Monday, January 27, 2020

Card Security For Republic Bank Customers

Card Security For Republic Bank Customers There is no doubt that most organisations today are becoming essentially dependant on the use of credit cards, arguably its most strategic asset, is to support existing business operations. However, credit card fraud and identity theft has continued to plague the banking and retail industries as there seems to be no feasible solution to these crimes. Advances in technology have opened a gateway for hackers to restructure their position of attack, intruding on ones personal life. The basis of this project is on the new Chip and PIN technology introduced on credit cards. Ive considered this to be an interesting topic because of the publicity this technology has been receiving across the world and it has even reached to our shores, here in Trinidad and Tobago. Hence, Republic Bank Limited one of the local banks would be the case studied in this research. Chapter two would encompass the existing literature on credit card history and Chip and PIN. This chapter would outline how credit cards have become smart cards and how the Chip and PIN cards are used. Chapter three gives the entire design of the project and the objectives to be obtained for the research. Moving to chapter four, the research framework adopted for this study on Chip and PIN and how it relates to the model undertaken in the research. The findings from this research would be summarized version of the data collected, with the analysis of the theory and research framework the author undertook in this study. In concluding, the author would report on the learning aspects of the research and provide an assessment of achievements, giving a position on the research question. Literature REVIEW This section is intended to place the scope of the project with literature surrounding the components of the research question. The Credit Card Transaction Process Discussed This payment mechanism was formally introduced in 1958, when the BankAmericard card, now known as Visa was franchised across the global community. By introducing an electronic authorization system, the BankAmericard was able to be used globally. Now by partnering with banks across the globe, Visa has been able to provide an international processing system for the exchange of money. The workings of a credit card transaction are such that it comprises of four main steps. These are: Authorization Batching Clearing Funding The cardholder requests a purchase from the merchant, which is then submitted to the acquirer by the merchant. The acquirer then sends a request to the issuer to authorize the transaction. Once the authorization code is sent to the acquirer verifying that credit is available, the transaction is authorized and the cardholder receives the product. (This is further explained in detail on page 9 of this document) This simple process of electronic transacting has opened up a world of e-commerce opportunities. From an information system perspective the processing workflow of an online credit card transaction is shown below: Figure 1: Online Credit Card Processing Workflow Diagram (Hubbard, 2003) Because of the vulnerabilities that lay in a transaction, more so the networks across which the information is exchanged, various security breaches can occur. Types of Credit Card Fraud There are many different types of credit card fraud. Fraudsters are very innovative in finding new ways of committing credit card crime and as technology changes so does their crime tactics. Security issues surrounding the card fraud has moved from the traditional ways of committing credit card crime (Application Fraud, Intercept Fraud and Lost/Stolen Card Fraud) to the modern techniques namely, Skimming, Site Cloning and most recently Triangulation. Skimming is the fastest growing type of credit card fraud around because of its simplicity. Pocket Skimming devices can be easily carried around and the cardholders data can be obtained by merely swiping the card through the battery-operated magnetic card reader. This technology has also evolved so as to read the data of Chip and PIN cards, with the use of a scanner. These scanners, which can write or even re-write the data on the Chip cards, are fully portable and have high storage capacities. Because some of these devices are not illegal, they are easily accessible to hackers and can be bought over the internet. Site Cloning involves cloning an entire site or just the pages where customers make purchases. Since the web pages are identical customers are not aware that their personal information is being compromised. Also, confirmation details are sent to the customer just as the official companys website would, so the crime goes undetected. The details entered on the cloned site are then used by the fraudster to commit credit card fraud. Another method of credit card fraud is Triangulation. Goods are presented on websites at discounted prices, which can be shipped to the customer before payment. Again, just as with site cloning, the site appears to be legitimate then the customer proceeds to enter their personal data. With this captured information the fraudster can then order goods from legitimate retail websites using the credit card number obtained. Due to these security issues surrounding credit card information security, there has been global industry-wide concern for the protection of cardholders data. Since security management is a systematic issue, a serious look at what can be done to prevent security breaches is necessary-whether it may be legislation, the use of fraud detection system monitors or the application of data encryption/ authentication techniques. Chip and PIN Technology Credit cards have been a feasible solution for making payment processing simple and efficient. The history of the credit card dates back to the 1900s when oil companies and proprietors created their own credit card as a means of obtaining customer loyalty and improving customer service. However, as with advances in technology, the credit cards have evolved from having just encoded magnetic stripes to modern day Chip and PIN cards, with embedded microchips, which can store and transmit data. These Chip and PIN cards were developed to provide an inter-operative system that would combat card fraud (counterfeit and plastic cards). This transaction processing infrastructure has enabled the cash-less revolution, whereby consumers, governments and businesses benefit from the electronic payment network, which has shifted payments by cash and cheques to an efficient electronic payment system. The mechanics of a credit card transaction is such that the merchant acquirer, usually the bank processes transactions on behalf of the merchant. This payment by credit card represents an offer for issuance of payment in exchange for the goods or services provided by the merchant, (Transaction Processing). There are two parts to this type of transaction processing: the first is front end processing which involves the capture of data messages across communication channels to the point of sale devices; and secondly the back end processing which involves the balancing of accounting information by acquirers and issuers and the submission of