Download as pdf or txt
Download as pdf or txt
You are on page 1of 54

Innovation in Sustainable Management

and Entrepreneurship 2019


International Symposium in
Management SIM2019 Gabriela
Prostean
Visit to download the full and correct content document:
https://textbookfull.com/product/innovation-in-sustainable-management-and-entrepren
eurship-2019-international-symposium-in-management-sim2019-gabriela-prostean/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Strategic Engineering Innovation Entrepreneurship and


Management 1st Edition Arcade Jacques

https://textbookfull.com/product/strategic-engineering-
innovation-entrepreneurship-and-management-1st-edition-arcade-
jacques/

Proceedings of IDEAS 2019: The Interdisciplinary


Conference on Innovation, Design, Entrepreneurship, And
Sustainable Systems Luciana Pereira

https://textbookfull.com/product/proceedings-of-ideas-2019-the-
interdisciplinary-conference-on-innovation-design-
entrepreneurship-and-sustainable-systems-luciana-pereira/

Entrepreneurship and Management in an Islamic Context


1st Edition Veland Ramadani

https://textbookfull.com/product/entrepreneurship-and-management-
in-an-islamic-context-1st-edition-veland-ramadani/

Management Participation and Entrepreneurship in the


Cultural and Creative Sector Martin Piber

https://textbookfull.com/product/management-participation-and-
entrepreneurship-in-the-cultural-and-creative-sector-martin-
piber/
Tropical Wetlands Innovation in Mapping and Management
Proceedings of the International Workshop on Tropical
Wetlands Innovation in Mapping and Management October
19 20 2018 Banjarmasin Indonesia 1st Edition Yiyi
Sulaeman (Editor)
https://textbookfull.com/product/tropical-wetlands-innovation-in-
mapping-and-management-proceedings-of-the-international-workshop-
on-tropical-wetlands-innovation-in-mapping-and-management-
october-19-20-2018-banjarmasin-indonesia-1st/

Digital Startups in Transition Economies: Challenges


for Management, Entrepreneurship and Education
Agnieszka Skala

https://textbookfull.com/product/digital-startups-in-transition-
economies-challenges-for-management-entrepreneurship-and-
education-agnieszka-skala/

International Scientific Conference Energy Management


of Municipal Facilities and Sustainable Energy
Technologies EMMFT 2019: Volume 1 Vera Murgul

https://textbookfull.com/product/international-scientific-
conference-energy-management-of-municipal-facilities-and-
sustainable-energy-technologies-emmft-2019-volume-1-vera-murgul/

International Scientific Conference Energy Management


of Municipal Facilities and Sustainable Energy
Technologies EMMFT 2019: Volume 2 Vera Murgul

https://textbookfull.com/product/international-scientific-
conference-energy-management-of-municipal-facilities-and-
sustainable-energy-technologies-emmft-2019-volume-2-vera-murgul/

Success in Academic Surgery Innovation and


Entrepreneurship Mark S. Cohen

https://textbookfull.com/product/success-in-academic-surgery-
innovation-and-entrepreneurship-mark-s-cohen/
Springer Proceedings in Business and Economics

Gabriela Prostean
Juan José Lavios Villahoz
Laura Brancu
Gyula Bakacsi Editors

Innovation in
Sustainable
Management and
Entrepreneurship
2019 International Symposium in
Management (SIM2019)
Springer Proceedings in Business and Economics
Springer Proceedings in Business and Economics brings the most current research
presented at conferences and workshops to a global readership. The series features
volumes (in electronic and print formats) of selected contributions from conferences
in all areas of economics, business, management, and finance. In addition to an
overall evaluation by the publisher of the topical interest, scientific quality, and
timeliness of each volume, each contribution is refereed to standards comparable to
those of leading journals, resulting in authoritative contributions to the respective
fields. Springer’s production and distribution infrastructure ensures rapid publica-
tion and wide circulation of the latest developments in the most compelling and
promising areas of research today.
The editorial development of volumes may be managed using Springer’s
innovative Online Conference Service (OCS), a proven online manuscript
management and review system. This system is designed to ensure an efficient
timeline for your publication, making Springer Proceedings in Business and
Economics the premier series to publish your workshop or conference volume.

More information about this series at http://www.springer.com/series/11960


Gabriela Prostean Juan José Lavios Villahoz
• •

Laura Brancu Gyula Bakacsi


Editors

Innovation in Sustainable
Management
and Entrepreneurship
2019 International Symposium
in Management (SIM2019)

123
Editors
Gabriela Prostean Juan José Lavios Villahoz
Polytechnic University of Timişoara University of Burgos
Timișoara, Romania Burgos, Spain

Laura Brancu Gyula Bakacsi


West University of Timișoara Budapest Business School
Timișoara, Romania Budapest, Hungary

ISSN 2198-7246 ISSN 2198-7254 (electronic)


Springer Proceedings in Business and Economics
ISBN 978-3-030-44710-6 ISBN 978-3-030-44711-3 (eBook)
https://doi.org/10.1007/978-3-030-44711-3
© Springer Nature Switzerland AG 2020
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part
of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,
recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission
or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar
methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this
publication does not imply, even in the absence of a specific statement, that such names are exempt from
the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this
book are believed to be true and accurate at the date of publication. Neither the publisher nor the
authors or the editors give a warranty, expressed or implied, with respect to the material contained
herein or for any errors or omissions that may have been made. The publisher remains neutral with regard
to jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Introduction

The volume Innovation for Sustainable Management and Entrepreneurship is a


reply from researchers in business and economy to corporate exigency, unleashed
by the unprecedented expansion of top technologies. The contributors to this vol-
ume, fascinated by the new industrial era, tried to harmonize the need of organi-
zations for sustainable development with the needs of the society, thus creating
concrete approach models and algorithms within the 15th International Symposium
in Management (SIM 2019). The symposium gathered researchers, academics, and
practitioners who exchanged experiences and research results in their complex
fields of interest.
The scientific papers presented at the symposium debated on the challenges and
innovations in management and entrepreneurship. The research included in this
volume offers practical and complex scenarios applicable in the fields of economics
and industrial business such as the new digitalization wave in Industry 4.0; man-
agement education; new business ideas developed by students with entrepreneurial
interests with regard to start-ups; financial and governance management; and supply
chain and operations management.
Given their theoretical–applicative approach, the issues tackled in this volume
are of upmost importance in each of their respective fields:
– Innovative business models which support entrepreneurial approaches for sus-
tainable management (discussed in Part II of the volume: Entrepreneurship; Part
III: Sustainable management, Part VII: Education management; Part VIII: Third
sector organisations management; Part IX: Management of innovation; Part X:
Quality Management and Logistics);
– Innovative business models used for coping with change and rapid strategies
(presented in Part V: Supply chain and operations management; Part VI:
Workplace Management);
– Economic analyses representative for today’s challenges in the business envi-
ronment (Part IV: Financial management and governance; Part XI: The eco-
nomics of small and medium-sized enterprises);

v
vi Introduction

– IT approaches to support innovation in business for a sustainable management


and adapting new technologies by integrating data in order to assure sustainable
management in a competitive environment (discussed in Part I: Industry 4.0).
The chapters of this volume are presented clearly and concisely, integrating the
pillars (be they political or tactical) of various strategies of social responsibility
which generate a unique view of the companies on the market, perceived in a
sustainable way by the entire competitive environment. The theoretical background
of the volume is based on a wide bibliographic research which encompasses critical
analyses or case studies. The value of this volume stands both in the complexity
of the issues it approaches and in the consistency of its analyses and the solutions it
offers, the final general aim of the volume being to give solutions to problems of
certain actuality.

