V.",middleName:null,surname:"Grechko",slug:"andrey-v.-grechko",fullName:"Andrey V. Grechko",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/298472/images/system/298472.png",biography:"Andrey Vyacheslavovich Grechko, Ph.D., Professor, is a Corresponding Member of the Russian Academy of Sciences. He graduated from the Semashko Moscow Medical Institute (Semashko National Research Institute of Public Health) with a degree in Medicine (1998), the Clinical Department of Dermatovenerology (2000), and received a second higher education in Psychology (2009). Professor A.V. Grechko held the position of Сhief Physician of the Central Clinical Hospital in Moscow. He worked as a professor at the faculty and was engaged in scientific research at the Medical University. Starting in 2013, he has been the initiator of the creation of the Federal Scientific and Clinical Center for Intensive Care and Rehabilitology, Moscow, Russian Federation, where he also serves as Director since 2015. He has many years of experience in research and teaching in various fields of medicine, is an author/co-author of more than 200 scientific publications, 13 patents, 15 medical books/chapters, including Chapter in Book «Metabolomics», IntechOpen, 2020 «Metabolomic Discovery of Microbiota Dysfunction as the Cause of Pathology».",institutionString:"Federal Research and Clinical Center of Intensive Care Medicine and Rehabilitology",institution:null},{id:"199461",title:"Prof.",name:"Natalia V.",middleName:null,surname:"Beloborodova",slug:"natalia-v.-beloborodova",fullName:"Natalia V. Beloborodova",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/199461/images/system/199461.jpg",biography:'Natalia Vladimirovna Beloborodova was educated at the Pirogov Russian National Research Medical University, with a degree in pediatrics in 1980, a Ph.D. in 1987, and a specialization in Clinical Microbiology from First Moscow State Medical University in 2004. She has been a Professor since 1996. Currently, she is the Head of the Laboratory of Metabolism, a division of the Federal Research and Clinical Center of Intensive Care Medicine and Rehabilitology, Moscow, Russian Federation. N.V. Beloborodova has many years of clinical experience in the field of intensive care and surgery. She studies infectious complications and sepsis. She initiated a series of interdisciplinary clinical and experimental studies based on the concept of integrating human metabolism and its microbiota. Her scientific achievements are widely known: she is the recipient of the Marie E. Coates Award \\"Best lecturer-scientist\\" Gustafsson Fund, Karolinska Institutes, Stockholm, Sweden, and the International Sepsis Forum Award, Pasteur Institute, Paris, France (2014), etc. Professor N.V. Beloborodova wrote 210 papers, five books, 10 chapters and has edited four books.',institutionString:"Federal Research and Clinical Center of Intensive Care Medicine and Rehabilitology",institution:null},{id:"354260",title:"Ph.D.",name:"Tércio Elyan",middleName:"Azevedo",surname:"Azevedo Martins",slug:"tercio-elyan-azevedo-martins",fullName:"Tércio Elyan Azevedo Martins",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/354260/images/16241_n.jpg",biography:"Graduated in Pharmacy from the Federal University of Ceará with the modality in Industrial Pharmacy, Specialist in Production and Control of Medicines from the University of São Paulo (USP), Master in Pharmaceuticals and Medicines from the University of São Paulo (USP) and Doctor of Science in the program of Pharmaceuticals and Medicines by the University of São Paulo. Professor at Universidade Paulista (UNIP) in the areas of chemistry, cosmetology and trichology. Assistant Coordinator of the Higher Course in Aesthetic and Cosmetic Technology at Universidade Paulista Campus Chácara Santo Antônio. Experience in the Pharmacy area, with emphasis on Pharmacotechnics, Pharmaceutical Technology, Research and Development of Cosmetics, acting mainly on topics such as cosmetology, antioxidant activity, aesthetics, photoprotection, cyclodextrin and thermal