the payment to the acquiring merchants bank. As a result of the rapid advances in technology, data security continues to be a major concern as every transaction that involves the transmission data across networks is open to external attacks. Attacks on a consumers card information can come from any angle, whether it may be data thieves or network intruders. The Payment Card Industry Security Standards Council (PCI SSC), which comprises of major payment brands namely VISA, MasterCard, Discover and a few others, have created global compliance standards to protect cardholders data. These set of standards help govern and educate all merchants and organisations that process, store and transmit data, as well as the manufactures of the devices used in transaction processing. The PCI SSC (2010), Data Security Standard Quick Reference Guide, as summarized below, outlines the best practices for protecting cardholder data: Develop and Maintain a Secure Network Install and maintain firewall configuration to protect cardholders data. Do not use vendor-supplied defaults for system passwords or other security parameters. Protect cardholders data Protect stored data Encrypt transmission of cardholders data across open public networks Maintain a vulnerability management program Use and regularly update anti-virus software or programs Develop and maintain secure systems and applications Implement strong access control measures Restrict access to cardholder data by business need to know Assign a unique ID to persons with computer access Restrict physical access to cardholder data Regularly monitor and test networks Track and monitor all access to network resources and cardholder data Regularly test security systems and resources Maintain an information security policy Maintain a policy that address information security for all personnel Nevertheless, despite these procedures in place, there has been amplified instances of the various types of credit card fraud, namely Intercept Fraud, Skimming, Site Cloning as well as Triangulation. This propelled an industry and governmentà ¢Ã¢â€š ¬Ã¢â‚¬Å"led initiative in the UK to embark on the introduction of Chip and PIN card technology. Based on the EMV standard (Euro pay, MasterCard, Visa) Chip and PIN technology was launched in the UK on February 14th 2006. This programme was introduced to combat credit and debit card fraud, and to provide an ideal way of validating the cardholders identity. By utilizing smart card technology a microchip is embedded with the customers information which includes their unique four digit PIN. For transactions to be accepted, the customer PIN entered must match the one encoded on the microchip. These steps are further explained below: The card is inserted by the customer into the card reader. The card reader would then prompt the user to insert their PIN. A four-digit PIN is then entered by the customer. Once the reader accepts the PIN entered the transaction would be approved. Note the PIN entered is not displayed on the reader but rather represented by asterisks. The customer is issued a receipt as confirmation of the transaction process. This process removes the responsibility and accountability from the merchant to the customer for point of sale transactions. The card never leaves the customers hand and as such prevents skimming of ones card information. One of the benefits of the Chip and PIN cards is that the Chip itself is encrypted with a range of security features, which the transaction processing system uses to identify the cardholder. These security features are said to be virtually impossible to replicate. The terminals used for Chip and PIN transactions, use secure transmission technology to ensure the privacy of the cardholders data and can operate over a range of connectivity environments, such as wired, wireless and cellular networks. The PCI Security Standards Council also developed a framework of standards which is legally enforced through a merchant/service provider/card brand agreement. These include requirements that support the encryption of the cardholders account data and the point of sale terminal integration. Figure 2: Outline of the process of a Chip and PIN transaction The PIN entered replaces the request for signature as verification of the transaction. This is why the banking industry in the UK has campaigned for this technology, because signatures can be forged, however the PIN is unique to that person. Although the United States is yet to convert to this technology, countries such as Japan, China, Canada, Mexico as well as the majority of the European Countries have all introduced Chip and PIN technology and it is gaining momentum in various other countries including Trinidad and Tobago. Republic Bank Trinidad and Tobago Limited is the first local bank in Trinidad and Tobago to introduce Chip and PIN technology to make the concept of paying by credit card safer for cardholders. The bank adopted this type of technology because this is now an industry-wide conversion from the magnetic-stripe cards and it is also in keeping with the EMV standard. Conversely, a potential security issue with Chip and PIN card terminals is its capability of processing cards with the magnetic stripe as well. Because of this the request to enter the customers PIN can be bypassed by the merchant, with a receipt generated to be signed by the customer. Now because this option is still available it poses an added security threat to card transactions. So, unfortunately skimming still remains a huge problem for cardholders and sadly enough this includes Chip and PIN cardholders as well. Although this practice is slowly migrating from EMV compliant countries, once a card has been skimmed it can still be used in countries where the magnetic stripe is still prevalent, for example some Asian Countries and the United States. This is why many fraudsters can still create a fake card with stolen magnetic stripe information which can be used in for example the United States. The United States believes that although Chip and PIN has reduced fraud for face to face card transactions, there are a still a number of issues surrounding the security of the system used for this these transactions. Now as with any new system introduced, there have been a number of studies on whether Chip and PIN cards are really secure. So the question is has Chip and PIN technology impacted on the activities of overall card fraud or has the activities of fraudsters shifted from retail crime. In a study by Emily Finch (2010) The Impact of Chip and Pin Technology and The Activities of Fraudsters, it was recognised that since the implementation of Chip and PIN technology participants involved in card fraud made varying decisions when it came to their crime of choice. The Decision to Desist The Decision to Continue To work with others Shift to Distance Transactions Diversification of Theft into Identity The study also shows that there is a shift in the attack strategy of fraudsters from point of sale card fraud to Internet and Card Identity Fraud. In an analysis of Internet and Card Identity Fraud, we can note that Chip and PIN technology was not designed for preventing these types of card fraud. So, the question remains, was Chip and PIN successful