Monday, September 30, 2019

Monsoon Wedding

Monsoon Wedding, directed by Mira Nair, is a story of a closely – knit, well – off Indian family reunited for the arranged marriage of Lalit (Naseeruddin Shah) and Pimmi (Lillete Dubey) Verma's daughter, Aditi (Vasundhara Das) is set in the modern day New Delhi.   Aditi will marry Hemant Rai (Parvin Dabas), a Houston – based software engineer, someone she barely knows. The plot, which initially appears to be simple, will take a sharp turn as the audience witness, Aditi's affair with her ex – flame, Vikram Mehta (Sameer Arya).   As the wedding approaches, we see the arrival of Aditi’s relatives and friends, from her cousins to her in – laws to the wedding planner.   From then on, a wide array of multifaceted and damaging relationships, begin to unfold (Mundhra NP). The most remarkable thing about the film is its production values.   It is brightly shaded with primary colors and other eye – catching hues that give each and every scene a life of its own.   The lively colors of the wedding household give a powerful contrast to the city outside of its portals.   The clever direction by Nair was matched by the witty cinematography of Declan Quinn.   Furthermore, the tandem was complemented by the lavish production design by Stephanie Carroll.   The combined forces composed a look that will surely satisfy the curiosity of the international audiences seeking to take a peak of Indian culture, while doing justice to that culture (Ibid, par. 1). The musical score of the film synchronizes with all the other elements at just the right tune.   After all, an Indian wedding will not be complete without music. In the film, it takes the spotlight as composer Mychael Danna effortlessly depicts the cheerfulness of the occasion while balancing it off with the gloomy moments through his clever musical score (Ibid, par. 2). The film deserves a round of applause for not reducing itself to be a moralistic portrayal of the Indian marriage culture to the delight of its international audiences.   Through this, the audiences are able to see things as they are without the outer trappings that rob it of its authenticity.   There is no stopping Nair of educating his viewer as they are taken into a glimpse of the Eastern life.   As a result, the audience becomes the honored guests to the wedding as the rest of the cast add to the simple ambiance as the story is told (Ibid, par. 3). There are scenes in the film that is consumed by sentimentalism which all too familiar with movies of the same kind.   Nevertheless, it did not spoil the rest of the otherwise jovial moments in the film.   It just leads to the realization that after all, a wedding is a sentimental occasion indeed.   It is a luscious take on the relationships that gives definition to a family which sets them apart from all the rest.   It is a theme that surpasses all boundaries demarcated by culture, while remains the same thing that defines them (Ibid, par. 4). As most of the characters in the film are Hindu, Monsoon Wedding is clearly not a Christian flick.   This is true even though the characters have undergone moderate secularization.   Secular Indians though remain true to their vow to monogamy.   They spend the rest of their lives as one family and stick it out together against all odds.   This serves as their distinction from their Western counterparts.   In point of fact, Bollywood films have gained recognition for the optimistic take on the subject of marriage and morality (Noll NP). The audience needs to watch out for the notices on the use of bad language in films.   Most films rated â€Å"R† by the regulatory board contain sex, violence and foul language.   There are no rules governing how much sex, violence and vulgarity prohibits Christian viewers to see a certain film.   There are Christian who totally abstain from watching films of this kind.   Nevertheless, Christian viewers should pass up every opportunity of watching pornographic or â€Å"X† rated films or even those with â€Å"R† on their ratings (Ibid, par. 6). Then again, we can not confine viewers as they all exercise the liberty to decide which films tickle their fancies.   In reality, there are Christians who prefer to watch â€Å"R† rated films.   This is the kind which includes sex, violence and vulgarity but do not venerate whatsoever any untoward behavior (Ibid, par. 7). In the real world, the use of vulgar words is close to impossible.   For some people, it is just as inevitable like for example P.K. Duyebi of Monsoon Wedding.   The audiences do not find it hard to relate to his character as he portrays a very human trait.   Throughout the course of our lives, we are all in search for something better.   In his case, he found the love in Alice, a Christian.   However, truth be told Alice alone will not be able to clear Dubeyi mouth off his vulgar choice of words (Ibid, par. 8). Love has been the most clichà ©d themes ever captured on film.   Nonetheless, Nair’s ability to capture on film the different faces of love remains to be unparalled even after many attempts have been made to follow her lead.   In most cases, love as a cinematic theme has been depicted as it dangerously strides on the verge of melodrama to sentimentalism.   However, the love story has always been told about a man and a woman (Mundhra NP). Love comes in all sizes and shapes.   It is so universal that it seems to speak just one language.   Regardless of race, color and culture, love remains to be our common ground.   Love is a powerful force so powerful that it can sometimes get the better of us.   As life is not always a bed of roses, so is it with love.   We all struggle along the bitter pangs that come with the whole package at all possible expenses.   But love remains the driving force that steers us through the everyday grind. Without it, we seems to be at a lost, alone in an island where no one will seem to come to our rescue.   Nevertheless, the imperfections of life are certainly what make it more worth living.   It test our patience and our faith that against all odds we could still come out unscathed and even more stronger to live another day. On the other hand, Naiz exploits all of these classics and injects so much more of her own.   She has cleverly done so by breathing life a tapestry knitted with brightly – colored fancy and cruel certainty, satire and authenticity, the bliss of love as well as its nasty incarnations (Mundhra NP). The film outlines five interconnected stories each of which traverse the many faces of love.   Each story transcends culture, territories and ethics.   It celebrates the modern Indian life never before captured on screen (Mirabai Film NP). Nair and Dhawan, created a link between the old and the new, the conservative and the bold, the naà ¯ve and the sexual in the modern day India.   The camera style employed in the film becomes the viewer’s eyes as they see through the lenses the kind of lives the characters portray.   The audiences are ushered in to the Punjabi culture, Nair’s very own.   Such culture is characterized as hearty, earthy and effervescent.   All these set against a backdrop of lively Bollywood music accompaniment as endless serving of kebabs and whisky depicts the festive mood that makes it undeniably a Punjabi wedding (Ibid, par. 13). The camera style was utilized in the film.   It is the style usually employed in filming documentaries.   The hand – held camera, switching back and forth takes the audience attention from one character to another.   It moves around a crowded room while it runs after the characters whose all over the place at one time or another.   A film shot entirely in this style can be exhausting for the audience even though many traditional set – pieces were injected to the scene when the sense of movement and action requires an undisturbed mode. Moreover, this style primarily relies on the sense of movement – the wedding hues, the choppy, the witty exchange of words, the trips around the city, makes the audience behave like a wave after another.   There are stoplights along the road though just when you think the finish line is near, another race begins.   The camera style, at a certain extent can be exasperating and jarring to bear the entire length of the film (The Everything Development Company NP) Work Cited Monsoon Wedding. Dir. Mira Nair. IFC Productions, 2001. â€Å"Monsoon Wedding.† 2008. IMDb.com, Inc. Retrieved February 8, 2008, from   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   http://www.imdb.com/title/tt0265343/plotsummary. â€Å"Monsoon Wedding, a new film by Mira Nair.† 2008. Mirabai Film. Retrieved February 8,   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   2008 â€Å"Monsoon Wedding.† 2008. The Everything Development Company. Retrieved February 14,   Ã‚  Ã‚   2008 from http://everything2.com/index.pl?node_id=1240139. Mundhra, Smriti. â€Å"Review of Monsoon Wedding.† 2008. IGN Entertainment, Inc. Retrieved   Ã‚  Ã‚  Ã‚  Ã‚   February 14, 2008 from http://movies.ign.com/articles/354/354297p1.html. Murphy, Gareth. â€Å"Monsoon Wedding.† 2007. Entertainment.ie. Retrieved February 14, 2008 Noll, Stephen. â€Å"MONSOON WEDDING (2001). Notes for Mars Hill Video Club.† 24    September 2007. Stephen's Witness. Retrieved February 14, 2008. ;

Sunday, September 29, 2019

KfC Pest Analysis Essay

Political Factors: The political factors includes the government policies as KFC being a foreign company, but they have to obey the policies of the Government laid by the government of Pakistan, the country where the business activities are being carried out. KFC has handled this situation very tactfully and has obeyed the policies of the Government as prescribe by the government in order to run this kind of business. The other major factor is the pricing policies. KFC maintain & design its price policies keeping in view the income & income distribution of the people living in the country. That’s why all the classes are the target market of KFC. And the most important factor is the political instability. As in Pakistan, there are political crises faced by the government, these greatly affect the business of KFC. Economical Factors: The economic factors includes the income of the people, KFC is going to target. Income is an important economical factor of the KFC. This factor decides which class KFC is going to target. In the early time of KFC, they were focusing on the upper class but they after some time changed their strategies and started to target the mass market by introducing some different kinds of meals and offers through which we can say that they target the middle & the upper level as well. The consumption behavior of the people plays an important role. KFC also estimated the consumption behavior of the people, their liking and disliking and make decision accordingly. Payment method is an important factor in the economical factor of the KFC. They check the behavior of the regarding the payment methods of the people. They check whether the gives money in the form of cash or plastic money. Socio-culture Factors: The Social/Cultural Factors includes the Social Class, as it is discussed earlier that KFC target all the class including the upper class, upper middle and lower middle class etc. Although the culture of KFC from where they come is entirely different but they have adopted the Pakistani culture as they had to serve the people living in Pakistan having entirely different culture from other areas. And it has not only adopted the Pakistani culture but also the Religion as well. They offer Halal foods to the customers,  which is the symbol that they adopted the Muslim religion strategies as they had to serve in the Muslim country, to the Muslim customers. Technological Factors: The technological factors include the Pace of change at a fast level. Pace of change mean rate of change. KFC has strategy to introduce new technology whenever they think that it is a time to introduce new technology. Research & Development is also an important factor in the Technological factor. KFC always support the work of research & development in order to introduce the new technology. Capital formation means stock of machinery. KFC has a stock of machinery in order to run its business activities. In other words KFC has a good amount of Capital Formation.