analysis.",institutionString:null,institution:{name:"University of Sao Paulo",country:{name:"Brazil"}}},{id:"334285",title:"Ph.D. Student",name:"Sameer",middleName:"Kumar",surname:"Jagirdar",slug:"sameer-jagirdar",fullName:"Sameer Jagirdar",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/334285/images/14691_n.jpg",biography:"I\\'m a graduate student at the center for biosystems science and engineering at the Indian Institute of Science, Bangalore, India. I am interested in studying host-pathogen interactions at the biomaterial interface.",institutionString:null,institution:{name:"Indian Institute of Science Bangalore",country:{name:"India"}}},{id:"329795",title:"Dr.",name:"Mohd Aftab",middleName:"Aftab",surname:"Siddiqui",slug:"mohd-aftab-siddiqui",fullName:"Mohd Aftab Siddiqui",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/329795/images/15648_n.jpg",biography:"Dr. Mohd Aftab Siddiqui is currently working as Assistant Professor in the Faculty of Pharmacy, Integral University, Lucknow for the last 6 years. He has completed his Doctor in Philosophy (Pharmacology) in 2020 from Integral University, Lucknow. He completed his Bachelor in Pharmacy in 2013 and Master in Pharmacy (Pharmacology) in 2015 from Integral University, Lucknow. He is the gold medalist in Bachelor and Master degree. He qualified GPAT -2013, GPAT -2014, and GPAT 2015. His area of research is Pharmacological screening of herbal drugs/ natural products in liver and cardiac diseases. He has guided many M. Pharm. research projects. He has many national and international publications.",institutionString:"Integral University",institution:null},{id:"255360",title:"Dr.",name:"Usama",middleName:null,surname:"Ahmad",slug:"usama-ahmad",fullName:"Usama Ahmad",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/255360/images/system/255360.png",biography:"Dr. Usama Ahmad holds a specialization in Pharmaceutics from Amity University, Lucknow, India. He received his Ph.D. degree from Integral University. Currently, he’s working as an Assistant Professor of Pharmaceutics in the Faculty of Pharmacy, Integral University. From 2013 to 2014 he worked on a research project funded by SERB-DST, Government of India. He has a rich publication record with more than 32 original articles published in reputed journals, 3 edited books, 5 book chapters, and a number of scientific articles published in ‘Ingredients South Asia Magazine’ and ‘QualPharma Magazine’. He is a member of the American Association for Cancer Research, International Association for the Study of Lung Cancer, and the British Society for Nanomedicine. Dr. Ahmad’s research focus is on the development of nanoformulations to facilitate the delivery of drugs that aim to provide practical solutions to current healthcare problems.",institutionString:"Integral University",institution:{name:"Integral University",country:{name:"India"}}},{id:"30568",title:"Prof.",name:"Madhu",middleName:null,surname:"Khullar",slug:"madhu-khullar",fullName:"Madhu Khullar",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/30568/images/system/30568.jpg",biography:"Dr. Madhu Khullar is a Professor of Experimental Medicine and Biotechnology at the Post Graduate Institute of Medical Education and Research, Chandigarh, India. She completed her Post Doctorate in hypertension research at the Henry Ford Hospital, Detroit, USA in 1985. She is an editor and reviewer of several international journals, and a fellow and member of several cardiovascular research societies. Dr. Khullar has a keen research interest in genetics of hypertension, and is currently studying pharmacogenetics of hypertension.",institutionString:"Post Graduate Institute of Medical Education and Research",institution:{name:"Post Graduate Institute of Medical Education and Research",country:{name:"India"}}},{id:"223233",title:"Prof.",name:"Xianquan",middleName:null,surname:"Zhan",slug:"xianquan-zhan",fullName:"Xianquan Zhan",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/223233/images/system/223233.png",biography:"Xianquan Zhan received his MD and Ph.D. in Preventive Medicine at West China University of Medical