at what it was set out to achievereduce card fraud? This too can be argued further as there are other limitations. How can one link a particular card to a specific owner? Once the PIN is known by the individual a transaction can be completed with ease. Other studies have shown that the card readers used for Chip and PIN transactions can be modified. In a study by a team of University of Cambridge Computer Scientists, they have uncovered a series of fatal flaws in the Chip and PIN system. One example is where the internal hardware can be replaced without external evidence of this. This new terminal could then be programmed and modified so that it performs just as a typical terminal, where the card details can be collected and allow criminals to make cards with a fake magnetic stripe, which along with the PIN would enable a fraudster to make valid purchases. Another example is that fraudsters can insert an electronic wedge between the stolen card and the terminal, which tricks the terminal into believing that the PIN was correctly verified. Further, with this wedge inserted, any PIN can be entered and the transaction would be verified. This type of fraud makes it difficult for the victims of the attack to be refunded by the bank as the receipt given is authentic and would state verified by PIN. The bank in turn would be accurate in stating that no refund is required as their records show verified by PIN. This type of complaint appears as an act of negligence by the cardholder as he/she allowed their PIN to be compromised. So based on this study the point of sale attacks are much more prevalent, since before the introduction of Chip and PIN cards, consumers only entered their PIN at ATMs. Now with the introduction of Chip and PIN, consumers are using their cards at various other public areas. To combat the compromising of the consumers PIN a shield over the keypad has been used as added security but in many public areas there are video cameras and a persons PIN can still be captured on footage. So, although the UK banking industry has claimed to have rolled out this new technology successfully in 2006, there seems to be some negative aspects of this technology. The architecture surrounding Chip and PIN technology is questionable and the onus is on the banking industry to ensure that cardholders information is protected. Additionally, it also seems that Chip and PIN terminals offer no difference to what the magnetic stripe terminals offered. These terminals can be tampered with, which is a clear indication that there needs to be accurate configuration of these terminals so as to secure the cardholders data when transmitting transactions and that is not vulnerable to incident of attack. So the intent of Chip and PIN technology has more so opened a new marketplace for fraudsters than prevent/reduce fraudulent activity. PROJECT DESIGN, OBJECTIVES AND RESEARCH METHODS The scope of this project is to outline the features of Chip and PIN technology and whether its implementation thus far has been beneficial. This section of the project would provide the methods involved in achieving the data for the project as well as the results based on the data collected. The chosen approach to this design is online research (journals/scholarly articles) along with a case study on the implementation of Chip and PIN technology in Trinidad and Tobago, with the case being Republic Bank Limited. Objective 1 A good foundation for this objective would be the interpretation of the credit cards history. How has this cash-less mechanism moved from a local innovation to a global payment mechanism by use of digital communication across networks? In gaining a clear understanding on the reason for the implementation of this technology, a wealth of research would be conducted on credit card technology and digital security. Objective 2 A holistic understanding on the basis of credit card fraud and the types of fraudulent activities and the steps taken to prevent credit card crime. What technologies have been implemented and the effects/benefits drawn from these approaches. Objective 3 Expanding from objective two also discussed would be whether or not since the introduction of Chip and PIN technology in the UK, has there been a cascading effect of this new technology across countries. Analysing the increasing number of fraudulent activities reported from statistics, which compelled the global banking industry to find a seamless solution for the protection of cardholders data. Objective 4 An assessment on the introduction of Chip and PIN technology by Republic Bank Limited, which would include sourcing information on its implementation and the benefits derived. Further research would be on the acceptance (or non-acceptance) of the technology by customers. Objective 5 Lastly, from the feedback received from the interview conducted and by analysing the incidents of attack on Republic Bank credit cardholders, what was the determining factor in the bank aligning themselves with the UK standards set by EMV? CONCEPTUAL FRAMEWORK In identifying the framework to be adopted that can be referenced to the literature in this research, the author considered the Delone and Mc Lean IS Success Model. Using this model, the author would explain the net benefits of adopting Chip and PIN technology, relating it to Republic Banks implementation of this technology. DeLeone and McLean IS Success Model In evaluating the success of Information Systems, the DM IS Success Model, systems quality measures the technical success, information quality measures semantic success and organisational impacts and user satisfaction measures the effectiveness of the system. The processes in the model are inter-connected by links, across the dimensions of the system. Figure 3: Depiction of the Updated Information Systems Success Model (DeLeone McLean 2002, 2003) The updated DM Model interprets the evaluation of a system in terms of the information, system, and service qualities and how these characteristics attribute to user satisfaction. As a result of using the system, certain benefits will be achieved and the net benefits will in turn (positively or negatively) influence user satisfaction and the further use of the information system. So, therefore three basic components make up this model, the creation of a system, its use and the consequences of its use. Case study as it relates to the ISS model. Republic Bank has been providing banking and financial solutions to individuals and businesses for over 160 years. Their mission is not only to provide efficient and competitively priced services but also to implement sound policies which will be beneficial to their customers. These factors presented provide clarity and influences the net benefits of the implemented Chip and PIN system at Republic Bank thus far. By use of the ISS model to map the research done in this project, the author would complete a step by step relay of the framework discussing the implementation of Chip and PIN by Republic Bank. Information Quality-Information quality refers to the accuracy/protection of the content of the data in transacting. How secure is the personalized data being transmitted across networks. When a customer presents their card to make a