Saturday, September 28, 2019

Brazils Communication Essay Example for Free

Brazil’s Communication Essay Every country has unique, distinctive ways in which they interrelate and communicate with each other within their country. A country’s means of communication can be verbalized through verbal, non-verbal, and interpersonal communication channels. In the country of Brazil most people are not Hispanic but Latino, although many immigrant communities are from Europe, Africa, and Japan. The official language spoken in Brazil is Portuguese; however, Spanish, English, and French are other languages that are also spoken in Brazil. When greeting they expect a firm handshake with strong eye contact. When doing business in Brazil don’t be taken aback if they stand very close to you when speaking. Moving away may be interpreted as rejection. Brazil also uses many forms of non verbal communication. Much of this body language is comprised of culturally derived behaviors. When speaking to one another, it is not normal to take turns speaking. People will interrupt a conversation and will often speak at the same time as their peers. Another verbal communication pattern that Brazil practices is using first names when addressing a person. Also, one’s tone of voice is often high pitched when conversing with one another. Although daily conversation is conducted in a louder voice, it is not meant to express anger or hostility to anybody. In addition, verbal communication in Brazil is viewed as being theatrical and overly animated by other countries who are more reserved. In Brazil, physical appearance and surroundings are important and provide visual cues as to one’s status and tone of conversations. In many Latin countries, communication tends to be predominately oral rather than through written word. However, from the business aspect, when sending something in written format it is usually a good idea to follow up with a phone call or a visit in person. Over the last two decades, the telecom industry world over has grown and evolved at an incredible pace and has significantly changed the way people interact. Brazil Telecom offers long distance telecommunications services hrough some 8,034 million lines and 281,800 public telephones to customers in Brazil. Oi Telecom, formerly known as Telemar is the largest telecommunications company in Brazil, it was established in 2008 and has become the biggest company in Brazil on the Telecommunications sector. This company is present in 4600 cities in Brazil and it has influenced the price drop in the national level of the same services offered by competitors due to strength of its operations in the country. Brazil’s Communication. (2017, Jan 04).

Friday, September 27, 2019

COLLECTIVE BARGAINING Coursework Example | Topics and Well Written Essays - 250 words

COLLECTIVE BARGAINING - Coursework Example rkers and in the employment of workers safeguarded by the union, it is therefore important to know the statutes that need to be considered to ensure a smooth running on either sides. The Public Law Act passed by the congress in 1964 is categorical in defining the way a worker should be handled and the procedure that need to be followed in cases of firing. It discourages discrimination on any basis that include race and sex. The Equal Opportunity Commission (EEOC) was created to ensure that the legislations created in regard to the same are adhered to and the law is being enforced effectively without favor or fear. Knowing the statutes and the acts that describe the employer-employee relations is important and so I would advise the management to be cognizant with them before the agreement is done. This will be critical in avoiding tussles when any of the parties breaches the contract and the other seeks the intervention of the

Thursday, September 26, 2019

Legal Aspects in Health Care Assignment Example | Topics and Well Written Essays - 500 words

Legal Aspects in Health Care - Assignment Example For instance, the contract may be annulled if it is determined that the buyer was non compos mentis at the time of entering the contract. The legal intent of selling the CT scan is fulfilled in it being bought to serve its rightful purpose, such as carrying out diagnoses or archaeological investigations. Finally, the contract is sealed in the relevant parties receiving value from the agreement. It is obvious that the vendor will get his money for the CT scan, from the buyer on one hand. On the other hand, the buyer expects the CT scan to work well, thereby helping him meet his objectives. Apart from the four components, it would help greatly to insist on the token of the contract, which is the permit. The gravity behind this is that it is in the permit where the terms and conditions of the contract are enshrined. Terms of guarantee are divulged here, apart from the permit just showing legitimate possession. This is serious since in the absence of a permit, if the CT scan stalls after a week, the buyer may not be guaranteed of any reimbursement or free repairs. In this case, the patient through his absence undermines the capacity of the hospital to fulfill its obligation in the contract. The time-specific aspect of the contract is also undermined by the patient’s absence. Nevertheless, it cannot be aptly said that the patient’s voluntary and informed absence amounts to a contravention of the part of the contract, since he is acting out of an illness. Addiction is an illness that should have warranted more specialized attention from the healthcare institution. On the contrary, the healthcare institution is the entity that is liable since part of the patient-hospital contract is good care. The patient being away for four hours means clearly that the hospital is not taking good care of its patients, if at all (Becker, 2012). The fact that the

Finding Partners Coursework Example | Topics and Well Written Essays - 750 words

Finding Partners - Coursework Example They will also be encouraged that having AIDS is not the end of everything they should go on and fight for their lives. As a public health officer, I will need help from different people such as, other local health officers, church bishop, politicians, school principal, and government officer in land department. I will also need help from; mahindi investments, NGOS, university in health departments, eldowers and radio presenter from a local station. With the help of this people, I will be able to eliminate AIDS from my community leaving my people healthy and fit. Bishop Njenga will be instrumental in encouraging and advising the victims living with HIV/AIDS. He will also assist in reducing the level of stigmatization of AIDS patients within the community. The Catholic Church has particular interest in helping the sick and the needy. This is the main reason why the bishop, as a representative of the Catholic Church, will heed to join this mission. Mr. Kibwana will be instrumental in this project by assigning the AIDS victims with a portion of land provided by the government to support people living with the disease. The government is keen on ensuring that the people living with the disease have equal opportunities within the society, such as the right to land ownership, which some of them usually lose owing to the high level of stigmatization within the community. Mr. Kibwana will be an interested partner in this project because it will assist him in identifying people living with HIV/AIDS in the community. Mr. Musyoka will be instrumental in this project by providing the necessary funds needed to undertake the project. The city of Sirare is on a heightened initiative to create HIV/AIDS awareness within the community owing to the high rate of victims who succumb to the disease. For instance, the immediate former town mayor died of HIV/AIDS. As such, this project

Wednesday, September 25, 2019

IHRM(international human resource management) Essay

IHRM(international human resource management) - Essay Example The following sections will deliberate on Volvo’s strategies of maintaining competitive advantage in the Curitiba market. Resources and capabilities that Volvo can obtain from Curitiba It is apparent that for any organisation to develop and maintain competitive advantage, just like Aaker and McLoughlin 2007 stipulated, some concepts of working towards attaining organisation’s goals should be articulated upon. Curitiba, being a region of congested traffic, has been a potential market for Volvo. This is arguably true because, as contingency theory stipulates, the environment in which an organisation operates involves articulation of factors such as size and technology among many other factors (Hooley, Piercy and Nicoulaud 2008). In this regard, it is evident that Volvo has strategized on gaining competitive advantage in the Curitiba market. The fact that Curitiba is traffic congested makes it a strategic market for Curitiba to operate in. in essence, Volvo specialises on providing the buses for public transport. Analytically, this is in line with strategically operating in an environment that can provide market for its automobiles. Basically, the primary goal of any organisation is to enter into a market that has demand for its products, thus offering an opportunity to make profits (Martin 2013). Nevertheless, it is indispensable of the management of organisations to apply principles of leadership and management in order to make the right decisions when entering new markets. In another dimension, Volvo must have considered the issue of corporate social responsibility. In any metropolitan area, organisations should focus on applying both economic and corporate social responsibilities in order to be successful. For example, before entering into the Curitiba market, Volvo was aware of the need to formulate a strategy that would bring growth in this region. For example, in the process of providing buses for public transport, Volvo has simultaneously cre ated jobs for many residents in the city. The CSR issues involve bringing in social and responsibility factors into action (Piercy 2009). When people get jobs through Volvo’s involvement in the public transport, their lives get uplifted, thus bringing the overall growth of the city. In addition, Volvo has been able to create its own organisational culture, through which its competitive advantage has been developed and maintained in Curitiba. Volvo’s organisational culture has been a reflection of its vision statement. However, organisation’s culture is developed strategically by its leaders and managers. It is the reflection of what the leaders and managers believes in and work towards realising their goals (Ranchhod and Gurau 2007). In order for Volvo to have managed to capture the Curitiba market, it is apparent that the management has developed a culture that keeps the company growing and surviving in a highly competitive market. For this to happen, the leade rship of the organisation should be well conversant with how to both manage the workforce and focus on customer satisfaction. Studies have document that forms that empowers their employees through various employees wellness and reward programs tend to have a smooth organisational culture development. Therefore, the human resource department must have a grasp of how it can motivate its employees in order to deliver top results. In regard to Volvo’s case, its workforce could be termed as proficient

Tuesday, September 24, 2019

Organisations and Behaviour Essay Example | Topics and Well Written Essays - 2750 words - 1