Sciences. He received his post-doctoral training in oncology and cancer proteomics at the Central South University, China, and the University of Tennessee Health Science Center (UTHSC), USA. He worked at UTHSC and the Cleveland Clinic in 2001–2012 and achieved the rank of associate professor at UTHSC. Currently, he is a full professor at Central South University and Shandong First Medical University, and an advisor to MS/PhD students and postdoctoral fellows. He is also a fellow of the Royal Society of Medicine and European Association for Predictive Preventive Personalized Medicine (EPMA), a national representative of EPMA, and a member of the American Society of Clinical Oncology (ASCO) and the American Association for the Advancement of Sciences (AAAS). He is also the editor in chief of International Journal of Chronic Diseases & Therapy, an associate editor of EPMA Journal, Frontiers in Endocrinology, and BMC Medical Genomics, and a guest editor of Mass Spectrometry Reviews, Frontiers in Endocrinology, EPMA Journal, and Oxidative Medicine and Cellular Longevity. He has published more than 148 articles, 28 book chapters, 6 books, and 2 US patents in the field of clinical proteomics and biomarkers.",institutionString:"Shandong First Medical University",institution:{name:"Affiliated Hospital of Shandong Academy of Medical Sciences",country:{name:"China"}}},{id:"297507",title:"Dr.",name:"Charles",middleName:"Elias",surname:"Assmann",slug:"charles-assmann",fullName:"Charles Assmann",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/297507/images/system/297507.jpg",biography:"Charles Elias Assmann is a biologist from Federal University of Santa Maria (UFSM, Brazil), who spent some time abroad at the Ludwig-Maximilians-Universität München (LMU, Germany). He has Masters Degree in Biochemistry (UFSM), and is currently a PhD student at Biochemistry at the Department of Biochemistry and Molecular Biology of the UFSM. His areas of expertise include: Biochemistry, Molecular Biology, Enzymology, Genetics and Toxicology. He is currently working on the following subjects: Aluminium toxicity, Neuroinflammation, Oxidative stress and Purinergic system. Since 2011 he has presented more than 80 abstracts in scientific proceedings of national and international meetings. Since 2014, he has published more than 20 peer reviewed papers (including 4 reviews, 3 in Portuguese) and 2 book chapters. He has also been a reviewer of international journals and ad hoc reviewer of scientific committees from Brazilian Universities.",institutionString:"Universidade Federal de Santa Maria",institution:{name:"Universidade Federal de Santa Maria",country:{name:"Brazil"}}},{id:"217850",title:"Dr.",name:"Margarete Dulce",middleName:null,surname:"Bagatini",slug:"margarete-dulce-bagatini",fullName:"Margarete Dulce Bagatini",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/217850/images/system/217850.jpeg",biography:"Dr. Margarete Dulce Bagatini is an associate professor at the Federal University of Fronteira Sul/Brazil. She has a degree in Pharmacy and a PhD in Biological Sciences: Toxicological Biochemistry. She is a member of the UFFS Research Advisory Committee\nand a member of the Biovitta Research Institute. She is currently:\nthe leader of the research group: Biological and Clinical Studies\nin Human Pathologies, professor of postgraduate program in\nBiochemistry at UFSC and postgraduate program in Science and Food Technology at\nUFFS. She has experience in the area of pharmacy and clinical analysis, acting mainly\non the following topics: oxidative stress, the purinergic system and human pathologies, being a reviewer of several international journals and books.",institutionString:"Universidade Federal da Fronteira Sul",institution:{name:"Universidade Federal da Fronteira Sul",country:{name:"Brazil"}}},{id:"226275",title:"Ph.D.",name:"Metin",middleName:null,surname:"Budak",slug:"metin-budak",fullName:"Metin Budak",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/226275/images/system/226275.jfif",biography:"Metin Budak, MSc, PhD is an Assistant Professor at Trakya