purchase, are they confident that their card information is protected because of the added security enabled on this card. System Quality-The system quality refers to the reliability of the network and the response time in transacting, notwithstanding the approved devices that accept personal identification numbers for all PIN based entries (the ease of use of the system functionalities). Therefore in rolling out this new technology the bank along with their partner merchants would train staff so that they are familiar with the best practice guidelines when using Chip and PIN. Service Quality-This refers to the back-end support systems that assist in usage of the technology. How reliable are Republic Banks servers and IP networks? User Satisfaction- This encompasses measuring the users entire experience-the purchase payment, receipt and service (the ease of purchasing without the fear of being a victim of fraudulent activity). Net Benefits -This is the most important success measure and it encapsulates the cost savings and the decrease in the value of fraudulent transactions arising from stolen credit card data. Was the implementation of this technology beneficial in reducing the incidents of card fraud? Are Republic Bank cardholders satisfied that their bank is on par with global industry changes? The focus of this success model lies in determining the impact the features of technology (information, system, and service quality) have on the variables user satisfaction, use, and net benefits. The main objective for using this ISS model is to establish the ultimate benefits derived from the use of information system both in individual and organizational terms. FINDINGS This chapter will illustrate the findings from the questionnaires submitted to a sample of the Republic Banks credit card customers as well as a formal interview conducted with an employee of Republic Bank Credit Card Centre. The aim of the chapter is to source an awareness of the topic area Chip and PIN by cardholders and the personnel interviewed. Primary Data Collection For the basis of the findings of this research the author conducted a formal interview with a middle management employee at Republic Bank and also distributed questionnaires to a sample of the banks credit card customers. A summarized version of the responses from the interview is represented in this chapter, based on the interviewees knowledge. The questionnaires distributed were mostly closed questions so as to deliberately avoid open-ended respondent answers. Approximately 120 questionnaires were distributed to Republic Bank Customers. Only the answers to the key questions are represented in this chapter. Summarized responses from the interview This interview was conducted with the Supervisor, Card Services, which prove to be very insightful. The Supervisor spoke about the banks vision for their credit card market, and how they plan to continuously innovate so as to maintain their customer base and attract new profitable customers. Since the credit card industry is a highly competitive one, the bank is constantly reviewing their interest rates and looking for new ways to give customer returns from the use of their credit card. Due to his long tenure at the bank and having the customer service background, the supervisor was able to give insight on what infuriates a credit card customer. He explained that customers become frustrated when they see added charges and puffed up late fees placed by the bank on their card statements. In view of the fact that most customers do not read the fine print when completing a credit card application, they are not totally aware of all the charges that can arise from delinquent payments. He f urther added that although queries like this can be explained by representatives at the bank who can provide valued solutions to the cardholders problem, the most infuriating of all queries from customers are unexplainable purchases on their account. At Republic Bank, fraudulent activity on a card can be detected from the use of their state-of-the-art security systems and their experienced fraud expert team that are in place to monitor and detect any unusual activity on a customers credit cards, but even with these measures in place, fraud can occur. The supervisor expressed that by implementing Chip and PIN technology for credit cards, the bank was able to be a step ahead of the competition and most importantly the card criminals. He also stated that although credit card fraud is not as prevalent in Trinidad and Tobago as in the developed countries, continuous education in counteracting fraudulent activities for their customer base is an effective method of addressing credit card fraud. He explained that Republic Bank has not had many eye-opening occurrences of notified credit card fraud but they believe that Chip and PIN technology is an innovative solution to the likelihood of this problem. He was also truthful in expressing that this technology is still new to the industry and all merchants have yet to convert to Chip and PIN enabled machines, therefore there is a window of opportunity for fraud until merchants are mandated to have these Chip and PIN enabled machines. He used the term mandate, because eventually all Republic Bank debit cards would also be chip enabled. In summing up the interview the author probed the supervisor on the banks position on the studies done by the University of Cambridge team on Chip and PIN technology and the tested flaws of the system. His response was quite interesting, because it ventured into a thought-provoking discussion on research. He lamented that the sphere of research done on any topic would result in the researcher seeking out the positive and negative aspects of it. How the data is interpreted, reflects the real value of the research done. Questionnaire Findings Question 5: How often and where do you frequently use your credit card to make purchases? Aim: To assess how often the average Republic Bank cardholder uses their credit card. Findings: Most Republic Cardholders in this study used their credit card regularly, at least five times per month. Credit Cards are used for purchases at the supermarket, restaurant and retail clothing stores. Question 6: Has your credit card information ever been compromised? If yes provide details. Aim: To determine the number of incidents of attack on Republic Bank credit card holders. Findings: Less than 50% of the respondents have never had their credit card data compromised. Question 7: Do you understand the workings of Chip and PIN technology introduced to Republic Bank credit cardholders and the value to be derived from using this technology? Aim: To determine the extent of the customers perception of this technologys value and how the card is used. Findings: Although some customers are guarded about the use of their credit cards, most of the respondents are confident in the service that Republic Bank provides and believes that implementing Chip and PIN gives them that added security against fraudulent activities, especially those customers that frequently travel abroad. Question 8: How do you think by using Chip and PIN cards for making payments will make it easier in transacting? Aim: To establish the efficiencies in the