Organisations and Behaviour - Essay Example Decision making is something that keeps the organization active and flourishing while adapting the uncertainties in the environment. The process of Decision making gets heavily influenced by the rate at which the information travels and the number of members it can reach inside an organization. These two factors are generally considered as less positive in a hierarchical structure of an organization. Today the trend of participation of the workers in the decision making process is significantly dominating the markets. According to Frederick Winslow Taylor who is regarded as the Father of Scientific Management, the management of the firm should organize the work in a manner which will make optimum use of the workers, by dividing the work and introducing efficient methods for making a product. Taylor’s concept focused mainly on hierarchic organization structures and task specialization. Taylorism states that there is a best way for each task and it can be learnt through proper t raining and development. (Asseldonk & Vos, 2007, pp. 1-3) The theory of Taylorism represents a mass production system. This theory views the workforce simply as machineries which can be made efficient by the reduction of wastage. However, this theory completely neglects the usual complications that happen within a normal human being. Hawk Car company continuously followed conventional production methods as was proposed by Taylor’s theory. The workers used to follow an assembly line production process where each one had to perform a specific job. Job specialization created frustration among the workers. Their job became monotonous. For example, the worker who used to fit lights into the vehicles, continued to fit lights for his whole work life. He never knew how to fix the seats in a car. As a result the workers felt lazy and de-motivated with their work. Also the hierarchical system in the management treated the workers as costs. Their opinion or suggestion was not at all con sidered to be important. Due the hierarchy structure of the organization, the workers felt uncomfortable speaking to their managers about their discomfort. The relationship between the manager and the workers followed the authoritative style where two way communications was never entertained. The higher level employees only used to give directions to the workers and the supervisors only had a close watch on their works. No one bothered about the grievances of the employees. (tiplady.org.uk. n.d, pp.1-2) also the standardized form of production failed to meet the market demands. Taylorism way of management prescribed the organization to separate the planning and execution activities. It recommended division of labor and too much hierarchy into the management. However, the management of Hawk Car Company realized soon that too many levels in the organization makes the functions too much complicated. For the betterment, management opted for participative style of management where the la yers of hierarchy were reduced putting emphasis on the participation of each member in the decision making and planning process. It also trained the employees in such a manner so that they can gain knowledge about the entire production system. The workers were provided scope to grow in their position by better performance. The training focused on the worker’s personal issues as well which were addressed with care. The aim of this remodeling decision

Monday, September 23, 2019

My Life in the United States Essay Example | Topics and Well Written Essays - 1000 words

My Life in the United States - Essay Example My father called one of his friends who was studying at the US and enquired about the university in which he was studying. In 2009, I came to the US. I began studies in English Language Program at VCU and this was because I was not a native speaker of English. After that, I improved on my English as a second language day by day. When I was in ELP, I had difficulties in two classes, these were Listening and Reading, but despite this, I performed well in the tests. While in ESL, I met new students from different countries and I had a great time with them. My professors were also understanding and helpful, making my learning much easier. At the Fall semester in 2011, I completed my English Language Program. Since then, I have registered 16 credits which are Public Health, LS 100, ESL Reading, Mass media and ESL Communication. These classes make me confused, considering the fact that this is my first time as an academic student in my whole life. I found this semester to be hard and confusing at the beginning. This is because some teachers speak very fast and I find it hard to take notes in class. However, I believe that as the days go by, it is going to get easier and normal for me. Besides, I have to concentrate on what I came to do in this institution. In addition, UMU is a great university and the professors are going to teach me what I have to learn. I hope that my classmates and I will get good grades in all our classes. I believe in my father's famous quote that says, †would never reach your goal without difficulties.†

Sunday, September 22, 2019

Why Cell Phones Should Be Allowed in Schools Essay Example for Free

Why Cell Phones Should Be Allowed in Schools Essay Cellular devices should be allowed to remain on during class time. The primary reason is if a student has an unexpected family emergency, their parent, or guardian should be capable of contacting them. In addition, some students must be able to get a hold of their parents, or friends that drive them home to confirm that they still have a ride, or if sudden adjustments with rides occur. If the students are not allowed to keep their cell phones on and something terribly serious takes place at home, or various other places with family members or friends, the school may perhaps be held responsible for the student not knowing. Cell phones should unquestionably be allowed to stay on in class. Students hold the right to keep their cellular phones on for the entire period of class time. The students are mature enough to uphold their rights as human beings. You take our cell phone liberties away, what other freedoms will strip from us? As American citizens we must come together and protest for our cell phone rights. It is our right and sovereignty to have our cell phones on in class. It is extremely wrong that our school and district requests that we the students be mature adults, although they will not permit us to make the decision if we should be on our cell phones or not. I recognize that numerous students are not grown-up enough to attain having the right to use or cell phones in class. However, that is why we include consequences. There is no equality in confiscating the rights away from those who can handle being a responsible adult because of the few who cannot. The majority of the students can identify when it is an acceptable time to utilize their mobile phones. Works Cited: 1. http://findarticles.com/p/articles/mi_qa3617/is_200402/ai_n9408441