December 2019 The Editors


Contents

Part I Industry 4.0


1 Aspects of Cyber-Security in Higher Education Institutions . . . . . . 3
Alin-Ciprian Cojocariu, Ion Verzea, and Rachid Chaib
2 Alerts in Emergency Situations Using Mobile Technology,
Scientometric Visualization Analysis . . . . . . . . . . . . . . . . . . . . . . . . 13
Raluca Repanovici and Anişor Nedelcu
3 How to Approach Ethics in Intelligent Decision Support
Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Radu Stefan and George Carutasu
4 Security and Privacy Implementation Framework as a Result
of the Digitalization Process for Organizations in Different
Industries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Cristian Vartolomei and Silvia Avasilcăi
5 The Impact of Using Digital Technology in Measuring
the Marketing Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Sebastian Bîrzu
6 Correlation “Sustainability–Functions–Competitiveness”
for Products in Society 5.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Liana Rodica Pater and Sanda Ligia Cristea

Part II Entrepreneurship
7 Trust at Work and Entrepreneurial Intentions Among Employed
Persons in Organizations in Serbia . . . . . . . . . . . . . . . . . . . . . . . . . 81
Predrag Mali, Bogdan Kuzmanović, Milan Nikolić,
Edit Terek Stojanović, and Siniša Mitić

vii
viii Contents

8 Self-efficacy and Entrepreneurial Intention Among Business


Students in Romania . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Bogdan Robert Ioane, Nicolae Bibu, and Laura Brancu
9 Equal Opportunities in Entrepreneurship in Romania’s
West Region . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Mădălina Dumitrița Maticiuc, Diana Claudia Sala,
and Valentin Partenie Munteanu
10 Ups and Downs of High-Growth Firms in Russia . . . . . . . . . . . . . . 127
Dmitri Pletnev and Victor Barkhatov

Part III Sustainable Management


11 Case Studies of Indoor Air Quality and Sustainability
Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Marco Ragazzi, Matei Tămășilă, Larisa Ivascu,
and Cristina Elena Rada
12 Sustainable Development in Russia—Just a Theory? . . . . . . . . . . . 149
V. Barkhatov and D. Benz
13 Another Approach Regarding the Balance Between Natural
and Manufactured Ecosystems . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
Paul Negirla, Sorin Nanu, Ioan Silea, and Octavian Stefan
14 Carbon Emissions, Energy Consumption, and Managing
Investment in Renewable Energy . . . . . . . . . . . . . . . . . . . . . . . . . . 183
Roxana Mihaela Sirbu and Claudiu Tiberiu Albulescu
15 Perception, Knowledge, Attitude and Behavior Toward Climate
Change—A Survey Among Citizens in Timisoara, Romania . . . . . . 199
Iudit Bere-Semeredi and Adrian-Amedeo Bere-Semeredi
16 Application of Circular Economy Principles in the Luxury
Fashion Industry: The Case of the RealReal . . . . . . . . . . . . . . . . . . 219
Manuela Mihăiliasa and Silvia Avasilcăi

Part IV Financial Management and Governance


17 A Review of the Research on Financial Performance
and Its Determinants . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
Mihaela Brindusa Tudose and Silvia Avasilcai
18 Financial Constraints and the Structure of the Firm’s
Investment: An Application to the Scientific R&D Industry
from the Largest EU Countries . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
Claudiu Tiberiu Albulescu, Serban Miclea, Matei Tamasila,
and Mihaela Vartolomei
Contents ix

19 Projecting a Strategic Diagnosis System of Corruption


Based on Network Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
Ioan Petrișor and Dana Nedea
20 The Influence of Stakeholders on the Management and Work
of a Community Center in Israel . . . . . . . . . . . . . . . . . . . . . . . . . . 271
Nicolae Bibu and Etti Isler
21 Historical Valuation Bases and Drivers of Large Internet-
Enabled Companies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283
Adelin Trusculescu, Claudiu Tiberiu Albulescu, and Daniel Paschek

Part V Supply Chain and Operations Management


22 Event Log Extraction for the Purpose of Process Mining:
A Systematic Literature Review . . . . . . . . . . . . . . . . . . . . . . . . . . . 299
Dusanka Dakic, Darko Stefanovic, Teodora Lolic, Dajana Narandzic,
and Nenad Simeunovic
23 3D Custom-Made Eyeglasses Frames: An Innovative Approach
to Enhance Customer Satisfaction . . . . . . . . . . . . . . . . . . . . . . . . . . 313
Karina E Sarzosa G, Carlos D Vallejo A, Angel G Hidalgo O,
Tania K Berrezueta E, Esmeralda Kadena, and Ramiro S Vargas C
24 Methodological Views on Agile Testing . . . . . . . . . . . . . . . . . . . . . . 323
Paul Dragos
25 The Implementation of a New Technology Based on the Monte
Carlo Simulation in the Field of Sustainable Dependability
in Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
Ionut Herghiligiu, Adrian Vilcu, and Marius Pislaru
26 A Study on a Smart Process Optimization Based on TOC . . . . . . . 345
Gabriela Prostean

Part VI Workplace Management


27 A Proposed Ergonomics Maturity Level Framework
and Assessment Tool for Easy Business Application . . . . . . . . . . . . 357
Anca Mocan and Anca Draghici
28 The Modern Workplace in Service Management: Possibilities,
Realities, New Ways of Working . . . . . . . . . . . . . . . . . . . . . . . . . . . 371
Ieva Kalve
29 Human Resource Competencies Development for Competitive
Advantage. A Case from the Food Industry . . . . . . . . . . . . . . . . . . 387
Diana Robescu, Anca Draghici, and Alina Paraschiva
x Contents

30 Design Thinking Workshops: Uncovering Facilitator


and Participants’ Experiences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403
Bogdan Rusu
31 Generations at Work for a Better Future . . . . . . . . . . . . . . . . . . . . 417
Sebastian Capotescu, Letiția-Alexandra Mălăieș,
and Horațiu-Florin Șoim
32 The Impact of Knowledge Management on Intellectual Capital.
A Research Approach Using Skandia Navigators . . . . . . . . . . . . . . 431
Corina Dufour, Anca Draghici, and Alina Paraschiva