use of Chip and PIN cards, on the time taken to complete a transaction. Findings: Many customers applaud this technology as it reduces the time taken at the cash register when making purchases. It is simple, easy and convenient and most customers are truly happy as there is no need to write their signature. For this reason they find the system most efficient as it prevents their signature from the likelihood of being forged. ANALYSIS The main objective for the research completed on this topic, was to show how and to what extent the adoption of Chip and PIN technology has improved credit card security for Republic Bank cardholders. At a glance, before Chip and PIN technology was introduced in the UK, there was nation-wide educational literature on the benefits of the technology for banks, merchants and most importantly, the customers. However, it seems that this programme led by EMV, created more enthusiasm in the build-up to its implementation rather than the actual usage of the system. From the research, the mounting negative features of the technology and use of the system is outweighed the decreasing positive ones. It seems that the card theft criminals were focused on a solution to obstruct the successful use of the technology before the intention to use. The question remains, which facet of credit card fraud has Chip and PIN really reduced? The research show that for point of sale transactions Chip and PIN has been useful in the prevention of skimming ones card information, however the fraudsters have found alternative ways to improve on that tactic. Chip and PIN technology can only be used à ¢Ã¢â€š ¬Ã…“successfullyà ¢Ã¢â€š ¬? for point of sale transactions and not online transactions, so fraudsters have modified their techniques as with the modifications of the technology. Based on the research framework adopted, Republic Bank has measured their net benefits of adopting the Chip and PIN technology by encircling the information, service and system qualities to deliver user satisfaction and usage of the system with this technology. The success of any information system is multi-dimensional and the relationships among the constructs relate to the comprehensive evaluation of the system. The variable dependent on these constructs are the net benefits of this system, and for whom? This local company has app Card Security For Republic Bank Customers Card Security For Republic Bank Customers There is no doubt that most organisations today are becoming essentially dependant on the use of credit cards, arguably its most strategic asset, is to support existing business operations. However, credit card fraud and identity theft has continued to plague the banking and retail industries as there seems to be no feasible solution to these crimes. Advances in technology have opened a gateway for hackers to restructure their position of attack, intruding on ones personal life. The basis of this project is on the new Chip and PIN technology introduced on credit cards. Ive considered this to be an interesting topic because of the publicity this technology has been receiving across the world and it has even reached to our shores, here in Trinidad and Tobago. Hence, Republic Bank Limited one of the local banks would be the case studied in this research. Chapter two would encompass the existing literature on credit card history and Chip and PIN. This chapter would outline how credit cards have become smart cards and how the Chip and PIN cards are used. Chapter three gives the entire design of the project and the objectives to be obtained for the research. Moving to chapter four, the research framework adopted for this study on Chip and PIN and how it relates to the model undertaken in the research. The findings from this research would be summarized version of the data collected, with the analysis of the theory and research framework the author undertook in this study. In concluding, the author would report on the learning aspects of the research and provide an assessment of achievements, giving a position on the research question. Literature REVIEW This section is intended to place the scope of the project with literature surrounding the components of the research question. The Credit Card Transaction Process Discussed This payment mechanism was formally introduced in 1958, when the BankAmericard card, now known as Visa was franchised across the global community. By introducing an electronic authorization system, the BankAmericard was able to be used globally. Now by partnering with banks across the globe, Visa has been able to provide an international processing system for the exchange of money. The workings of a credit card transaction are such that it comprises of four main steps. These are: Authorization Batching Clearing Funding The cardholder requests a purchase from the merchant, which is then submitted to the acquirer by the merchant. The acquirer then sends a request to the issuer to authorize the transaction. Once the authorization code is sent to the acquirer verifying that credit is available, the transaction is authorized and the cardholder receives the product. (This is further explained in detail on page 9 of this document) This simple process of electronic transacting has opened up a world of e-commerce opportunities. From an information system perspective the processing workflow of an online credit card transaction is shown below: Figure 1: Online Credit Card Processing Workflow Diagram (Hubbard, 2003) Because of the vulnerabilities that lay in a transaction, more so the networks across which the information is exchanged, various security breaches can occur. Types of Credit Card Fraud There are many different types of credit card fraud. Fraudsters are very innovative in finding new ways of committing credit card crime and as technology changes so does their crime tactics. Security issues surrounding the card fraud has moved from the traditional ways of committing credit card crime (Application Fraud, Intercept Fraud and Lost/Stolen Card Fraud) to the modern techniques namely, Skimming, Site Cloning and most recently Triangulation. Skimming is the fastest growing type of credit card fraud around because of its simplicity. Pocket Skimming devices can be easily carried around and the cardholders data can be obtained by merely swiping the card through the battery-operated magnetic card reader. This technology has also evolved so as to read the data of Chip and PIN cards, with the use of a scanner. These scanners, which can write or even re-write the data on the Chip cards, are fully portable and have high storage capacities. Because some of these devices are not illegal, they are easily accessible to hackers and can be bought over the internet. Site Cloning involves cloning an entire site or just the pages where customers make purchases. Since the web pages are identical customers are not aware that their personal information is being compromised. Also, confirmation details are sent to the customer just as the official companys website would, so the crime goes undetected. The details entered on the cloned site are then used by the fraudster to commit credit card fraud. Another method of credit card fraud is Triangulation. Goods are presented on websites at