Friday, September 20, 2019

Card Security For Republic Bank Customers

Card Security For Republic Bank Customers There is no doubt that most organisations today are becoming essentially dependant on the use of credit cards, arguably its most strategic asset, is to support existing business operations. However, credit card fraud and identity theft has continued to plague the banking and retail industries as there seems to be no feasible solution to these crimes. Advances in technology have opened a gateway for hackers to restructure their position of attack, intruding on ones personal life. The basis of this project is on the new Chip and PIN technology introduced on credit cards. Ive considered this to be an interesting topic because of the publicity this technology has been receiving across the world and it has even reached to our shores, here in Trinidad and Tobago. Hence, Republic Bank Limited one of the local banks would be the case studied in this research. Chapter two would encompass the existing literature on credit card history and Chip and PIN. This chapter would outline how credit cards have become smart cards and how the Chip and PIN cards are used. Chapter three gives the entire design of the project and the objectives to be obtained for the research. Moving to chapter four, the research framework adopted for this study on Chip and PIN and how it relates to the model undertaken in the research. The findings from this research would be summarized version of the data collected, with the analysis of the theory and research framework the author undertook in this study. In concluding, the author would report on the learning aspects of the research and provide an assessment of achievements, giving a position on the research question. Literature REVIEW This section is intended to place the scope of the project with literature surrounding the components of the research question. The Credit Card Transaction Process Discussed This payment mechanism was formally introduced in 1958, when the BankAmericard card, now known as Visa was franchised across the global community. By introducing an electronic authorization system, the BankAmericard was able to be used globally. Now by partnering with banks across the globe, Visa has been able to provide an international processing system for the exchange of money. The workings of a credit card transaction are such that it comprises of four main steps. These are: Authorization Batching Clearing Funding The cardholder requests a purchase from the merchant, which is then submitted to the acquirer by the merchant. The acquirer then sends a request to the issuer to authorize the transaction. Once the authorization code is sent to the acquirer verifying that credit is available, the transaction is authorized and the cardholder receives the product. (This is further explained in detail on page 9 of this document) This simple process of electronic transacting has opened up a world of e-commerce opportunities. From an information system perspective the processing workflow of an online credit card transaction is shown below: Figure 1: Online Credit Card Processing Workflow Diagram (Hubbard, 2003) Because of the vulnerabilities that lay in a transaction, more so the networks across which the information is exchanged, various security breaches can occur. Types of Credit Card Fraud There are many different types of credit card fraud. Fraudsters are very innovative in finding new ways of committing credit card crime and as technology changes so does their crime tactics. Security issues surrounding the card fraud has moved from the traditional ways of committing credit card crime (Application Fraud, Intercept Fraud and Lost/Stolen Card Fraud) to the modern techniques namely, Skimming, Site Cloning and most recently Triangulation. Skimming is the fastest growing type of credit card fraud around because of its simplicity. Pocket Skimming devices can be easily carried around and the cardholders data can be obtained by merely swiping the card through the battery-operated magnetic card reader. This technology has also evolved so as to read the data of Chip and PIN cards, with the use of a scanner. These scanners, which can write or even re-write the data on the Chip cards, are fully portable and have high storage capacities. Because some of these devices are not illegal, they are easily accessible to hackers and can be bought over the internet. Site Cloning involves cloning an entire site or just the pages where customers make purchases. Since the web pages are identical customers are not aware that their personal information is being compromised. Also, confirmation details are sent to the customer just as the official companys website would, so the crime goes undetected. The details entered on the cloned site are then used by the fraudster to commit credit card fraud. Another method of credit card fraud is Triangulation. Goods are presented on websites at discounted prices, which can be shipped to the customer before payment. Again, just as with site cloning, the site appears to be legitimate then the customer proceeds to enter their personal data. With this captured information the fraudster can then order goods from legitimate retail websites using the credit card number obtained. Due to these security issues surrounding credit card information security, there has been global industry-wide concern for the protection of cardholders data. Since security management is a systematic issue, a serious look at what can be done to prevent security breaches is necessary-whether it may be legislation, the use of fraud detection system monitors or the application of data encryption/ authentication techniques. Chip and PIN Technology Credit cards have been a feasible solution for making payment processing simple and efficient. The history of the credit card dates back to the 1900s when oil companies and proprietors created their own credit card as a means of obtaining customer loyalty and improving customer service. However, as with advances in technology, the credit cards have evolved from having just encoded magnetic stripes to modern day Chip and PIN cards, with embedded microchips, which can store and transmit data. These Chip and PIN cards were developed to provide an inter-operative system that would combat card fraud (counterfeit and plastic cards). This transaction processing infrastructure has enabled the cash-less revolution, whereby consumers, governments and businesses benefit from the electronic payment network, which has shifted payments by cash and cheques to an efficient electronic payment system. The mechanics of a credit card transaction is such that the merchant acquirer, usually the bank processes transactions on behalf of the merchant. This payment by credit card represents an offer for issuance of payment in exchange for the goods or services provided by the merchant, (Transaction Processing). There are two parts to this type of transaction processing: the first is front end processing which involves the capture of data messages across communication channels to the point of sale devices; and secondly the back end processing which involves the balancing of accounting information by acquirers and issuers and the submission of the payment to the acquiring merchants bank. As a result of the rapid advances in technology, data security continues to be a major concern as every transaction that involves the transmission data across networks is open to external attacks. Attacks on a consumers card information can come from any angle, whether it may be data thieves or network intruders. The Payment Card Industry Security Standards Council (PCI SSC), which comprises of major payment brands namely VISA, MasterCard, Discover and a few others, have created global compliance standards to protect cardholders data. These set of standards help govern and educate all merchants and organisations that process, store and transmit data, as well as the manufactures of the devices used in transaction processing. The PCI SSC (2010), Data Security Standard Quick Reference Guide, as summarized below, outlines the best practices for protecting cardholder data: Develop and Maintain a Secure Network Install and maintain firewall configuration to protect cardholders data. Do not use vendor-supplied defaults for system passwords or other security parameters. Protect cardholders data Protect stored data Encrypt transmission of cardholders data across open public networks Maintain a vulnerability management program Use and regularly update anti-virus software or programs Develop and maintain secure systems and applications Implement strong access control measures Restrict access to cardholder data by business need to know Assign a unique ID to persons with computer access Restrict physical access to cardholder data Regularly monitor and test networks Track and monitor all access to network resources and cardholder data Regularly test security systems and resources Maintain an information security policy Maintain a policy that address information security for all personnel Nevertheless, despite these procedures in place, there has been amplified instances of the various types of credit card fraud, namely Intercept Fraud, Skimming, Site Cloning as well as Triangulation. This propelled an industry and governmentà ¢Ã¢â€š ¬Ã¢â‚¬Å"led initiative in the UK to embark on the introduction of Chip and PIN card technology. Based on the EMV standard (Euro pay, MasterCard, Visa) Chip and PIN technology was launched in the UK on February 14th 2006. This programme was introduced to combat credit and debit card fraud, and to provide an ideal way of validating the cardholders identity. By utilizing smart card technology a microchip is embedded with the customers information which includes their unique four digit PIN. For transactions to be accepted, the customer PIN entered must match the one encoded on the microchip. These steps are further explained below: The card is inserted by the customer into the card reader. The card reader would then prompt the user to insert their PIN. A four-digit PIN is then entered by the customer. Once the reader accepts the PIN entered the transaction would be approved. Note the PIN entered is not displayed on the reader but rather represented by asterisks. The customer is issued a receipt as confirmation of the transaction process. This process removes the responsibility and accountability from the merchant to the customer for point of sale transactions. The card never leaves the customers hand and as such prevents skimming of ones card information. One of the benefits of the Chip and PIN cards is that the Chip itself is encrypted with a range of security features, which the transaction processing system uses to identify the cardholder. These security features are said to be virtually impossible to replicate. The terminals used for Chip and PIN transactions, use secure transmission technology to ensure the privacy of the cardholders data and can operate over a range of connectivity environments, such as wired, wireless and cellular networks. The PCI Security Standards Council also developed a framework of standards which is legally enforced through a merchant/service provider/card brand agreement. These include requirements that support the encryption of the cardholders account data and the point of sale terminal integration. Figure 2: Outline of the process of a Chip and PIN transaction The PIN entered replaces the request for signature as verification of the transaction. This is why the banking industry in the UK has campaigned for this technology, because signatures can be forged, however the PIN is unique to that person. Although the United States is yet to convert to this technology, countries such as Japan, China, Canada, Mexico as well as the majority of the European Countries have all introduced Chip and PIN technology and it is gaining momentum in various other countries including Trinidad and Tobago. Republic Bank Trinidad and Tobago Limited is the first local bank in Trinidad and Tobago to introduce Chip and PIN technology to make the concept of paying by credit card safer for cardholders. The bank adopted this type of technology because this is now an industry-wide conversion from the magnetic-stripe cards and it is also in keeping with the EMV standard. Conversely, a potential security issue with Chip and PIN card terminals is its capability of processing cards with the magnetic stripe as well. Because of this the request to enter the customers PIN can be bypassed by the merchant, with a receipt generated to be signed by the customer. Now because this option is still available it poses an added security threat to card transactions. So, unfortunately skimming still remains a huge problem for cardholders and sadly enough this includes Chip and PIN cardholders as well. Although this practice is slowly migrating from EMV compliant countries, once a card has been skimmed it can still be used in countries where the magnetic stripe is still prevalent, for example some Asian Countries and the United States. This is why many fraudsters can still create a fake card with stolen magnetic stripe information which can be used in for example the United States. The United States believes that although Chip and PIN has reduced fraud for face to face card transactions, there are a still a number of issues surrounding the security of the system used for this these transactions. Now as with any new system introduced, there have been a number of studies on whether Chip and PIN cards are really secure. So the question is has Chip and PIN technology impacted on the activities of overall card fraud or has the activities of fraudsters shifted from retail crime. In a study by Emily Finch (2010) The Impact of Chip and Pin Technology and The Activities of Fraudsters, it was recognised that since the implementation of Chip and PIN technology participants involved in card fraud made varying decisions when it came to their crime of choice. The Decision to Desist The Decision to Continue To work with others Shift to Distance Transactions Diversification of Theft into Identity The study also shows that there is a shift in the attack strategy of fraudsters from point of sale card fraud to Internet and Card Identity Fraud. In an analysis of Internet and Card Identity Fraud, we can note that Chip and PIN technology was not designed for preventing these types of card fraud. So, the question remains, was Chip and PIN successful at what it was set out to achievereduce card fraud? This too can be argued further as there are other limitations. How can one link a particular card to a specific owner? Once the PIN is known by the individual a transaction can be completed with ease. Other studies have shown that the card readers used for Chip and PIN transactions can be modified. In a study by a team of University of Cambridge Computer Scientists, they have uncovered a series of fatal flaws in the Chip and PIN system. One example is where the internal hardware can be replaced without external evidence of this. This new terminal could then be programmed and modified so that it performs just as a typical terminal, where the card details can be collected and allow criminals to make cards with a fake magnetic stripe, which along with the PIN would enable a fraudster to make valid purchases. Another example is that fraudsters can insert an electronic wedge between the stolen card and the terminal, which tricks the terminal into believing that the PIN was correctly verified. Further, with this wedge inserted, any PIN can be entered and the transaction would be verified. This type