Part VII Education Management


33 The Study of the Impact of Erasmus+ Mobility Projects
on Participants. Data Analysis at “Lucian Blaga” University
of Sibiu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 447
Rebecca-Clara Răulea and Dănuț-Dumitru Dumitrașcu
34 Evaluation of the Cultural Intelligence Profile of Moroccan
and Romanian Students . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459
Laura Brancu and Zakia Benhida
35 Talent Management and Organizational Performance in Schools.
A Case Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 473
Alina Angela Manolescu and Doina Danaiata

Part VIII Third Sector Organisations Management


36 Analysis of the Competitiveness of Organizations
in the Northwestern Region of Romania Through Social
Responsibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 487
Rus Gabriel and Rădulescu Corina Michaela
37 The Participation of Women in the Third Sector and Civil Society
Organizations—Biased or Neutral? . . . . . . . . . . . . . . . . . . . . . . . . . 499
Montse Fernández
38 Innovative Aspects in Managing Classic Professional Orchestras,
as Multiple Stakeholder Organizations . . . . . . . . . . . . . . . . . . . . . . 507
Georgiana Alina Teohari, Nicolae Aurelian Bibu, and Laura Brancu
39 Testing the Trust of Romanian Consumers in E-Commerce . . . . . . 527
Patricia Simona Lup, Romeo Negrea, and Gabriela Ioana Proștean
40 Data—The Important Prerequisite for AI Decision-Making
for Business . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 539
Daniel Paschek, Caius Tudor Luminosu, and Mircea Liviu Negrut
Contents xi

Part IX Management of Innovation


41 How Do SMEs Manage to Gain New Markets? Principles
to Enhance the Innovation Management System:
The Case of a Romanian Manufacturer . . . . . . . . . . . . . . . . . . . . . 555
Amalia Hulubei (Georgescu) and Silvia Avasilcăi
42 Toward a Creative Dynamic Capabilities Creation Framework:
The Evidence from Creative Business Ecosystems . . . . . . . . . . . . . 567
Elena Avram, Carmen Aida Hutu, and Adriana Bujor
43 Clustering by Nanotech: The Tunneling Approach . . . . . . . . . . . . . 575
Mihai V. Putz and Ioan Petrisor
44 Using Design Thinking to Create Social Innovation in Digital
Services for International Mobility . . . . . . . . . . . . . . . . . . . . . . . . . 591
Anca-Maria Cazac and Silviu Vert
45 Innovation in Business Organizations with Blockchain
Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 601
Luminita Hurbean
46 Change Management Strategy and ITIL Implementation Process
in an IT Company—Study Case . . . . . . . . . . . . . . . . . . . . . . . . . . . 611
Mădălina Albulescu and Nicolae Bibu

Part X Quality Management and Logistics


47 Sustainable Logistics Concept—Strategic Development Plan
of the Timisoara International Airport . . . . . . . . . . . . . . . . . . . . . . 625
Attila Turi, Larisa Ivascu, Marian Mocan, Lucian-Ionel Cioca,
and Alin Artene
48 Warehouse Redesign Challenges—Adapting Layout
and Improving Process Flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 635
Michael Petri, Attila Turi, and Marian Mocan
49 Applying Six Sigma Methodology in the Automotive Industry . . . . 647
Adrian Pugna, Sabina Potra, Romeo Negrea, and Serban Miclea
50 Improving Workflows Through Digital Collaboration in Software
Development Projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 661
Andra Diaconescu, Olivia Giuca, and Ioan-Radu Lala
51 Modern Manufacturing Processes for SMEs: Lean, Flexible,
Agile, Leagile, Green, and Sustainable . . . . . . . . . . . . . . . . . . . . . . 679
Anca-Ioana Munteanu
xii Contents

Part XI The Economics of Small and Medium-Sized Enterprises


52 Economic Efficiency Estimation of Innovations in Combined
Forestry and Wood Processing Units in Bulgaria Through
Certification in FSC Chain of Custody . . . . . . . . . . . . . . . . . . . . . . 695
Nikolay Neykov, Emil Kitchoukov, Tsvetelina Simeonova-Zarkin,
and Aureliu-Florin Halalisan
53 The Analysis of Clusters Competitiveness in the Nord-West
Region of Romania . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 705
Alina Natalia Pop and Izabela Ruz
54 An Approach to Process Standardization in the Wood Industry:
A Case Study of an Ecuadorian SME . . . . . . . . . . . . . . . . . . . . . . . 717
Tania K Berrezueta E, Angel G Hidalgo O, Esmeralda Kadena,
and Ramiro S Vargas C
55 The EU Subsidy Policy Cannot Prevent the Market Exit
of Especially Small and Medium-Sized Enterprises . . . . . . . . . . . . . 725
Michael Glowinkel, Marian Mocan, and Manfred Külkens
Part I
Industry 4.0
Chapter 1
Aspects of Cyber-Security in Higher
Education Institutions

Alin-Ciprian Cojocariu, Ion Verzea, and Rachid Chaib

Abstract The experience of recent years has brought to the forefront a problem
that can affect our everyday life: cybercrime. In higher education institutions, this
problem is quite acute due to the increase in the number and types of equipment
that can be connected to data networks. This problem is also influenced by the
nature of educational and research activities involving a large number of teaching
staff, auxiliary or non-teaching staff and students as well as complex computing and
research systems in various fields. Members of higher education institutions are may
be victims of cyber-attacks of all kinds (social engineering, DDOS attacks, Trojans,
viruses and worms), or the need to find win–win variants as easily as possible can
bring some of these into cybercrime. Finding a restricted access variant with different
security barriers is essential for the proper functioning of the education and research
process in this type of institution. In this context, the research objective is to identify
and classify the main threats and attacks on the data network, the various information
and research currently faced by higher education institutions. These issues need to be
treated with utmost seriousness because, in general, the annihilation of cyber-attacks
is done after they have been done, thus completely or partially losing certain data,
and the creation of security barriers could limit access by attackers to confidential
information of the institution. The results serve to open a new research direction
that leads to the development of a security management model tailored to academic
activity.

Keywords Higher education institutions · Cybercrime · Security barriers · Data


network

A.-C. Cojocariu (B) · I. Verzea


“Gheorghe Asachi” Technical University of Iasi, 67, Dimitrie Mangeron Blvd, Iasi, Romania
e-mail: acojocariu2006@yahoo.com
I. Verzea
e-mail: verzea2000@yahoo.com
R. Chaib
“Frères Mentouri” University of Constantine 1, Constantine, Algeria
e-mail: rchaib@umc.edu.dz

© Springer Nature Switzerland AG 2020 3


G. Prostean et al. (eds.), Innovation in Sustainable Management and Entrepreneurship,
Springer Proceedings in Business and Economics,
https://doi.org/10.1007/978-3-030-44711-3_1
4 A.-C. Cojocariu et al.