University, Faculty of Medicine. He has been Head of the Molecular Research Lab at Prof. Mirko Tos Ear and Hearing Research Center since 2018. His specializations are biophysics, epigenetics, genetics, and methylation mechanisms. He has published around 25 peer-reviewed papers, 2 book chapters, and 28 abstracts. He is a member of the Clinical Research Ethics Committee and Quantification and Consideration Committee of Medicine Faculty. His research area is the role of methylation during gene transcription, chromatin packages DNA within the cell and DNA repair, replication, recombination, and gene transcription. His research focuses on how the cell overcomes chromatin structure and methylation to allow access to the underlying DNA and enable normal cellular function.",institutionString:"Trakya University",institution:{name:"Trakya University",country:{name:"Turkey"}}},{id:"243049",title:"Dr.",name:"Anca",middleName:null,surname:"Pantea Stoian",slug:"anca-pantea-stoian",fullName:"Anca Pantea Stoian",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/243049/images/system/243049.jpg",biography:"Anca Pantea Stoian is a specialist in diabetes, nutrition, and metabolic diseases as well as health food hygiene. She also has competency in general ultrasonography.\n\nShe is an associate professor in the Diabetes, Nutrition and Metabolic Diseases Department, Carol Davila University of Medicine and Pharmacy, Bucharest, Romania. She has been chief of the Hygiene Department, Faculty of Dentistry, at the same university since 2019. Her interests include micro and macrovascular complications in diabetes and new therapies. Her research activities focus on nutritional intervention in chronic pathology, as well as cardio-renal-metabolic risk assessment, and diabetes in cancer. She is currently engaged in developing new therapies and technological tools for screening, prevention, and patient education in diabetes. \n\nShe is a member of the European Association for the Study of Diabetes, Cardiometabolic Academy, CEDA, Romanian Society of Diabetes, Nutrition and Metabolic Diseases, Romanian Diabetes Federation, and Association for Renal Metabolic and Nutrition studies. She has authored or co-authored 160 papers in national and international peer-reviewed journals.",institutionString:null,institution:{name:"Carol Davila University of Medicine and Pharmacy",country:{name:"Romania"}}},{id:"279792",title:"Dr.",name:"João",middleName:null,surname:"Cotas",slug:"joao-cotas",fullName:"João Cotas",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/279792/images/system/279792.jpg",biography:"Graduate and master in Biology from the University of Coimbra.\n\nI am a research fellow at the Macroalgae Laboratory Unit, in the MARE-UC – Marine and Environmental Sciences Centre of the University of Coimbra. My principal function is the collection, extraction and purification of macroalgae compounds, chemical and bioactive characterization of the compounds and algae extracts and development of new methodologies in marine biotechnology area. \nI am associated in two projects: one consists on discovery of natural compounds for oncobiology. The other project is the about the natural compounds/products for agricultural area.\n\nPublications:\nCotas, J.; Figueirinha, A.; Pereira, L.; Batista, T. 2018. An analysis of the effects of salinity on Fucus ceranoides (Ochrophyta, Phaeophyceae), in the Mondego River (Portugal). Journal of Oceanology and Limnology. in press. DOI: 10.1007/s00343-019-8111-3",institutionString:"Faculty of Sciences and Technology of University of Coimbra",institution:null},{id:"279788",title:"Dr.",name:"Leonel",middleName:null,surname:"Pereira",slug:"leonel-pereira",fullName:"Leonel Pereira",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/279788/images/system/279788.jpg",biography:"Leonel Pereira has an undergraduate degree in Biology, a Ph.D. in Biology (specialty in Cell Biology), and a Habilitation degree in Biosciences (specialization in Biotechnology) from the Faculty of Science and Technology, University of Coimbra, Portugal, where he is currently a