of fraud makes it difficult for the victims of the attack to be refunded by the bank as the receipt given is authentic and would state verified by PIN. The bank in turn would be accurate in stating that no refund is required as their records show verified by PIN. This type of complaint appears as an act of negligence by the cardholder as he/she allowed their PIN to be compromised. So based on this study the point of sale attacks are much more prevalent, since before the introduction of Chip and PIN cards, consumers only entered their PIN at ATMs. Now with the introduction of Chip and PIN, consumers are using their cards at various other public areas. To combat the compromising of the consumers PIN a shield over the keypad has been used as added security but in many public areas there are video cameras and a persons PIN can still be captured on footage. So, although the UK banking industry has claimed to have rolled out this new technology successfully in 2006, there seems to be some negative aspects of this technology. The architecture surrounding Chip and PIN technology is questionable and the onus is on the banking industry to ensure that cardholders information is protected. Additionally, it also seems that Chip and PIN terminals offer no difference to what the magnetic stripe terminals offered. These terminals can be tampered with, which is a clear indication that there needs to be accurate configuration of these terminals so as to secure the cardholders data when transmitting transactions and that is not vulnerable to incident of attack. So the intent of Chip and PIN technology has more so opened a new marketplace for fraudsters than prevent/reduce fraudulent activity. PROJECT DESIGN, OBJECTIVES AND RESEARCH METHODS The scope of this project is to outline the features of Chip and PIN technology and whether its implementation thus far has been beneficial. This section of the project would provide the methods involved in achieving the data for the project as well as the results based on the data collected. The chosen approach to this design is online research (journals/scholarly articles) along with a case study on the implementation of Chip and PIN technology in Trinidad and Tobago, with the case being Republic Bank Limited. Objective 1 A good foundation for this objective would be the interpretation of the credit cards history. How has this cash-less mechanism moved from a local innovation to a global payment mechanism by use of digital communication across networks? In gaining a clear understanding on the reason for the implementation of this technology, a wealth of research would be conducted on credit card technology and digital security. Objective 2 A holistic understanding on the basis of credit card fraud and the types of fraudulent activities and the steps taken to prevent credit card crime. What technologies have been implemented and the effects/benefits drawn from these approaches. Objective 3 Expanding from objective two also discussed would be whether or not since the introduction of Chip and PIN technology in the UK, has there been a cascading effect of this new technology across countries. Analysing the increasing number of fraudulent activities reported from statistics, which compelled the global banking industry to find a seamless solution for the protection of cardholders data. Objective 4 An assessment on the introduction of Chip and PIN technology by Republic Bank Limited, which would include sourcing information on its implementation and the benefits derived. Further research would be on the acceptance (or non-acceptance) of the technology by customers. Objective 5 Lastly, from the feedback received from the interview conducted and by analysing the incidents of attack on Republic Bank credit cardholders, what was the determining factor in the bank aligning themselves with the UK standards set by EMV? CONCEPTUAL FRAMEWORK In identifying the framework to be adopted that can be referenced to the literature in this research, the author considered the Delone and Mc Lean IS Success Model. Using this model, the author would explain the net benefits of adopting Chip and PIN technology, relating it to Republic Banks implementation of this technology. DeLeone and McLean IS Success Model In evaluating the success of Information Systems, the DM IS Success Model, systems quality measures the technical success, information quality measures semantic success and organisational impacts and user satisfaction measures the effectiveness of the system. The processes in the model are inter-connected by links, across the dimensions of the system. Figure 3: Depiction of the Updated Information Systems Success Model (DeLeone McLean 2002, 2003) The updated DM Model interprets the evaluation of a system in terms of the information, system, and service qualities and how these characteristics attribute to user satisfaction. As a result of using the system, certain benefits will be achieved and the net benefits will in turn (positively or negatively) influence user satisfaction and the further use of the information system. So, therefore three basic components make up this model, the creation of a system, its use and the consequences of its use. Case study as it relates to the ISS model. Republic Bank has been providing banking and financial solutions to individuals and businesses for over 160 years. Their mission is not only to provide efficient and competitively priced services but also to implement sound policies which will be beneficial to their customers. These factors presented provide clarity and influences the net benefits of the implemented Chip and PIN system at Republic Bank thus far. By use of the ISS model to map the research done in this project, the author would complete a step by step relay of the framework discussing the implementation of Chip and PIN by Republic Bank. Information Quality-Information quality refers to the accuracy/protection of the content of the data in transacting. How secure is the personalized data being transmitted across networks. When a customer presents their card to make a purchase, are they confident that their card information is protected because of the added security enabled on this card. System Quality-The system quality refers to the reliability of the network and the response time in transacting, notwithstanding the approved devices that accept personal identification numbers for all PIN based entries (the ease of use of the system functionalities). Therefore in rolling out this new technology the bank along with their partner merchants would train staff so that they are familiar with the best practice guidelines when using Chip and PIN. Service Quality-This refers to the back-end support systems that assist in usage of the technology. How reliable are Republic Banks servers and IP networks? User Satisfaction- This encompasses measuring the users entire experience-the purchase payment, receipt and service (the ease of purchasing without the fear of being a victim of fraudulent activity). Net Benefits -This is the most important success measure and it encapsulates the cost savings and the decrease in the value of fraudulent transactions arising from stolen credit card data. Was the implementation of this technology beneficial in reducing the incidents of card fraud? Are Republic Bank cardholders satisfied that their bank is on par with global industry changes? The focus of this success model lies in determining the impact the features of technology (information, system, and service quality) have on the variables user satisfaction, use, and net benefits. The main objective for using this ISS model is to establish the ultimate benefits derived from the use of information system both in individual and organizational terms. FINDINGS This chapter will illustrate the findings from the questionnaires submitted to a sample of the Republic Banks credit card customers as well as a formal interview conducted with an employee of Republic Bank Credit Card Centre. The aim of the chapter is to source an awareness of the topic area Chip and PIN by cardholders and the personnel interviewed. Primary Data Collection For the basis of the findings of this research the author conducted a formal interview with a middle management employee at Republic Bank and also distributed questionnaires to a sample of the banks credit card customers. A summarized version of the responses from the interview is represented in this chapter, based on the interviewees knowledge. The questionnaires distributed were mostly closed questions so as to deliberately avoid open-ended respondent answers. Approximately 120 questionnaires were distributed to Republic Bank Customers. Only the answers to the key questions are represented in this chapter. Summarized responses from the interview This interview was conducted with the Supervisor, Card Services, which prove to be very insightful. The Supervisor spoke about the banks vision for their credit card market, and how they plan to continuously innovate so as to maintain their customer base and attract new profitable customers. Since the credit card industry is a highly competitive one, the bank is constantly reviewing their interest rates and looking for new ways to give customer returns from the use of their credit card. Due to his long tenure at the bank and having the customer service background, the supervisor was able to give insight on what infuriates a credit card customer. He explained that customers become frustrated when they see added charges and puffed up late fees placed by the bank on their card statements. In view of the fact that most customers do not read the fine print when completing a credit card application, they are not totally aware of all the charges that can arise from delinquent payments. He f urther added that although queries like this can be explained by representatives at the bank who can provide valued solutions to the cardholders problem, the most infuriating of all queries from customers are unexplainable purchases on their account. At Republic Bank, fraudulent activity on a card can be detected from the use of their state-of-the-art security systems and their experienced fraud expert team that are in place to monitor and detect any unusual activity on a customers credit cards, but even with these measures in place, fraud can occur. The supervisor expressed that by implementing Chip and PIN technology for credit cards, the bank was able to be a step ahead of the competition and most importantly the card criminals. He also stated that although credit card fraud is not as prevalent in Trinidad and Tobago as in the developed countries, continuous education in counteracting fraudulent activities for their customer base is an effective method of addressing credit card fraud. He explained that Republic Bank has not had many eye-opening occurrences of notified credit card fraud but they believe that Chip and PIN technology is an innovative solution to the likelihood of this problem. He was also truthful in expressing that this technology is still new to the industry and all merchants have yet to convert to Chip and PIN enabled machines, therefore there is a window of opportunity for fraud until merchants are mandated to have these Chip and PIN enabled machines. He used the term mandate, because eventually all Republic Bank debit cards would also be chip enabled. In summing up the interview the author probed the supervisor on the banks position on the studies done by the University of Cambridge team on Chip and PIN technology and the tested flaws of the system. His response was quite interesting, because it ventured into a thought-provoking discussion on research. He lamented that the sphere of research done on any topic would result in the researcher seeking out the positive and negative aspects of it. How the data is interpreted, reflects the real value of the research done. Questionnaire Findings Question 5: How often and where do you frequently use your credit card to make purchases? Aim: To assess how often the average Republic Bank cardholder uses their credit card. Findings: Most Republic Cardholders in this study used their credit card regularly, at least five times per month. Credit Cards are used for purchases at the supermarket, restaurant and retail clothing stores. Question 6: Has your credit card information ever been compromised? If yes provide details. Aim: To determine the number of incidents of attack on Republic Bank credit card holders. Findings: Less than 50% of the respondents have never had their credit card data compromised. Question 7: Do you understand the workings of Chip and PIN technology introduced to Republic Bank credit cardholders and the value to be derived from using this technology? Aim: To determine the extent of the customers perception of this technologys value and how the card is used. Findings: Although some customers are guarded about the use of their credit cards, most of the respondents are confident in the service that Republic Bank provides and believes that implementing Chip and PIN gives them that added security against fraudulent activities, especially those customers that frequently travel abroad. Question 8: How do you think by using Chip and PIN cards for making payments will make it easier in transacting? Aim: To establish the efficiencies in the use of Chip and PIN cards, on the time taken to complete a transaction. Findings: Many customers applaud this technology as it reduces the time taken at the cash register when making purchases. It is simple, easy and convenient and most customers are truly happy as there is no need to write their signature. For this reason they find the system most efficient as it prevents their signature from the likelihood of being forged. ANALYSIS The main objective for the research completed on this topic, was to show how and to what extent the adoption of Chip and PIN technology has improved credit card security for Republic Bank cardholders. At a glance, before Chip and PIN technology was introduced in the UK, there was nation-wide educational literature on the benefits of the technology for banks, merchants and most importantly, the customers. However, it seems that this programme led by EMV, created more enthusiasm in the build-up to its implementation rather than the actual usage of the system. From the research, the mounting negative features of the technology and use of the system is outweighed the decreasing positive ones. It seems that the card theft criminals were focused on a solution to obstruct the successful use of the technology before the intention to use. The question remains, which facet of credit card fraud has Chip and PIN really reduced? The research show that for point of sale transactions Chip and PIN has been useful in the prevention of skimming ones card information, however the fraudsters have found alternative ways to improve on that tactic. Chip and PIN technology can only be used à ¢Ã¢â€š ¬Ã…“successfullyà ¢Ã¢â€š ¬? for point of sale transactions and not online transactions, so fraudsters have modified their techniques as with the modifications of the technology. Based on the research framework adopted, Republic Bank has measured their net benefits of adopting the Chip and PIN technology by encircling the information, service and system qualities to deliver user satisfaction and usage of the system with this technology. The success of any information system is multi-dimensional and the relationships among the constructs relate to the comprehensive evaluation of the system. The variable dependent on these constructs are the net benefits of this system, and for whom? This local