discounted prices, which can be shipped to the customer before payment. Again, just as with site cloning, the site appears to be legitimate then the customer proceeds to enter their personal data. With this captured information the fraudster can then order goods from legitimate retail websites using the credit card number obtained. Due to these security issues surrounding credit card information security, there has been global industry-wide concern for the protection of cardholders data. Since security management is a systematic issue, a serious look at what can be done to prevent security breaches is necessary-whether it may be legislation, the use of fraud detection system monitors or the application of data encryption/ authentication techniques. Chip and PIN Technology Credit cards have been a feasible solution for making payment processing simple and efficient. The history of the credit card dates back to the 1900s when oil companies and proprietors created their own credit card as a means of obtaining customer loyalty and improving customer service. However, as with advances in technology, the credit cards have evolved from having just encoded magnetic stripes to modern day Chip and PIN cards, with embedded microchips, which can store and transmit data. These Chip and PIN cards were developed to provide an inter-operative system that would combat card fraud (counterfeit and plastic cards). This transaction processing infrastructure has enabled the cash-less revolution, whereby consumers, governments and businesses benefit from the electronic payment network, which has shifted payments by cash and cheques to an efficient electronic payment system. The mechanics of a credit card transaction is such that the merchant acquirer, usually the bank processes transactions on behalf of the merchant. This payment by credit card represents an offer for issuance of payment in exchange for the goods or services provided by the merchant, (Transaction Processing). There are two parts to this type of transaction processing: the first is front end processing which involves the capture of data messages across communication channels to the point of sale devices; and secondly the back end processing which involves the balancing of accounting information by acquirers and issuers and the submission of the payment to the acquiring merchants bank. As a result of the rapid advances in technology, data security continues to be a major concern as every transaction that involves the transmission data across networks is open to external attacks. Attacks on a consumers card information can come from any angle, whether it may be data thieves or network intruders. The Payment Card Industry Security Standards Council (PCI SSC), which comprises of major payment brands namely VISA, MasterCard, Discover and a few others, have created global compliance standards to protect cardholders data. These set of standards help govern and educate all merchants and organisations that process, store and transmit data, as well as the manufactures of the devices used in transaction processing. The PCI SSC (2010), Data Security Standard Quick Reference Guide, as summarized below, outlines the best practices for protecting cardholder data: Develop and Maintain a Secure Network Install and maintain firewall configuration to protect cardholders data. Do not use vendor-supplied defaults for system passwords or other security parameters. Protect cardholders data Protect stored data Encrypt transmission of cardholders data across open public networks Maintain a vulnerability management program Use and regularly update anti-virus software or programs Develop and maintain secure systems and applications Implement strong access control measures Restrict access to cardholder data by business need to know Assign a unique ID to persons with computer access Restrict physical access to cardholder data Regularly monitor and test networks Track and monitor all access to network resources and cardholder data Regularly test security systems and resources Maintain an information security policy Maintain a policy that address information security for all personnel Nevertheless, despite these procedures in place, there has been amplified instances of the various types of credit card fraud, namely Intercept Fraud, Skimming, Site Cloning as well as Triangulation. This propelled an industry and governmentà ¢Ã¢â€š ¬Ã¢â‚¬Å"led initiative in the UK to embark on the introduction of Chip and PIN card technology. Based on the EMV standard (Euro pay, MasterCard, Visa) Chip and PIN technology was launched in the UK on February 14th 2006. This programme was introduced to combat credit and debit card fraud, and to provide an ideal way of validating the cardholders identity. By utilizing smart card technology a microchip is embedded with the customers information which includes their unique four digit PIN. For transactions to be accepted, the customer PIN entered must match the one encoded on the microchip. These steps are further explained below: The card is inserted by the customer into the card reader. The card reader would then prompt the user to insert their PIN. A four-digit PIN is then entered by the customer. Once the reader accepts the PIN entered the transaction would be approved. Note the PIN entered is not displayed on the reader but rather represented by asterisks. The customer is issued a receipt as confirmation of the transaction process. This process removes the responsibility and accountability from the merchant to the customer for point of sale transactions. The card never leaves the customers hand and as such prevents skimming of ones card information. One of the benefits of the Chip and PIN cards is that the Chip itself is encrypted with a range of security features, which the transaction processing system uses to identify the cardholder. These security features are said to be virtually impossible to replicate. The terminals used for Chip and PIN transactions, use secure transmission technology to ensure the privacy of the cardholders data and can operate over a range of connectivity environments, such as wired, wireless and cellular networks. The PCI Security Standards Council also developed a framework of standards which is legally enforced through a merchant/service provider/card brand agreement. These include requirements that support the encryption of the cardholders account data and the point of sale terminal integration. Figure 2: Outline of the process of a Chip and PIN transaction The PIN entered replaces the request for signature as verification of the transaction. This is why the banking industry in the UK has campaigned for this technology, because signatures can be forged, however the PIN is unique to that person. Although the United States is yet to convert to this technology, countries such as Japan, China, Canada, Mexico as well as the majority of the European Countries have all introduced Chip and PIN technology and it is gaining momentum in various other countries including Trinidad and Tobago. Republic Bank Trinidad and Tobago Limited is the first local bank in Trinidad and Tobago to introduce Chip and PIN technology to make the concept of paying by credit card safer for cardholders. The bank adopted this