professor. In addition to teaching at this university, he is an integrated researcher at the Marine and Environmental Sciences Center (MARE), Portugal. His interests include marine biodiversity (algae), marine biotechnology (algae bioactive compounds), and marine ecology (environmental assessment). Since 2008, he has been the author and editor of the electronic publication MACOI – Portuguese Seaweeds Website (www.seaweeds.uc.pt). He is also a member of the editorial boards of several scientific journals. Dr. Pereira has edited or authored more than 20 books, 100 journal articles, and 45 book chapters. He has given more than 100 lectures and oral communications at various national and international scientific events. He is the coordinator of several national and international research projects. In 1998, he received the Francisco de Holanda Award (Honorable Mention) and, more recently, the Mar Rei D. Carlos award (18th edition). He is also a winner of the 2016 CHOICE Award for an outstanding academic title for his book Edible Seaweeds of the World. In 2020, Dr. Pereira received an Honorable Mention for the Impact of International Publications from the Web of Science",institutionString:"University of Coimbra",institution:{name:"University of Coimbra",country:{name:"Portugal"}}},{id:"61946",title:"Dr.",name:"Carol",middleName:null,surname:"Bernstein",slug:"carol-bernstein",fullName:"Carol Bernstein",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/61946/images/system/61946.jpg",biography:"Carol Bernstein received her PhD in Genetics from the University of California (Davis). She was a faculty member at the University of Arizona College of Medicine for 43 years, retiring in 2011. Her research interests focus on DNA damage and its underlying role in sex, aging and in the early steps of initiation and progression to cancer. In her research, she had used organisms including bacteriophage T4, Neurospora crassa, Schizosaccharomyces pombe and mice, as well as human cells and tissues. She authored or co-authored more than 140 scientific publications, including articles in major peer reviewed journals, book chapters, invited reviews and one book.",institutionString:"University of Arizona",institution:{name:"University of Arizona",country:{name:"United States of America"}}},{id:"182258",title:"Dr.",name:"Ademar",middleName:"Pereira",surname:"Serra",slug:"ademar-serra",fullName:"Ademar Serra",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/182258/images/system/182258.jpeg",biography:"Dr. Serra studied Agronomy on Universidade Federal de Mato Grosso do Sul (UFMS) (2005). He received master degree in Agronomy, Crop Science (Soil fertility and plant nutrition) (2007) by Universidade Federal da Grande Dourados (UFGD), and PhD in agronomy (Soil fertility and plant nutrition) (2011) from Universidade Federal da Grande Dourados / Escola Superior de Agricultura Luiz de Queiroz (UFGD/ESALQ-USP). Dr. Serra is currently working at Brazilian Agricultural Research Corporation (EMBRAPA). His research focus is on mineral nutrition of plants, crop science and soil science. Dr. Serra\\'s current projects are soil organic matter, soil phosphorus fractions, compositional nutrient diagnosis (CND) and isometric log ratio (ilr) transformation in compositional data analysis.",institutionString:"Brazilian Agricultural Research Corporation",institution:{name:"Brazilian Agricultural Research Corporation",country:{name:"Brazil"}}}]}},subseries:{item:{id:"10",type:"subseries",title:"Animal Physiology",keywords:"Physiology, Comparative, Evolution, Biomolecules, Organ, Homeostasis, Anatomy, Pathology, Medical, Cell Division, Cell Signaling, Cell Growth, Cell Metabolism, Endocrine, Neuroscience, Cardiovascular, Development, Aging, Development",scope:"Physiology, the scientific study of functions and mechanisms of living systems, is an essential area of research in its own right, but also in relation to medicine and health sciences. The scope of this topic will range from molecular, biochemical, cellular, and physiological processes in all animal species. Work pertaining to the