company has app Card Security For Republic Bank Customers Card Security For Republic Bank Customers There is no doubt that most organisations today are becoming essentially dependant on the use of credit cards, arguably its most strategic asset, is to support existing business operations. However, credit card fraud and identity theft has continued to plague the banking and retail industries as there seems to be no feasible solution to these crimes. Advances in technology have opened a gateway for hackers to restructure their position of attack, intruding on ones personal life. The basis of this project is on the new Chip and PIN technology introduced on credit cards. Ive considered this to be an interesting topic because of the publicity this technology has been receiving across the world and it has even reached to our shores, here in Trinidad and Tobago. Hence, Republic Bank Limited one of the local banks would be the case studied in this research. Chapter two would encompass the existing literature on credit card history and Chip and PIN. This chapter would outline how credit cards have become smart cards and how the Chip and PIN cards are used. Chapter three gives the entire design of the project and the objectives to be obtained for the research. Moving to chapter four, the research framework adopted for this study on Chip and PIN and how it relates to the model undertaken in the research. The findings from this research would be summarized version of the data collected, with the analysis of the theory and research framework the author undertook in this study. In concluding, the author would report on the learning aspects of the research and provide an assessment of achievements, giving a position on the research question. Literature REVIEW This section is intended to place the scope of the project with literature surrounding the components of the research question. The Credit Card Transaction Process Discussed This payment mechanism was formally introduced in 1958, when the BankAmericard card, now known as Visa was franchised across the global community. By introducing an electronic authorization system, the BankAmericard was able to be used globally. Now by partnering with banks across the globe, Visa has been able to provide an international processing system for the exchange of money. The workings of a credit card transaction are such that it comprises of four main steps. These are: Authorization Batching Clearing Funding The cardholder requests a purchase from the merchant, which is then submitted to the acquirer by the merchant. The acquirer then sends a request to the issuer to authorize the transaction. Once the authorization code is sent to the acquirer verifying that credit is available, the transaction is authorized and the cardholder receives the product. (This is further explained in detail on page 9 of this document) This simple process of electronic transacting has opened up a world of e-commerce opportunities. From an information system perspective the processing workflow of an online credit card transaction is shown below: Figure 1: Online Credit Card Processing Workflow Diagram (Hubbard, 2003) Because of the vulnerabilities that lay in a transaction, more so the networks across which the information is exchanged, various security breaches can occur. Types of Credit Card Fraud There are many different types of credit card fraud. Fraudsters are very innovative in finding new ways of committing credit card crime and as technology changes so does their crime tactics. Security issues surrounding the card fraud has moved from the traditional ways of committing credit card crime (Application Fraud, Intercept Fraud and Lost/Stolen Card Fraud) to the modern techniques namely, Skimming, Site Cloning and most recently Triangulation. Skimming is the fastest growing type of credit card fraud around because of its simplicity. Pocket Skimming devices can be easily carried around and the cardholders data can be obtained by merely swiping the card through the battery-operated magnetic card reader. This technology has also evolved so as to read the data of Chip and PIN cards, with the use of a scanner. These scanners, which can write or even re-write the data on the Chip cards, are fully portable and have high storage capacities. Because some of these devices are not illegal, they are easily accessible to hackers and can be bought over the internet. Site Cloning involves cloning an entire site or just the pages where customers make purchases. Since the web pages are identical customers are not aware that their personal information is being compromised. Also, confirmation details are sent to the customer just as the official companys website would, so the crime goes undetected. The details entered on the cloned site are then used by the fraudster to commit credit card fraud. Another method of credit card fraud is Triangulation. Goods are presented on websites at discounted prices, which can be shipped to the customer before payment. Again, just as with site cloning, the site appears to be legitimate then the customer proceeds to enter their personal data. With this captured information the fraudster can then order goods from legitimate retail websites using the credit card number obtained. Due to these security issues surrounding credit card information security, there has been global industry-wide concern for the protection of cardholders data. Since security management is a systematic issue, a serious look at what can be done to prevent security breaches is necessary-whether it may be legislation, the use of fraud detection system monitors or the application of data encryption/ authentication techniques. Chip and PIN Technology Credit cards have been a feasible solution for making payment processing simple and efficient. The history of the credit card dates back to the 1900s when oil companies and proprietors created their own credit card as a means of obtaining customer loyalty and improving customer service. However, as with advances in technology, the credit cards have evolved from having just encoded magnetic stripes to modern day Chip and PIN cards, with embedded microchips, which can store and transmit data. These Chip and PIN cards were developed to provide an inter-operative system that would combat card fraud (counterfeit and plastic cards). This transaction processing infrastructure has enabled the cash-less revolution, whereby consumers, governments and businesses benefit from the electronic payment network, which has shifted payments by cash and cheques to an efficient electronic payment system. The mechanics of a credit card transaction is such that the merchant acquirer, usually the bank processes transactions on behalf of the merchant. This payment by credit card represents an offer for issuance of payment in exchange for the goods or services provided by the merchant, (Transaction Processing). There are two parts to this type of transaction processing: the first is front end processing which involves the capture of data messages across communication channels to the point of sale devices; and secondly the back end processing which involves the balancing of accounting information by acquirers and issuers and the submission of the payment to the acquiring merchants bank. As a result of the rapid advances in technology, data security continues to be a major concern as every transaction that involves the transmission data across networks is open to external attacks. Attacks on a consumers card information can come from any angle, whether it may be data thieves or network intruders. The Payment Card Industry Security Standards Council (PCI SSC), which comprises of major payment brands namely VISA, MasterCard, Discover and a few others, have created global compliance standards to protect cardholders data. These set of standards help govern and educate all merchants and organisations that process, store and transmit data, as well as the manufactures of the devices used in transaction processing. The PCI SSC (2010), Data Security Standard Quick Reference Guide, as summarized below, outlines the best practices for protecting cardholder data: Develop and Maintain a Secure Network Install and maintain firewall configuration to protect cardholders data. Do not use vendor-supplied defaults for system passwords or other security parameters. Protect cardholders data Protect stored data Encrypt transmission of cardholders data across open public networks Maintain a vulnerability management program Use and regularly update anti-virus software or programs Develop and maintain secure systems and applications Implement strong access control measures Restrict access to cardholder data by business need to know Assign a unique ID to persons with computer access Restrict physical access to cardholder data Regularly monitor and test networks Track and monitor all access to network resources and cardholder data Regularly test security systems and resources Maintain an information security policy Maintain a policy that address information security for all personnel Nevertheless, despite these procedures in place, there has been amplified instances of the various types of credit card fraud, namely Intercept Fraud, Skimming, Site Cloning as well as Triangulation. This propelled an industry and governmentà ¢Ã¢â€š ¬Ã¢â‚¬Å"led initiative in the UK to embark on the introduction of Chip and PIN card technology. Based on the EMV standard (Euro pay, MasterCard, Visa) Chip and PIN technology was launched in the UK on February 14th 2006. This programme was introduced to combat credit and debit card fraud, and to provide an ideal way of validating the cardholders identity. By utilizing smart card technology a microchip is embedded with the customers information which includes their unique four digit PIN. For transactions to be accepted, the customer PIN entered must match the one encoded on the microchip. These steps are further explained below: The card is inserted by the customer into the card reader. The card reader would then prompt the user to insert their PIN. A four-digit PIN is then entered by the customer. Once the reader accepts the PIN entered the transaction would be approved. Note the PIN entered is not displayed on the reader but rather represented by asterisks. The customer is issued a receipt as confirmation of the transaction process. This process removes the responsibility and accountability from the merchant to the customer for point of sale transactions. The card never leaves the customers hand and as such prevents skimming of ones card information. One of the benefits of the Chip and PIN cards is that the Chip itself is encrypted with a range of security features, which the transaction processing system uses to identify the cardholder. These security features are said to be virtually impossible to replicate. The terminals used for Chip and PIN transactions, use secure transmission technology to ensure the privacy of the cardholders data and can operate over a range of connectivity environments, such as wired, wireless and cellular networks. The PCI Security Standards Council also developed a framework of standards which is legally enforced through a merchant/service provider/card brand agreement. These include requirements that support the encryption of the cardholders account data and the point of sale terminal integration. Figure 2: Outline of the process of a Chip and PIN transaction The PIN entered replaces the request for signature as verification of the transaction. This is why the banking industry in the UK has campaigned for this technology, because signatures can be forged, however the PIN is unique to that person. Although the United States is yet to convert to this technology, countries such as Japan, China, Canada, Mexico as well as the majority of the European Countries have all introduced Chip and PIN technology and it is gaining momentum in various other countries including Trinidad and Tobago. Republic Bank Trinidad and Tobago Limited is the first local bank in Trinidad and Tobago to introduce Chip and PIN technology to make the concept of paying by credit card safer for cardholders. The bank adopted this type of technology because this is now an industry-wide conversion from the magnetic-stripe cards and it is also in keeping with the EMV standard. Conversely, a potential security issue with Chip and PIN card terminals is its capability of processing cards with the magnetic stripe as well. Because of this the request to enter the customers PIN can be bypassed by the merchant, with a receipt generated to be signed by the customer. Now because this option is still available it poses an added security threat to card transactions. So, unfortunately skimming still remains a huge problem for cardholders and sadly enough this includes Chip and PIN cardholders as well. Although this practice is slowly migrating from EMV compliant countries, once a card has been skimmed it can still be used in countries where the magnetic stripe is still prevalent, for example some Asian Countries and the United States. This is why many fraudsters can still create a fake card with stolen magnetic stripe information which can be used in for example the United States. The United States believes that although Chip and PIN has reduced fraud for face to face card transactions, there are a still a number of issues surrounding the security of the system used for this these transactions. Now as with any new system introduced, there have been a number of studies on whether Chip and PIN cards are really secure. So the question is has Chip and PIN technology impacted on the activities of overall card fraud or has the activities of fraudsters shifted from retail crime. In a study by Emily Finch (2010) The Impact of Chip and Pin Technology and The Activities of Fraudsters, it was recognised that since the implementation of Chip and PIN technology participants involved in card fraud made varying decisions when it came to their crime of choice. The Decision to Desist The Decision to Continue To work with others Shift to Distance Transactions Diversification of Theft into Identity The study also shows that there is a shift in the attack strategy of fraudsters from point of sale card fraud to Internet and Card Identity Fraud. In an analysis of Internet and Card Identity Fraud, we can note that Chip and PIN technology was not designed for preventing these types of card fraud. So, the question remains, was Chip and PIN successful at what it was set out to achievereduce card fraud? This too can be argued further as there are other limitations. How can one link a particular card to a specific owner? Once the PIN is known by the individual a transaction can be completed with ease. Other studies have shown that the card readers used for Chip and PIN transactions can be modified. In a study by a team of University of Cambridge Computer Scientists, they have uncovered a series of fatal flaws in the Chip and PIN system. One example is where the internal hardware can be replaced without external evidence of this. This new terminal could then be programmed and modified so that it performs just as a typical terminal, where the card details can be collected and allow criminals to make cards with a fake magnetic stripe, which along with the PIN would enable a fraudster to make valid purchases. Another example is that fraudsters can insert an electronic wedge between the stolen card and the terminal, which tricks the terminal into believing that the PIN was correctly verified. Further, with this wedge inserted, any PIN can be entered and the transaction would be verified. This type of fraud makes