type of technology because this is now an industry-wide conversion from the magnetic-stripe cards and it is also in keeping with the EMV standard. Conversely, a potential security issue with Chip and PIN card terminals is its capability of processing cards with the magnetic stripe as well. Because of this the request to enter the customers PIN can be bypassed by the merchant, with a receipt generated to be signed by the customer. Now because this option is still available it poses an added security threat to card transactions. So, unfortunately skimming still remains a huge problem for cardholders and sadly enough this includes Chip and PIN cardholders as well. Although this practice is slowly migrating from EMV compliant countries, once a card has been skimmed it can still be used in countries where the magnetic stripe is still prevalent, for example some Asian Countries and the United States. This is why many fraudsters can still create a fake card with stolen magnetic stripe information which can be used in for example the United States. The United States believes that although Chip and PIN has reduced fraud for face to face card transactions, there are a still a number of issues surrounding the security of the system used for this these transactions. Now as with any new system introduced, there have been a number of studies on whether Chip and PIN cards are really secure. So the question is has Chip and PIN technology impacted on the activities of overall card fraud or has the activities of fraudsters shifted from retail crime. In a study by Emily Finch (2010) The Impact of Chip and Pin Technology and The Activities of Fraudsters, it was recognised that since the implementation of Chip and PIN technology participants involved in card fraud made varying decisions when it came to their crime of choice. The Decision to Desist The Decision to Continue To work with others Shift to Distance Transactions Diversification of Theft into Identity The study also shows that there is a shift in the attack strategy of fraudsters from point of sale card fraud to Internet and Card Identity Fraud. In an analysis of Internet and Card Identity Fraud, we can note that Chip and PIN technology was not designed for preventing these types of card fraud. So, the question remains, was Chip and PIN successful at what it was set out to achievereduce card fraud? This too can be argued further as there are other limitations. How can one link a particular card to a specific owner? Once the PIN is known by the individual a transaction can be completed with ease. Other studies have shown that the card readers used for Chip and PIN transactions can be modified. In a study by a team of University of Cambridge Computer Scientists, they have uncovered a series of fatal flaws in the Chip and PIN system. One example is where the internal hardware can be replaced without external evidence of this. This new terminal could then be programmed and modified so that it performs just as a typical terminal, where the card details can be collected and allow criminals to make cards with a fake magnetic stripe, which along with the PIN would enable a fraudster to make valid purchases. Another example is that fraudsters can insert an electronic wedge between the stolen card and the terminal, which tricks the terminal into believing that the PIN was correctly verified. Further, with this wedge inserted, any PIN can be entered and the transaction would be verified. This type of fraud makes it difficult for the victims of the attack to be refunded by the bank as the receipt given is authentic and would state verified by PIN. The bank in turn would be accurate in stating that no refund is required as their records show verified by PIN. This type of complaint appears as an act of negligence by the cardholder as he/she allowed their PIN to be compromised. So based on this study the point of sale attacks are much more prevalent, since before the introduction of Chip and PIN cards, consumers only entered their PIN at ATMs. Now with the introduction of Chip and PIN, consumers are using their cards at various other public areas. To combat the compromising of the consumers PIN a shield over the keypad has been used as added security but in many public areas there are video cameras and a persons PIN can still be captured on footage. So, although the UK banking industry has claimed to have rolled out this new technology successfully in 2006, there seems to be some negative aspects of this technology. The architecture surrounding Chip and PIN technology is questionable and the onus is on the banking industry to ensure that cardholders information is protected. Additionally, it also seems that Chip and PIN terminals offer no difference to what the magnetic stripe terminals offered. These terminals can be tampered with, which is a clear indication that there needs to be accurate configuration of these terminals so as to secure the cardholders data when transmitting transactions and that is not vulnerable to incident of attack. So the intent of Chip and PIN technology has more so opened a new marketplace for fraudsters than prevent/reduce fraudulent activity. PROJECT DESIGN, OBJECTIVES AND RESEARCH METHODS The scope of this project is to outline the features of Chip and PIN technology and whether its implementation thus far has been beneficial. This section of the project would provide the methods involved in achieving the data for the project as well as the results based on the data collected. The chosen approach to this design is online research (journals/scholarly articles) along with a case study on the implementation of Chip and PIN technology in Trinidad and Tobago, with the case being Republic Bank Limited. Objective 1 A good foundation for this objective would be the interpretation of the credit cards history. How has this cash-less mechanism moved from a local innovation to a global payment mechanism by use of digital communication across networks? In gaining a clear understanding on the reason for the implementation of this technology, a wealth of research would be conducted on credit card technology and digital security. Objective 2 A holistic understanding on the basis of credit card fraud and the types of fraudulent activities and the steps taken to prevent credit card crime. What technologies have been implemented and the effects/benefits drawn from these approaches. Objective 3 Expanding from objective two also discussed would be whether or not since the introduction of Chip and PIN technology in the UK, has there been a cascading effect of this new technology across countries. Analysing the increasing number of fraudulent activities reported from statistics, which compelled the global banking industry to find a seamless solution for the protection of cardholders data. Objective 4 An assessment on the introduction of Chip and PIN technology by Republic Bank Limited, which would include sourcing information on its implementation and the benefits derived. Further research would be on the acceptance (or non-acceptance) of the technology by customers. Objective 5 Lastly, from the feedback received from the interview conducted and by analysing the incidents of attack on Republic Bank credit cardholders, what was