1.1 Introduction

Since the twentieth century, written information, stored and transmitted on paper, has
begun to be replaced, almost entirely in some fields of activity, with electronic ones.
Also, the emergence of electronic signature will soon lead to the complete digitiza-
tion of documents and finally the disappearance of paper-based official documents,
which need signature and stamp. The experience of recent years has brought to the
forefront a problem that can affect our everyday life: cybercrime. In higher education
institutions, this problem is quite acute due to the increase in the number and types of
equipment that can be connected to data networks. This problem is also influenced by
the nature of educational and research activities involving a large number of teaching
staff, auxiliary or non-teaching staff and students as well as complex computing and
research systems in various fields [1].
The main aspects of cyber-security in higher education institutions are related to
frequency of cyber-attacks, limited IT resources and cyber-security culture.

1.2 Frequency of Cyber-Attacks in Higher Education


Institutions

Members of higher education institutions are may be victims of cyber-attacks of all


kinds (social engineering, DOS attacks, Trojans, viruses and worms), or the need to
find win–win variants as easily as possible can bring some of these into cybercrime.
Cyber-attacks at higher education institutions are typically data-targeted attacks, and
personal information can help attackers to defraud banking systems, obtain informa-
tion about research in some areas or even disrupt the facility’s ability to function. The
frequency of cyber-attacks increases proportionally to the increase in the number of
devices that can connect to the servers of an institution [2].
For example, in the “Tudor Vladimirescu” Student Campus of “Gheorghe Asachi”
Technical University from Iasi, about 70% of students connect two or more devices
to the campus servers, according to the data centre analysis of the university.
The most commonly used methods of cyber-attack on systems in higher education
institutions are phishing, ransom attacks, denial of service (DOS) and distributed
denial of service (DDOS).

1.2.1 Phishing

Phishing is a method of identity theft, so for those who launch such cyber-attacks,
any information which is precious will resort to any means to get what they want.
However, many measures will be taken, and they discover new ways of penetrat-
ing security barriers between computers or networks and the Internet. At this time,
1 Aspects of Cyber-Security in Higher Education Institutions 5

Fig. 1.1 Spear phishing attack model used to launch targeted attacks. Copyright © 2014 by Sood
and Richard [3]

phishing has been taken on a huge scale in higher education institutions in Romania,
which are very exposed, even more exposed than institutions in other parts of the
world. But that does not mean we cannot protect against this method of attacking
documents (Fig. 1.1).
In the higher education institutions, when a phishing attack occurs, the attacker
sends his emails or SMSes to his clients from various companies or important insti-
tutions. The subject of the email and its content differs from a phishing attack to
another, indicating malfunctions or technical errors that need to be resolved by re-
entering the personal data of the attacker and going up to messages that promise
certain pecuniary benefits. This type of cyber-attack is almost as old as the Internet.
Criminals use so-called social engineers to trick users, infecting computers with var-
ious types of viruses, stealing their money from cards or their identity, and taking
their data and even some digital documents related to studies or research.
6 A.-C. Cojocariu et al.

1.2.2 Ransom Attacks

Ransom attack is a type of malicious software designed to block access to a computer


system until a sum of money is paid. Although ransom attacks are usually aimed at
individuals, it is only a matter of time before business is targeted as well. In Romanian
higher education institutions, this phenomenon mainly targets the devices of all those
who connect to their networks, students, didactic and teaching staff, non-academic
staff and visitors. Lock screens are common to both encryptions and screen lockers,
and they encourage victims to purchase a crypto-currency, like Bitcoin, to pay the
ransom fee. Once the ransom is paid, customers receive the decryption key and may
attempt to decrypt files. Decryption is not guaranteed as multiple sources report
varying success of decryption after paying ransoms, and sometimes customers never
receive the keys. Some attacks install malware in the computer system even after the
ransom is paid and data released (Fig. 1.2).
In many cases, ransomware victims who pay are “marked” for future attacks, and
their information is sold to other ransomware attackers. This form of cyber-attack
is mostly used in higher education institutions and beyond. If government agencies
report 5.9% and healthcare institutions report 3.5% of all ransom attack victims, the
education institutions report about 13% [5].

1.2.3 Denial of Service (DOS) and Distributed Denial


of Service (DDOS)

Denial-of-service (DOS) and distributed denial-of-service (DDOS) attacks are two


of the most dangerous cyber-threats that higher education institutions face. These
forms of attacks may have financial implications such as those of a successful DOS
attack. Security surveys indicate that the cost of a DDOS attack is calculated on
average between $ 20,000 and 40,000 per hour.
DOS attack is a cyber-attack on an individual computer or on multiple com-
puter connections that reduces, restricts or prevents legitimate users from accessing
resources. In a DOS attack, attackers “flood” the victim’s system with service or
traffic demands to overload resources. The DOS attack leads to the inaccessibility of
a particular Internet site (usually the targeted person/company) or poor performances
within the network (Fig. 1.3).
DDOS attack is a multitude of compromised systems (called “farms”) that attack
a single victim using a virus or botnets to infect a system by turning it into a zombie.
The user is not aware that his/her system is involved in an attack. After infecting tens
or hundreds or thousands of systems, it will be very easy to attack any system or
network. According to CERT.RO, the attacks of the DDOS are rising approximately
33% in companies and institutions which are affected by this attack in 2017, compared
to 17% in 2016 [5].
1 Aspects of Cyber-Security in Higher Education Institutions 7

Fig. 1.2 Microsoft decrypted alert [4]

1.3 The Information Security Model

The information security model consists of software methods of ensuring access


control to system resources and services. This model is divided into two important
levels: levels of access security and levels of security of services.
8 A.-C. Cojocariu et al.

Fig. 1.3 DDOS attack model by Karabulut [6]

• The security level of the access includes:


– access to the system that determines the conditions and when the system is
accessible, it is directly responsible for managing the access records;
– access to the account that verifies the user’s name and password;
– the right of access to various files, resources, services, data and information,
which determines what privileges a user or group of users has.
• The security level of the services controls the access to the services of a system,
which can be a computer or a computer network, and is divided into:
– the control of the services responsible for the warning and reporting functions
of the service states, as well as the activation of various services offered by the
respective system;
– rights to services that determine exactly how a particular account uses access
to file resources, details and information.
1 Aspects of Cyber-Security in Higher Education Institutions 9

The computer and communication security model presented above must com-
ply with the security levels without being a “top-down” bypass on the net-
works/departments [7].
This involves securing access to the same security management model and having
respective security levels and security barriers. The information must be classified
according to the level of risk where they come from, and their transmission between
the departments of a security level or between them is being made under strict
record [8].