it difficult for the victims of the attack to be refunded by the bank as the receipt given is authentic and would state verified by PIN. The bank in turn would be accurate in stating that no refund is required as their records show verified by PIN. This type of complaint appears as an act of negligence by the cardholder as he/she allowed their PIN to be compromised. So based on this study the point of sale attacks are much more prevalent, since before the introduction of Chip and PIN cards, consumers only entered their PIN at ATMs. Now with the introduction of Chip and PIN, consumers are using their cards at various other public areas. To combat the compromising of the consumers PIN a shield over the keypad has been used as added security but in many public areas there are video cameras and a persons PIN can still be captured on footage. So, although the UK banking industry has claimed to have rolled out this new technology successfully in 2006, there seems to be some negative aspects of this technology. The architecture surrounding Chip and PIN technology is questionable and the onus is on the banking industry to ensure that cardholders information is protected. Additionally, it also seems that Chip and PIN terminals offer no difference to what the magnetic stripe terminals offered. These terminals can be tampered with, which is a clear indication that there needs to be accurate configuration of these terminals so as to secure the cardholders data when transmitting transactions and that is not vulnerable to incident of attack. So the intent of Chip and PIN technology has more so opened a new marketplace for fraudsters than prevent/reduce fraudulent activity. PROJECT DESIGN, OBJECTIVES AND RESEARCH METHODS The scope of this project is to outline the features of Chip and PIN technology and whether its implementation thus far has been beneficial. This section of the project would provide the methods involved in achieving the data for the project as well as the results based on the data collected. The chosen approach to this design is online research (journals/scholarly articles) along with a case study on the implementation of Chip and PIN technology in Trinidad and Tobago, with the case being Republic Bank Limited. Objective 1 A good foundation for this objective would be the interpretation of the credit cards history. How has this cash-less mechanism moved from a local innovation to a global payment mechanism by use of digital communication across networks? In gaining a clear understanding on the reason for the implementation of this technology, a wealth of research would be conducted on credit card technology and digital security. Objective 2 A holistic understanding on the basis of credit card fraud and the types of fraudulent activities and the steps taken to prevent credit card crime. What technologies have been implemented and the effects/benefits drawn from these approaches. Objective 3 Expanding from objective two also discussed would be whether or not since the introduction of Chip and PIN technology in the UK, has there been a cascading effect of this new technology across countries. Analysing the increasing number of fraudulent activities reported from statistics, which compelled the global banking industry to find a seamless solution for the protection of cardholders data. Objective 4 An assessment on the introduction of Chip and PIN technology by Republic Bank Limited, which would include sourcing information on its implementation and the benefits derived. Further research would be on the acceptance (or non-acceptance) of the technology by customers. Objective 5 Lastly, from the feedback received from the interview conducted and by analysing the incidents of attack on Republic Bank credit cardholders, what was the determining factor in the bank aligning themselves with the UK standards set by EMV? CONCEPTUAL FRAMEWORK In identifying the framework to be adopted that can be referenced to the literature in this research, the author considered the Delone and Mc Lean IS Success Model. Using this model, the author would explain the net benefits of adopting Chip and PIN technology, relating it to Republic Banks implementation of this technology. DeLeone and McLean IS Success Model In evaluating the success of Information Systems, the DM IS Success Model, systems quality measures the technical success, information quality measures semantic success and organisational impacts and user satisfaction measures the effectiveness of the system. The processes in the model are inter-connected by links, across the dimensions of the system. Figure 3: Depiction of the Updated Information Systems Success Model (DeLeone McLean 2002, 2003) The updated DM Model interprets the evaluation of a system in terms of the information, system, and service qualities and how these characteristics attribute to user satisfaction. As a result of using the system, certain benefits will be achieved and the net benefits will in turn (positively or negatively) influence user satisfaction and the further use of the information system. So, therefore three basic components make up this model, the creation of a system, its use and the consequences of its use. Case study as it relates to the ISS model. Republic Bank has been providing banking and financial solutions to individuals and businesses for over 160 years. Their mission is not only to provide efficient and competitively priced services but also to implement sound policies which will be beneficial to their customers. These factors presented provide clarity and influences the net benefits of the implemented Chip and PIN system at Republic Bank thus far. By use of the ISS model to map the research done in this project, the author would complete a step by step relay of the framework discussing the implementation of Chip and PIN by Republic Bank. Information Quality-Information quality refers to the accuracy/protection of the content of the data in transacting. How secure is the personalized data being transmitted across networks. When a customer presents their card to make a purchase, are they confident that their card information is protected because of the added security enabled on this card. System Quality-The system quality refers to the reliability of the network and the response time in transacting, notwithstanding the approved devices that accept personal identification numbers for all PIN based entries (the ease of use of the system functionalities). Therefore in rolling out this new technology the bank along with their partner merchants would train staff so that they are familiar with the best practice guidelines when using Chip and PIN. Service Quality-This refers to the back-end support systems that assist in usage of the technology. How reliable are Republic Banks servers and IP networks? User Satisfaction- This encompasses measuring the users entire experience-the purchase payment, receipt and service (the ease of purchasing without the fear of being a victim of fraudulent activity). Net Benefits -This is the most important success measure and it encapsulates the cost savings and the decrease in the value of fraudulent transactions arising from stolen credit card data. Was the implementation of this technology beneficial in reducing the incidents of card fraud? Are Republic Bank cardholders satisfied that their bank is on par with global industry changes? The focus of this success model lies in determining the impact the features of technology (information, system, and service quality) have on the variables user satisfaction, use, and net benefits. The main objective for using this ISS model is to establish the ultimate benefits derived from the use of information system both in individual and organizational terms. FINDINGS This chapter will illustrate the findings from the questionnaires submitted to a sample of the Republic Banks credit card customers as well as a formal interview conducted with an employee of Republic Bank Credit Card Centre. The aim of the chapter is to source an awareness of the topic area Chip and PIN by cardholders and the personnel interviewed. Primary Data Collection For the basis of the findings of this research the author conducted a formal interview with a middle management employee at Republic Bank and also distributed questionnaires to a sample of the banks credit card customers. A summarized version of the responses from the interview is represented in this chapter, based on the interviewees knowledge. The questionnaires distributed were mostly closed questions so as to deliberately avoid open-ended respondent answers. Approximately 120 questionnaires were distributed to Republic Bank Customers. Only the answers to the key questions are represented in this chapter. Summarized responses from the interview This interview was conducted with the Supervisor, Card Services, which prove to be very insightful. The Supervisor spoke about the banks vision for their credit card market, and how they plan to continuously innovate so as to maintain their customer base and attract new profitable customers. Since the credit card industry is a highly competitive one, the bank is constantly reviewing their interest rates and looking for new ways to give customer returns from the use of their credit card. Due to his long tenure at the bank and having the customer service background, the supervisor was able to give insight on what infuriates a credit card customer. He explained that customers become frustrated when they see added charges and puffed up late fees placed by the bank on their card statements. In view of the fact that most customers do not read the fine print when completing a credit card application, they are not totally aware of all the charges that can arise from delinquent payments. He f urther added that although queries like this can be explained by representatives at the bank who can provide valued solutions to the cardholders problem, the most infuriating of all queries from customers are unexplainable purchases on their account. At Republic Bank, fraudulent activity on a card can be detected from the use of their state-of-the-art security systems and their experienced fraud expert team that are in place to monitor and detect any unusual activity on a customers credit cards, but even with these measures in place, fraud can occur. The supervisor expressed that by implementing Chip and PIN technology for credit cards, the bank was able to be a step ahead of the competition and most importantly the card criminals. He also stated that although credit card fraud is not as prevalent in Trinidad and Tobago as in the developed countries, continuous education in counteracting fraudulent activities for their customer base is an effective method of addressing credit card fraud. He explained that Republic Bank has not had many eye-opening occurrences of notified credit card fraud but they believe that Chip and PIN technology is an innovative solution to the likelihood of this problem. He was also truthful in expressing that this technology is still new to the industry and all merchants have yet to convert to Chip and PIN enabled machines, therefore there is a window of opportunity for fraud until merchants are mandated to have these Chip and PIN enabled machines. He used the term mandate, because eventually all Republic Bank debit cards would also be chip enabled. In summing up the interview the author probed the supervisor on the banks position on the studies done by the University of Cambridge team on Chip and PIN technology and the tested flaws of the system. His response was quite interesting, because it ventured into a thought-provoking discussion on research. He lamented that the sphere of research done on any topic would result in the researcher seeking out the positive and negative aspects of it. How the data is interpreted, reflects the real value of the research done. Questionnaire Findings Question 5: How often and where do you frequently use your credit card to make purchases? Aim: To assess how often the average Republic Bank cardholder uses their credit card. Findings: Most Republic Cardholders in this study used their credit card regularly, at least five times per month. Credit Cards are used for purchases at the supermarket, restaurant and retail clothing stores. Question 6: Has your credit card information ever been compromised? If yes provide details. Aim: To determine the number of incidents of attack on Republic Bank credit card holders. Findings: Less than 50% of the respondents have never had their credit card data compromised. Question 7: Do you understand the workings of Chip and PIN technology introduced to Republic Bank credit cardholders and the value to be derived from using this technology? Aim: To determine the extent of the customers perception of this technologys value and how the card is used. Findings: Although some customers are guarded about the use of their credit cards, most of the respondents are confident in the service that Republic Bank provides and believes that implementing Chip and PIN gives them that added security against fraudulent activities, especially those customers that frequently travel abroad. Question 8: How do you think by using Chip and PIN cards for making payments will make it easier in transacting? Aim: To establish the efficiencies in the use of Chip and PIN cards, on the time taken to complete a transaction. Findings: Many customers applaud this technology as it reduces the time taken at the cash register when making purchases. It is simple, easy and convenient and most customers are truly happy as there is no need to write their signature. For this reason they find the system most efficient as it prevents their signature from the likelihood of being forged. ANALYSIS The main objective for the research completed on this topic, was to show how and to what extent the adoption of Chip and PIN technology has improved credit card security for Republic Bank cardholders. At a glance, before Chip and PIN technology was introduced in the UK, there was nation-wide educational literature on the benefits of the technology for banks, merchants and most importantly, the customers. However, it seems that this programme led by EMV, created more enthusiasm in the build-up to its implementation rather than the actual usage of the system. From the research, the mounting negative features of the technology and use of the system is outweighed the decreasing positive ones. It seems that the card theft criminals were focused on a solution to obstruct the successful use of the technology before the intention to use. The question remains, which facet of credit card fraud has Chip and PIN really reduced? The research show that for point of sale transactions Chip and PIN has been useful in the prevention of skimming ones card information, however the fraudsters have found alternative ways to improve on that tactic. Chip and PIN technology can only be used à ¢Ã¢â€š ¬Ã…“successfullyà ¢Ã¢â€š ¬? for point of sale transactions and not online transactions, so fraudsters have modified their techniques as with the modifications of the technology. Based on the research framework adopted, Republic Bank has measured their net benefits of adopting the Chip and PIN technology by encircling the information, service and system qualities to deliver user satisfaction and usage of the system with this technology. The success of any information system is multi-dimensional and the relationships among the constructs relate to the comprehensive evaluation of the system. The variable dependent on these constructs are the net benefits of this system, and for whom? This local company has app