whole organism, organ systems, individual organs and tissues, cells, and biomolecules will be included. Medical, animal, cell, and comparative physiology and allied fields such as anatomy, histology, and pathology with physiology links will be covered in this topic. Physiology research may be linked to development, aging, environment, regular and pathological processes, adaptation and evolution, exercise, or several other factors affecting, or involved with, animal physiology.",coverUrl:"https://cdn.intechopen.com/series_topics/covers/10.jpg",hasOnlineFirst:!1,hasPublishedBooks:!1,annualVolume:11406,editor:{id:"202192",title:"Dr.",name:"Catrin",middleName:null,surname:"Rutland",slug:"catrin-rutland",fullName:"Catrin Rutland",profilePictureURL:"https://mts.intechopen.com/storage/users/202192/images/system/202192.png",biography:"Catrin Rutland is an Associate Professor of Anatomy and Developmental Genetics at the University of Nottingham, UK. She obtained a BSc from the University of Derby, England, a master’s degree from Technische Universität München, Germany, and a Ph.D. from the University of Nottingham. She undertook a post-doctoral research fellowship in the School of Medicine before accepting tenure in Veterinary Medicine and Science. Dr. Rutland also obtained an MMedSci (Medical Education) and a Postgraduate Certificate in Higher Education (PGCHE). She is the author of more than sixty peer-reviewed journal articles, twelve books/book chapters, and more than 100 research abstracts in cardiovascular biology and oncology. She is a board member of the European Association of Veterinary Anatomists, Fellow of the Anatomical Society, and Senior Fellow of the Higher Education Academy. Dr. Rutland has also written popular science books for the public. https://orcid.org/0000-0002-2009-4898. www.nottingham.ac.uk/vet/people/catrin.rutland",institutionString:null,institution:{name:"University of Nottingham",institutionURL:null,country:{name:"United Kingdom"}}},editorTwo:null,editorThree:null,series:{id:"10",title:"Physiology",doi:"10.5772/intechopen.72796",issn:"2631-8261"},editorialBoard:[{id:"306970",title:"Mr.",name:"Amin",middleName:null,surname:"Tamadon",slug:"amin-tamadon",fullName:"Amin Tamadon",profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0030O00002oHR5wQAG/Profile_Picture_1623910304139",institutionString:null,institution:{name:"Bushehr University of Medical Sciences",institutionURL:null,country:{name:"Iran"}}},{id:"251314",title:"Dr.",name:"Juan Carlos",middleName:null,surname:"Gardón",slug:"juan-carlos-gardon",fullName:"Juan Carlos Gardón",profilePictureURL:"https://mts.intechopen.com/storage/users/251314/images/system/251314.jpeg",institutionString:"Catholic University of Valencia San Vicente Mártir, Spain",institution:null},{id:"245306",title:"Dr.",name:"María Luz",middleName:null,surname:"Garcia Pardo",slug:"maria-luz-garcia-pardo",fullName:"María Luz Garcia Pardo",profilePictureURL:"https://mts.intechopen.com/storage/users/245306/images/system/245306.png",institutionString:null,institution:{name:"Miguel Hernandez University",institutionURL:null,country:{name:"Spain"}}},{id:"283315",title:"Prof.",name:"Samir",middleName:null,surname:"El-Gendy",slug:"samir-el-gendy",fullName:"Samir El-Gendy",profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0030O00002bRduYQAS/Profile_Picture_1606215849748",institutionString:null,institution:{name:"Alexandria University",institutionURL:null,country:{name:"Egypt"}}}]},onlineFirstChapters:{},publishedBooks:{paginationCount:3,paginationItems:[{type:"book",id:"8545",title:"Animal Reproduction in Veterinary Medicine",subtitle:null,coverURL:"https://cdn.intechopen.com/books/images_new/8545.jpg",slug:"animal-reproduction-in-veterinary-medicine",publishedDate:"January 20th 2021",editedByType:"Edited by",bookSignature:"Faruk Aral, Rita Payan-Carreira and Miguel Quaresma",hash:"13aaddf5fdbbc78387e77a7da2388bf6",volumeInSeries:6,fullTitle:"Animal Reproduction in Veterinary Medicine",editors:[{id:"25600",title:"Prof.",name:"Faruk",middleName:null,surname:"Aral",slug:"faruk-aral",fullName:"Faruk