1.4 Limited IT Resources in Higher Education Institutions

This is particularly important in higher education institutions because the shortage of


staff with experience and skills in cyber-security, along with the scarcity of material
resources due to the limited budget for the purchase of high-performance equip-
ment, leads to the impossibility of monitoring all devices and activities from the
network. Morally degraded IT infrastructures are an important cause of the vulnera-
bility of IT systems. Those who are part of the IT teams must ensure that older equip-
ment and solutions benefit from at least updates or, if those products are no longer
supported by suppliers, are replaced by modern equivalents. However, in complex
and highly distributed networks, patch and replacement programs require significant
resources [9].
The statistical data reported for the year 2017 on the website www.cert.ro indicates
as follows:
33.71% (2.89 million) of the total IPs allocated to the national cyberspace were
involved in at least one cyber-security alert processed by CERT.RO in 2017, which
decreased compared to 2016 when the percentage of 38.72% (2.92 million) was
recorded;
83.63% (115.60 million) of alerts processed concern vulnerable computer sys-
tems, meaning that they are out of date, insecure or improperly configured, being
thus exposed cyber-attacks targeting the exploitation of their vulnerabilities.
10.32% (14.33 million) of alerts processed refer to computer systems compro-
mised, meaning that they either have been infected with different forms of malware
or have been exploited and used by attackers in various types of spam attacks and
campaigns, the vast majority being registered in the Real-time Black-hole Lists
(RBLs);
5.88% (8.17 million) of alerts processed target information systems infected with
malware-type botnet, the latter being characterized by the fact that it has mecha-
nisms that allow attackers to remotely control infected computer systems. Thus,
a significant decrease was compared to 2016 when the percentage of 12.81%
(14.12 million) was recorded, confirming the downward trend of the botnet
phenomenon at international level;
10 A.-C. Cojocariu et al.

1,709 Web domains have been reported to Ro as compromised, down approx-


imately 84% compared to 2016 (10,639). The figure represents approximately
0.18% of the total domains registered in Romania in December 2017 (944,145)
37 and about 0.38% of total domains (438,366) [5].
In higher education institutions, most of these problems arise due to the lack of
resources, both financial, for the acquisition of state-of-the-art technology and the
lack of qualified personnel who can train, supervise and intervene promptly in case of
detecting a cyber-security issue. To keep up with the current reality, it is necessary to
update cyber-security systems that include network visibility solutions and process
automation [9].

1.5 Cyber-Security Culture in Higher Education


Institutions

In higher education institutions, many students and staff members have no knowl-
edge of cyber-security. For this reason, along with the expansion of technology use,
they increase the cyber-attack area on the institution. To be able to use technol-
ogy and innovation in research in good conditions without compromising security,
higher education institutions need to develop a defence strategy against these digital
security aspects. Developing a cyber-security culture can cause an IT user to verify
the authenticity of the sender of a mail requesting various personal information or
selecting a link or opening an attachment [10].
Achieving a cyber-security culture plan is essential. This can be done in five steps
as follows:
1. Knowledge of the institution, which has an essential role in the realization of the
cyber-security culture plan;
2. Measure the current level of the cyber-security culture of the target audience at
the academic level;
3. Developing a cyber-security culture plan in this institution;
4. Implementing an updated cyber-security culture plan at the institution level;
5. Acquiring state-of-the-art, efficient, anti-cyber-attack programs [11].

1.6 Conclusions

The three aspects of digital security must be treated with utmost seriousness because
it influences the good course of the institution at all levels. Finding a restricted
access variant with different security barriers is essential for the proper functioning
of the education and research process in this type of institution. In this context, the
research objective is to identify and classify the main threats and attacks on the data
1 Aspects of Cyber-Security in Higher Education Institutions 11

network, the various information and research currently faced by higher education
institutions. These issues need to be treated with utmost seriousness because, in
general, the annihilation of cyber-attacks is done after they have been done, thus
completely or partially losing certain data, and the creation of security barriers could
limit access by attackers to confidential information of the institution. The results
serve to open a new research direction that leads to the development of a security
management model tailored to academic activity [12].

References

1. Oprea, D.: Protection and Security of Information Systems (2017)


2. Tirziu, A.M.: Protection and Security of Information at the Level of National Public Authorities
from Romania (2009)
3. Sood, A., Richard. E.: 2014. Targeted Cyber Attacks
4. Koos, R.: Delete “Attention! Your Files are Encrypted (Microsoft Decrypted) Virus (2016)
5. CERT.RO.: Report on the Evolution of Threats in 2017 (2017)
6. Karabulut, K.G., Buyukcorak, S., Cepheli, Ö.: Hybrid Intrusion Detection System for DDOS
Attacks (2016)
7. Rochefort, S.: Equipment Security (2018)
8. Cojocariu, A.: Research and Contributions Regarding the Management of the Physical,
Computer and Communications Security System in the Higher Education Institutions (2018)
9. Lobban, I.: 10 Steps to Cyber Security (2012)
10. Fisher, B., Sloan, J. (eds.): Campus Crime: Legal, Social and Policy Perspectives. Charles C.
Thomas, Springfield, IL (2007)
11. The European Union Agency for Network and Information Security (ENISA).: Cyber Security
Culture in Organizations (2017)
12. Wallace, D.: Management of Security Services in Higher Education. Loughborough University,
UK
Chapter 2
Alerts in Emergency Situations Using
Mobile Technology, Scientometric
Visualization Analysis

Raluca Repanovici and Anişor Nedelcu

Abstract The purpose of this paper is to identify the most influential documents
using mobile technology for creating alerts in emergency situations and the concep-
tual research structure by analysing the most influential authors, cited papers, and
cited journals. In order to accomplish these objectives, the authors used the Dimen-
sions database. Articles from 2010 to 2019 were considered, and a total number of
2500 of articles were analysed. This analysis provides a thorough visualization of
the research directions of the field of alerts in emergency situations using mobile
applications.

Keywords Emergency Management · Emergency Alerts · Mobile Emergency


Notification Applications · Scientometric Visualization Analysis · VOS Viewer

2.1 Introduction

This paper proposes to identify the most influential and the most documents, the
existing collaboration networks, and also the intellectual structure in the field of
mobile applications designed for emergency notifications.
In order to accomplish these objectives, VOS Viewer software was used. VOS
Viewer software was developed by de Van Eck [10]. VOS Viewer is a software tool
for constructing and visualizing bibliometric networks and provides advanced visu-
alization tools. These networks may, for instance, include journals, researchers, or
individual publications, and they can be constructed based on citation, bibliographic
coupling, co-citation, or co-authorship relations, and geographic areas influence upon
the researched field. Within the present research, VOS Viewer version 1.6.11 was
used [10].