Thursday, September 19, 2019

Juvenalian And Horatian Satire :: Satire Comedy LIterary Essays

Juvenalian and Horatian Satire "Satire is a sort of glass, wherein beholders do generally discover everybody's face but their own; which is the chief reason for that kind of reception it meets in the world, and that so very few are offended with it." Jonathan Swift (1667-1745), Anglo-Irish satirist. The Battle of the Books, Preface (written 1697; published 1704). Satire is known as the literary style which makes light of a subject, diminishing its importance by placing it in an amusing or scornful light. Unlike comedy, satire attempts to create humor by deriding its topic, as opposed to a topic that evokes laughter in itself. Satires attempt to give us a more humorous look at attitudes, advances, states of affairs, and in some cases ( as in Jonathan Swift's A Modest Proposal ) the entire human race. The least offensive form of satire is Horatian satire, the style used by Addison and Steele in their essays. A much more abrasive style is Juvenalian satire, as used by Jonathan Swift in the aforementioned essay A Modest Proposal. To better understand satire as a whole, and Horatian and Juvenalian satire in particular, these essays can provide for further comprehension than a simple definition of the style alone. Horatian satire is noted for its more pleasant and amusing nature. Unlike Juvenalian satire, it serves to make us laugh at human folly as opposed to holding our failures up for needling. In Steele's essay The Spectator's Club, a pub gathering is used to point out the quirks of the fictitious Sir Robert de Coverly and his friends. Roger de Coverly is an absolute character. His failure in an amorous pursuit have left him in the past, which is shown through his manner of dress, along with his somewhat dubious honor of justice of the quorum. This position entails such trying duties as explaining Acts to the commoners. Also present is a lawyer who is more versed in "Aristotle and Cognius" than in "Littleton and Coke"(Norton, 2193), indicative of lawyers more interested in sounding learned than being capable of practicing actual law. Near him, a wealthy merchant whose concerns lie mainly in the wealth of England and himself, and who views the ocean as his marketplace. Captain Sentry is an old military man well practiced in the art of false modesty, a trait he detests in others. Also there is a clergyman who is so frail that he would sooner wait until the Lord sees fit to smite him than get on with the business of leading his life.(Norton, 2192-2195). All of these characters present traits present in all

Educational Goals and Philosophy :: Teaching Education Essays

Educational Goals and Philosophy As an Elementary Education major I have learned that an educator’s job is not just to teach the student/s about basic curriculum such as reading, writing, geography, history and mathematics. However, is to also instill basic views of society into the student to create an over-all, well- rounded adult and because of this course I have developed some definite views and opinions about education and the many expectations of a teacher. During this course I have been exposed to many different views, opinions and theories concerning education and the role of the teacher, and I especially relate to the philosophical views of Rousseau. In fact, I agree with just about every aspect of Rousseau’s theory. I believe that the child is born innocent and if it is exposed to a certain environment will remain innocent. But, not all children are able to remain innocent, they may have issues at home or even personal issues that can or will corrupt him/her. This corruption may influence the child’s learning process once he/she enters into school. I also feel that students truly do have the desire to learn and know the truth and that over-all humans are good- natured. The environment that the child is exposed to however has a very high influence upon the child and how the child handles the pressures and demands of education and learning. Knowledge, in my belief, is relative. Therefore I think, this places a lot of responsibility upon the teacher. The teacher should be in control of the classroom at all times and if the teacher allows actions to go on that may be distracting to some students then those students, due to the distractions, may not do as well in this chaotic classroom environment. However, if the same students were placed in a classroom environment that was not quite as distracting and much more orderly then the same students would probably succeed at the same material that they had struggled with in the chaotic environment. Once again the learning environment is very crucial to the success of the student and depending upon each student and how the classroom in conducted this may be the deciding factor in a student’s success. Once I become a teacher I hope to conduct my classroom in manner in which my students feel comfortable and excited to learn. I hope that the material that they learn from me will be carried with them for the years ahead and this knowledge will become the solid building blocks that is used daily by a successful adult.

Wednesday, September 18, 2019

Macbeth Essay :: essays research papers

Ever since the beginning of time humans have set out goals for themselves; goals for power, wisdom and riches. Many times throughout history, these common goals have bee corrupted by people. Other times it has been for the greater good. People like Adolf Hitler became corrupt because of the goals he set out. On the other hand the goal of someone like Mother Theresa has helped all of mankind. In the case of Shakespeare’s play â€Å"Macbeth† the goal and desire for power corrupts the two main characters. However, to Macbeth’s credit, it takes a lot more deceiving to convert Macbeth to evil than it does Lady Macbeth. Macbeth seems to still have a conscience and has to debate evil deeds and ignore his natural good in order to do something bad. Lady Macbeth on the other hand ignores nothing and ask evil spirits to come into her to achieve her goals. Macbeth and Lady Macbeth are two very different minds, striving for the same goals, they both throw of their consciences to fulfill their evil motives.   Ã‚  Ã‚  Ã‚  Ã‚  In Act one, Scene 3 the story line is laid down. The witches speak the prophesies to Macbeth in this Scene. After two of the prophecies come true Macbeth thinks the third prophecy must also come true and that the king will be murdered. He is mortified at the thought of the deed and is truly frightened and disgusted by the mental image. Later he conveys this information to Lady Macbeth in Scene 5 and she responds with jubilee. Macbeth says â€Å"If good why do I yield to the suggestion† which shows that he knows he could not do such a horrible act. But Lady Macbeth sees his approach to the third prophecy and launches a counter in scene five line twenty four where she says â€Å"Hurry Home, so I may pour my sprits in your ear.† This portrays the truly corrupt sprit that has been fueled by her goal to be Queen. While Macbeth is trying as hard as his mind will let him to dismiss the evil images from his mind he realizes that the irony of the prophecies i s to much to ignore. Back home Lady Macbeth is polar opposite to Macbeth’s feelings. Instead of being mortified at the idea she meditates on how it might be done and relishes in the idea. Both show a very different reaction to this horrible act.