Aral",profilePictureURL:"https://mts.intechopen.com/storage/users/25600/images/system/25600.jpg",institutionString:"Independent Researcher",institution:{name:"Harran University",institutionURL:null,country:{name:"Turkey"}}}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null},{type:"book",id:"8460",title:"Reproductive Biology and Technology in Animals",subtitle:null,coverURL:"https://cdn.intechopen.com/books/images_new/8460.jpg",slug:"reproductive-biology-and-technology-in-animals",publishedDate:"April 15th 2020",editedByType:"Edited by",bookSignature:"Juan Carlos Gardón Poggi and Katy Satué Ambrojo",hash:"32ef5fe73998dd723d308225d756fa1e",volumeInSeries:4,fullTitle:"Reproductive Biology and Technology in Animals",editors:[{id:"251314",title:"Dr.",name:"Juan Carlos",middleName:null,surname:"Gardón",slug:"juan-carlos-gardon",fullName:"Juan Carlos Gardón",profilePictureURL:"https://mts.intechopen.com/storage/users/251314/images/system/251314.jpeg",institutionString:"Catholic University of Valencia San Vicente Mártir, Spain",institution:null}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null},{type:"book",id:"7233",title:"New Insights into Theriogenology",subtitle:null,coverURL:"https://cdn.intechopen.com/books/images_new/7233.jpg",slug:"new-insights-into-theriogenology",publishedDate:"December 5th 2018",editedByType:"Edited by",bookSignature:"Rita Payan-Carreira",hash:"74f4147e3fb214dd050e5edd3aaf53bc",volumeInSeries:1,fullTitle:"New Insights into Theriogenology",editors:[{id:"38652",title:"Prof.",name:"Rita",middleName:null,surname:"Payan-Carreira",slug:"rita-payan-carreira",fullName:"Rita Payan-Carreira",profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0030O00002bRiFPQA0/Profile_Picture_1614601496313",institutionString:null,institution:{name:"University of Évora",institutionURL:null,country:{name:"Portugal"}}}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null}]},testimonialsList:[{id:"18",text:"It was great publishing with IntechOpen, the process was straightforward and I had support all along.",author:{id:"71579",name:"Berend",surname:"Olivier",institutionString:"Utrecht University",profilePictureURL:"https://mts.intechopen.com/storage/users/71579/images/system/71579.png",slug:"berend-olivier",institution:{id:"253",name:"Utrecht University",country:{id:null,name:"Netherlands"}}}},{id:"8",text:"I work with IntechOpen for a number of reasons: their professionalism, their mission in support of Open Access publishing, and the quality of their peer-reviewed publications, but also because they believe in equality.",author:{id:"202192",name:"Catrin",surname:"Rutland",institutionString:null,profilePictureURL:"https://mts.intechopen.com/storage/users/202192/images/system/202192.png",slug:"catrin-rutland",institution:{id:"134",name:"University of Nottingham",country:{id:null,name:"United Kingdom"}}}},{id:"27",text:"The opportunity to work with a prestigious publisher allows for the possibility to collaborate with more research groups interested in animal nutrition, leading to the development of new feeding strategies and food valuation while being more sustainable with the environment, allowing more readers to learn about the subject.",author:{id:"175967",name:"Manuel",surname:"Gonzalez Ronquillo",institutionString:null,profilePictureURL:"https://mts.intechopen.com/storage/users/175967/images/system/175967.png",slug:"manuel-gonzalez-ronquillo",institution:{id:"6221",name:"Universidad Autónoma del Estado de México",country:{id:null,name:"Mexico"}}}}]},submityourwork:{pteSeriesList:[],lsSeriesList:[],hsSeriesList:[],sshSeriesList:[],subseriesList:[],annualVolumeBook:{},thematicCollection:[],selectedSeries:null,selectedSubseries:null},seriesLanding:{item:null},libraryRecommendation:{success:null,errors:{},institutions:[]},route:{name:"chapter.detail",path:"/chapters/18095",hash:"",query:{},params:{id:"18095"},fullPath:"/chapters/18095",meta:{},from:{name:null,path:"/",hash:"",query:{},params:{},fullPath:"/",meta:{}}}},function(){var e;(e=document.currentScript||document.scripts[document.scripts.length-1]).parentNode.removeChild(e)}()