R. Repanovici (B) · A. Nedelcu


Transilvania University of Braşov, Braşov, Romania
e-mail: raluca-maria.marinescu@unitbv.ro
A. Nedelcu
e-mail: a.nedelcu@unitbv.ro

© Springer Nature Switzerland AG 2020 13


G. Prostean et al. (eds.), Innovation in Sustainable Management and Entrepreneurship,
Springer Proceedings in Business and Economics,
https://doi.org/10.1007/978-3-030-44711-3_2
14 R. Repanovici and A. Nedelcu

In the field of mobile alert application for emergency situations, there are only few
scientometric studies using the mapping of these topics. Therefore, we shall briefly
extract from the abstracts the main topics of these articles and introduce them in
the reference list. None of these articles applies the bibliometric methodology in the
field of the mobile application for emergency alerts. The main topics of scientometric
studies on mobile applications alerts are listed in Table 2.1.
This study will provide, for academic and industrial environments, an overview in
the field of mobile application notifications for emergency situations and will identify
new approaches and the newest related topics in the field. Furthermore, there will be
extensive information about the authors and papers with the highest influence and
the development directions of different aspects concerning the mobile emergency
applications.
This article also proposes to contribute to a better understanding of the alerts in
emergency situations created by mobile applications, by providing useful informa-
tion to researchers working in this area. In the next section, we present in brief the
scientometric methods, then we detail upon the research methodology and then the
research and collaboration tendencies are presented for the field of mobile emergency
applications, and then, the main results are represented. Finally, the conclusions,
implications, and limitations of this study are highlighted.

Table 2.1 Main topics of scientometric studies on mobile application alerts topics
Title of the article Citation Abstract
A scientometric analysis of mobile Santhakumar and Kaliyaperumal [8] “This paper focus on the growth and
technology publications development of mobile technology
research in terms of publication
output as reflected in Web of
Science database. During
2000–2013 a total of 10,638
publications were published in the
field. The average number of
publications published per year was
759.86 and the highest number of
publications 1495 were published in
2013”
Scientific production on mobile Pinto et al. [7] “This paper offers a bibliometric
information literacy in higher analysis of the scientific production
education: a bibliometric analysis on Mobile Information Literacy in
(2006–2017) Higher Education published
between 2006 and 2017, taking into
account papers covered by Web of
Science, Scopus, Library and
Information Science Abstracts,
Library and Information Science
and Technology Abstract, and
Education Resources Information
Center”
(continued)
2 Alerts in Emergency Situations Using Mobile Technology, Scientometric … 15

Table 2.1 (continued)


Title of the article Citation Abstract
The knowledge network dynamics Lee and Kim [5] “The paradigm of the mobile
in a mobile ecosystem: a patent ecosystem is rapidly changing,
citation analysis especially since the introduction of
smart devices. New important
players are emerging, and the scope
of the mobile ecosystem is
expanding and encroaching on the
technological boundaries of other
IT ecosystems. However, our
understanding of the mobile
ecosystem has been limited given
the few existing studies. Therefore,
in this paper, we empirically
examine the network structure of a
mobile ecosystem by measuring the
technology knowledge flows
between firms based on a patent
citation analysis of the mobile
industry”
Citation-based analysis of literature: Hsiao et al. [4] “This article presents a case that
a case study of technology examines the technology acceptance
acceptance research research through the newly
developed citation-based approach,
in particular main path analysis and
edge-betweenness clustering
analysis. Based on the citation
network constructed from a total of
1555 journal articles from the
period 1989 to 2014, the most
critical 50 citations were identified
and used as the basis to map the
major knowledge flow in
technology acceptance research”
A new bibliometric approach to Aman [1] “This study introduces a new
measure knowledge transfer of bibliometric approach to study the
internationally mobile scientist effects of international scientific
mobility on knowledge transfer. It is
based on an analysis of
internationally mobile and
non-internationally mobile German
scientists publishing in journals that
are indexed in Scopus. Using
bibliometric data such co-authored
articles, references and lexical
abstract terms from the Scopus
database, a method is presented that
is based on cosine similarity to
measure the similarity of the
knowledge base of authors and their
co-authors”
16 R. Repanovici and A. Nedelcu

2.2 Scientometric Methods

There are several reasons to use scientometric methods in research. First, we can get
an overview of the literature in the field. Second, the traditional methods provide a
critical analysis but a subjective choice of the selected articles, and third, the studies
using the date have more relevance when different subjects are analysed [3].
The realization of the intellectual structure of a research field can be achieved
through the analysis of co-citation. Co-citation is defined as the frequency with
which two documents are quoted together by other documents. In this analysis, it
has been considered that two articles cited together have similar topics and a higher
frequency of co-citation involves a higher affinity among them [9].
Another used technique is bibliographic coupling which handles the number of
references commonly used by two documents, as a measure for similarity. This
technique offers a higher connectivity perspective of two documents analysed [11].
A different technique is based on the analysis of authors coupling, or co-
authorship, which studies the social structure of a certain field. The authors coupling
provide data about the authors and their affiliations in institutions and countries.
The analysis of keywords, or co-words, represents the use of keywords for the
conceptual structure study in the research field. It is the only method based upon
using the document’s content in order to build a measure of similarity, while other
methods are indirectly coupling the documents by co-citation and co-authorship. This
technique is one of the most effective methods for developing emerging tendencies
and topics in a scientific domain [6].
For the field of mobile applications designed for emergency alerts, we propose to
apply the methods described above in order to accomplish the mapping of scientific
research by:
• Creating the research question;
• Compiling the obtained databases;
• Result analysis;
• Data visualization;
• Data interpretation.
This research defines the following questions:
1. Which documents have the highest influence in the field of the mobile application
designed for emergency situations?
2. Which is the intellectual structure of the mobile application designed for
emergency situations domain and how did it evolve?
First, we created the citations analysis in order to discover the most influential
documents in the field, and second, the analysis of co-citation was chosen in order
to identify the intellectual structure of the domain.
2 Alerts in Emergency Situations Using Mobile Technology, Scientometric … 17

2.3 Collecting Data

Data compiling includes the selection of the databases, filtration of reference results,
and their refining. Next, the software must be chosen, and also, the manner of visual-
izing the information shall be decided. We decided to use the Dimensions database,
https://www.dimensions.ai/ [2].
Dimensions database was developed in a partnership with over 100 top research
organizations around the world. This database aims at eliminating the barriers from
the path of discovery and innovation, allowing the users to find and access faster the
most relevant information, to analyse the academic results and wider research and
gather information for future activities.
In order to select the information and include it in our analysis, we defined the
steps for synthesizing the information. We used the research strategy: “alerts” AND
“mobile technology”, as shown in Fig. 2.1.
As shown in Fig. 2.2, 7591 results were obtained, and we selected the publications
from 2010–2019 in the following domains: information systems, public health, arti-
ficial intelligence, business and management, and communication techniques. The
inclusion principle was the interest of the researchers for creating a mobile alert

Fig. 2.1 Conditions of documents inclusion and exclusion, image from dimensions

Fig. 2.2 Number of publications in the field between 2010 and 2019
18 R. Repanovici and A. Nedelcu

Fig. 2.3 Image export centre for dimensions

application for emergency situations and the interest areas for its realization. By
using Export Centre, we obtained the database as exposed in Fig. 2.3.

2.4 Data Analysis by Co-citations Analysis

Various types of analysis can be performed based on co-citation analysis, author


co-citation, and journal co-citation.

2.4.1 Document Co-citation Analysis

The first study is regarding the co-citation network in the field of mobile applications
designed for emergency alerts. According to small, the citation frequency of articles
represents a key concept, methods, or experiments in the field. So, this analysis
allows us to investigate which documents define the intellectual structure in the field
of mobile applications designed for emergency alerts.
Out of 2500 publications analysed, there were 55,920 cited articles, but only 318
met the condition of a minimum of 10 citations per article, as shown in Figs. 2.4 and
2.5.
Nodes of the same colour belong to the same cluster. The association method of
the link intensity used by VOS Viewer software identified five clusters in total, as
listed in Table 2.2. The total number of links is 12,818, and the total connections
between links are 23,375.

2.4.2 Author Co-citation Analysis

The second analysis was performed on the co-citation network. This analysis con-
tributes to the knowledge of the intellectual structure of different subjects, considering
the author as a set of works published by the author.
Another random document with
no related content on Scribd:
The Project Gutenberg eBook of From trail to
railway through the Appalachians
This ebook is for the use of anyone anywhere in the United
States and most other parts of the world at no cost and with
almost no restrictions whatsoever. You may copy it, give it away
or re-use it under the terms of the Project Gutenberg License
included with this ebook or online at www.gutenberg.org. If you
are not located in the United States, you will have to check the
laws of the country where you are located before using this
eBook.

Title: From trail to railway through the Appalachians

Author: Albert Perry Brigham

Release date: October 19, 2023 [eBook #71908]

Language: English

Original publication: Boston: Ginn and Company, 1907

Credits: deaurider and the Online Distributed Proofreading Team


at https://www.pgdp.net (This file was produced from
images generously made available by The Internet
Archive)

*** START OF THE PROJECT GUTENBERG EBOOK FROM TRAIL


TO RAILWAY THROUGH THE APPALACHIANS ***
Transcriber’s Note
Larger versions of most illustrations may be seen by right-
clicking them and selecting an option to view them separately,
or by double-tapping and/or stretching them.
Additional notes will be found near the end of this ebook.
Eastern United States
FROM TRAIL TO RAILWAY
THROUGH
THE APPALACHIANS

BY

ALBERT PERRY BRIGHAM, A.M.


Professor of Geology in Colgate University
Author of “Geographic Influences in American History”

GINN AND COMPANY


BOSTON · NEW YORK · CHICAGO · LONDON
ATLANTA · DALLAS · COLUMBUS · SAN FRANCISCO
Copyright, 1907, by
ALBERT PERRY BRIGHAM
ALL RIGHTS RESERVED
621.1
The Athenæum Press
GINN AND COMPANY · PROPRIETORS
· BOSTON · U.S.A.
PREFACE
This book grows out of the conviction that geography in the
schools must return somewhat to human interests. In saying this the
author will scarcely need to defend himself against the charge of
undervaluing physiography. It is only a question of wise adaptation to
youthful students. Elementary history also needs to be placed in its
setting of physical conditions. It is here attempted to promote both
these objects in the study of the eastern United States. If geography
and history can be well correlated, both of these great themes may
be taught with economy of time and with stronger interest.
Much more might be said concerning the growth of centers, the
agriculture, and the commerce, but the limits of space are rigid.
Hence roads and westward movements have been made the main
topic. The geography is not taught formally, but is woven in with the
story. Care has been given to the maps of the several regions, that
they should clearly express the essentials and avoid the vagueness
of many small-scale representations of the Appalachian belt.
A. P. B.
Colgate University
October, 1906
CONTENTS
Chapter Page
I. Boston and the Berkshires 1
II. Pioneers of the Mohawk and the Hudson 14
III. Oriskany, a Battle of the Revolution 29
IV. The Erie Canal 40
V. The New York Central Railway 53
VI. Old Journeys from Philadelphia to the
West 63
VII. The Pennsylvania Railroad 74
VIII. The National Road 86
IX. The Baltimore and Ohio Railroad 98
X. Cities of the Ohio Valley 111
XI. The Great Valley 129
XII. To Kentucky by the Cumberland Gap 142
XIII. Frontier Soldiers and Statesmen 155
XIV. Cities of the Southern Mountains 167

INDEX 183
LIST OF ILLUSTRATIONS
Figure Page
1. Cunard Steamship 3
2. Union Station, Springfield 6
3. Deerfield Valley, Charlemont, Mass. 8
4. Eastern Portal of Hoosac Tunnel 11
5. South Station, Boston 12
6. Henry Hudson 16
7. Sir William Johnson 20
8. Genesee Street, Utica 23
9. Old Fort Johnson, Amsterdam, New York 26
10. Oriskany Battle Monument 30
11. Herkimer directing the Battle of Oriskany 33
12. Herkimer’s Monument and Mansion 36
13. De Witt Clinton 43
14. Erie Canal, Utica 46
15. Erie Canal, Syracuse 48
16. Traveling by Packet on the Erie Canal 50
17. Erie Canal and Solvay Works, Syracuse 51
18. De Witt Clinton Train 54
19. Twentieth Century Limited 57
20. Rounding the Noses, Mohawk Valley 59
21. Penn Square, Lancaster, Pennsylvania 65
22. Bridge over Conestoga Creek, Lancaster,
Pennsylvania 67
23. Tollhouse near Lancaster, Pennsylvania 68
24. Hambright’s Hotel, on the “Lancaster Pike” 70
25. Old Road House, Chambersburg, Pennsylvania 71
26. Freight Locomotive, Pennsylvania Railroad 75
27. Tunnel, Portage Railway 76
28. Broad Street Station, Philadelphia 77
29. Bridge, Pennsylvania Railroad, above Harrisburg 79
30. Pennsylvania Railroad Shops, Altoona 80
31. Horseshoe Curve, Pennsylvania Railroad 81
32. Rock Cut, Pennsylvania Railroad 84
33. Tollhouse near Brownsville, Pennsylvania 87
34. Milestone, Braddock’s Road, Frostburg, Maryland 90
35. Old Road House, Brownsville, Pennsylvania 92
36. Cumberland and Gap in Wills Mountain 95
37. Bridge and Monument, National Road, near
Wheeling, West Virginia 96
38. Mount Royal Station, Baltimore 99
39. Chesapeake and Ohio Canal, Cumberland 100
40. Highest Point on Baltimore and Ohio Railroad, Sand
Patch, Pennsylvania 103
41. Down the Potomac from Harpers Ferry 106
42. Coke Ovens, Meyersdale, Pennsylvania 108
43. The Observation End, Baltimore and Ohio Railroad 110
44. Old Blockhouse, Pittsburg 112
45. Pittsburg 115
46. Coal Barges, Pittsburg 119
47. Pittsburg at Night 120
48. Furnaces near Pittsburg 121
49. River Front, Cincinnati 125
50. Luray, Shenandoah Valley 131
51. James River Gap in the Blue Ridge 134
52. Hilly Farm Lands, near Knoxville 136
53. Great Valley, from the Pinnacle, Cumberland Gap 139
54. Cumberland Gap from the East 143
55. Daniel Boone 145
56. Pineville Gap, Cumberland River 147
57. Cornfield near Cumberland Gap 150
58. Kentucky Blue Grass 152
59. Three States Monument, Cumberland Gap 153
60. George Rogers Clark 157
61. On the French Broad 159
62. John Sevier 162
63. James Robertson 164
64. Sevier Monument, Knoxville 165
65. Old Statehouse, Knoxville 166
66. Street in Knoxville 168
67. On the Campus, University of Tennessee 169
68. Marble Quarry near Knoxville 171
69. Statehouse, Nashville 173
70. Chattanooga from Cameron Hill 175
71. Broad Street, Atlanta 177
72. Fulton Bag and Cotton Mills, Atlanta 178
73. Georgia Institute of Technology, Atlanta 179
74. Iron Furnace, Birmingham 180

MAPS
Eastern United States Frontispiece
New England 4
New York 26
Pennsylvania 64
Southern Appalachian Region 132
FROM TRAIL TO RAILWAY
CHAPTER I
BOSTON AND THE BERKSHIRES

From the time of the settlement of Massachusetts Boston has


had a large share of the business of the country. Her natural
advantages are great. On the one hand there is her harbor, sheltered
by many islands from the storms of the Atlantic; on the other are tidal
rivers and level highways leading to the interior of the state.
Emerson, who was born in Boston, wrote:

Each street leads downward to the sea,


Or landward to the west.

For generations, as the city has grown, her people have been
crowding back the ocean by filling in the shallows, and now her busy
streets extend over acres of “made land,” while from the south, the
west, and the north, lines of railway connect her with all parts of
America.
Not many years after the War of the Revolution a Boston
merchant ship went around the world. She took on board a native at
Hawaii, sold her load of furs in Canton, rounded Cape Horn, and
anchored at length in Boston harbor. So great an achievement did
this seem that Governor Hancock and the people said fine things
and made merry.
This little ship was eighty-three feet long, and you could measure
off seven or eight times her length on one of the big liners of to-day.
Later the same ship set sail again, and on the west coast of America,
in one of the roughest seas, her master, Captain Gray, saw the
mouth of a great river. He was determined to enter it. Having crossed
the breakers, he sailed up the river more than twenty miles, and to-
day it bears the name of his ship, the Columbia. Boston was
reaching out into the wide world. Many years later this discovery had
much to do with securing the rights of the United States in the
Oregon country against the claims of Great Britain.
Young lads often went out on these voyages, and the training
made them strong men. There were dangers on the ocean then
which to-day we do not fear, for pirates still lay in wait for
merchantmen and foreign powers took liberties with American ships.
One vessel seen in Boston harbor was named Catch-me-if-you-can.
Many years later, when Mr. Samuel Cunard of Halifax took a
contract to carry the royal mail between Liverpool and America, there
was an immediate protest from the Boston merchants against ending
the voyage at Halifax. They urged the great commercial advantage
of having the ships run westward to Boston after stopping at Halifax,
and so powerful were these arguments that the first Cunard liners
came steaming into Massachusetts bay.

Fig. 1. One of the Cunard Steamships which sail from Boston


To-day
This was not pleasant for New York people, who tried to show
that theirs was the better port. As if to help in the fight against
Boston, the harbor froze over in the winter of 1844, and the Cunard
ship, the Britannia, could not sail. Determined to hold their own, the
Boston people engaged Frederick Tudor, a great exporter of ice, to
bring his machinery from the fresh-water ponds and cut a way. He
soon made a lane of open water, and the Britannia sailed out for
Liverpool.
While ocean trade was growing much had been done on the
land. Settlements were first made at Plymouth, Salem, and Boston,
and as soon as possible the rough forest trails joining these towns
were changed into roads. Many ferries and bridges were needed to
cross the streams, and roads were carried back into the country as
the people settled farther from the sea.
After Providence was begun, in the Narragansett country, and
the rich lands along the Connecticut were settled, there was need of
roads across the hills of Massachusetts, so that the colonists could
visit each other, exchange letters, and thus be less exposed to
danger from savages in the great American wilderness.
The highway leading along the east coast was called Bay Road.
A post rider went between Boston and New York in 1704, and a
rough path he had to travel. It was thought remarkable, four years
later, that a woman, Madam Sarah Knights, made that journey. She
afterwards taught school in Boston, and Benjamin Franklin was one
of her pupils. Somebody scratched these lines on a window pane in
her schoolroom:

Through many toils and many frights


I have returned, poor Sarah Knights;
Over great rocks and many stones,
God has preserved from fractured bones.
New England
Boston and Maine Railroad (Fitchburg Division) +-+-+-+-+-+
Boston and Albany Railroad —————

There is no doubt about the “great rocks and many stones” of


New England, but around Boston, at any rate, one usually sees them
now at a safe distance.
In western Massachusetts is the great Berkshire country.
Through most of its length the Housatonic river runs to the
southward. At the north the Hoosick river flows from it, across a
corner of Vermont, to the Hudson. On the first is beautiful Pittsfield,
and on the second is busy North Adams with its mills. In sight
everywhere are the mountains, not very high and usually covered
with forest, but sometimes bold and rocky. Farther north we should
call them the Green mountains, but here we name them the
Berkshires. The eastern range, which separates the Housatonic
valley on the west from the Connecticut valley on the east, is Hoosac
mountain, of which we shall hear again.
These long ranges of mountains run from north to south, and
while it was easy to follow the valleys between them, it was hard to
go across them from east to west or from west to east. Boston and
all the chief towns of New England lay eastward, and the rest of the
country was west of the mountains. If a Massachusetts family wished
to settle in the fertile lands of western New York or Ohio, they had to
cross the mountains. In our day the mountain region is full of towns
and beautiful summer homes, but then it was a wilderness which in
places was almost impassable. If it was difficult to make a single
journey between the Connecticut river and the Hudson, it was quite
out of the question to carry grain and fruit from the West to Boston,
and to bring back in exchange the goods made in her factories.
Near Pittsfield, in the heart of the Berkshires, rises the Westfield
river, which has cut a deep valley eastward through the mountains.
Opposite the place where this stream enters the Connecticut the
beautiful city of Springfield has now grown up, partly on the low
grounds and partly on a terrace. It is readily seen that the Westfield
valley forms a natural roadway from here westward to Pittsfield, and
on toward Albany and the Mohawk in New York. We cannot say that
the valley was made for the cities, but the cities were made, in part
at least, because the valley was there.

You might also like