the determining factor in the bank aligning themselves with the UK standards set by EMV? CONCEPTUAL FRAMEWORK In identifying the framework to be adopted that can be referenced to the literature in this research, the author considered the Delone and Mc Lean IS Success Model. Using this model, the author would explain the net benefits of adopting Chip and PIN technology, relating it to Republic Banks implementation of this technology. DeLeone and McLean IS Success Model In evaluating the success of Information Systems, the DM IS Success Model, systems quality measures the technical success, information quality measures semantic success and organisational impacts and user satisfaction measures the effectiveness of the system. The processes in the model are inter-connected by links, across the dimensions of the system. Figure 3: Depiction of the Updated Information Systems Success Model (DeLeone McLean 2002, 2003) The updated DM Model interprets the evaluation of a system in terms of the information, system, and service qualities and how these characteristics attribute to user satisfaction. As a result of using the system, certain benefits will be achieved and the net benefits will in turn (positively or negatively) influence user satisfaction and the further use of the information system. So, therefore three basic components make up this model, the creation of a system, its use and the consequences of its use. Case study as it relates to the ISS model. Republic Bank has been providing banking and financial solutions to individuals and businesses for over 160 years. Their mission is not only to provide efficient and competitively priced services but also to implement sound policies which will be beneficial to their customers. These factors presented provide clarity and influences the net benefits of the implemented Chip and PIN system at Republic Bank thus far. By use of the ISS model to map the research done in this project, the author would complete a step by step relay of the framework discussing the implementation of Chip and PIN by Republic Bank. Information Quality-Information quality refers to the accuracy/protection of the content of the data in transacting. How secure is the personalized data being transmitted across networks. When a customer presents their card to make a purchase, are they confident that their card information is protected because of the added security enabled on this card. System Quality-The system quality refers to the reliability of the network and the response time in transacting, notwithstanding the approved devices that accept personal identification numbers for all PIN based entries (the ease of use of the system functionalities). Therefore in rolling out this new technology the bank along with their partner merchants would train staff so that they are familiar with the best practice guidelines when using Chip and PIN. Service Quality-This refers to the back-end support systems that assist in usage of the technology. How reliable are Republic Banks servers and IP networks? User Satisfaction- This encompasses measuring the users entire experience-the purchase payment, receipt and service (the ease of purchasing without the fear of being a victim of fraudulent activity). Net Benefits -This is the most important success measure and it encapsulates the cost savings and the decrease in the value of fraudulent transactions arising from stolen credit card data. Was the implementation of this technology beneficial in reducing the incidents of card fraud? Are Republic Bank cardholders satisfied that their bank is on par with global industry changes? The focus of this success model lies in determining the impact the features of technology (information, system, and service quality) have on the variables user satisfaction, use, and net benefits. The main objective for using this ISS model is to establish the ultimate benefits derived from the use of information system both in individual and organizational terms. FINDINGS This chapter will illustrate the findings from the questionnaires submitted to a sample of the Republic Banks credit card customers as well as a formal interview conducted with an employee of Republic Bank Credit Card Centre. The aim of the chapter is to source an awareness of the topic area Chip and PIN by cardholders and the personnel interviewed. Primary Data Collection For the basis of the findings of this research the author conducted a formal interview with a middle management employee at Republic Bank and also distributed questionnaires to a sample of the banks credit card customers. A summarized version of the responses from the interview is represented in this chapter, based on the interviewees knowledge. The questionnaires distributed were mostly closed questions so as to deliberately avoid open-ended respondent answers. Approximately 120 questionnaires were distributed to Republic Bank Customers. Only the answers to the key questions are represented in this chapter. Summarized responses from the interview This interview was conducted with the Supervisor, Card Services, which prove to be very insightful. The Supervisor spoke about the banks vision for their credit card market, and how they plan to continuously innovate so as to maintain their customer base and attract new profitable customers. Since the credit card industry is a highly competitive one, the bank is constantly reviewing their interest rates and looking for new ways to give customer returns from the use of their credit card. Due to his long tenure at the bank and having the customer service background, the supervisor was able to give insight on what infuriates a credit card customer. He explained that customers become frustrated when they see added charges and puffed up late fees placed by the bank on their card statements. In view of the fact that most customers do not read the fine print when completing a credit card application, they are not totally aware of all the charges that can arise from delinquent payments. He f urther added that although queries like this can be explained by representatives at the bank who can provide valued solutions to the cardholders problem, the most infuriating of all queries from customers are unexplainable purchases on their account. At Republic Bank, fraudulent activity on a card can be detected from the use of their state-of-the-art security systems and their experienced fraud expert team that are in place to monitor and detect any unusual activity on a customers credit cards, but even with these measures in place, fraud can occur. The supervisor expressed that by implementing Chip and PIN technology for credit cards, the bank was able to be a step ahead of the competition and most importantly the card criminals. He also stated that although credit card fraud is not as prevalent in Trinidad and Tobago as in the developed countries, continuous education in counteracting fraudulent activities for their customer base is an effective method of addressing credit card fraud. He explained that Republic Bank has not had many eye-opening occurrences of notified credit card fraud but they believe that Chip and PIN technology is an innovative solution to the likelihood of this problem. He was also truthful in expressing that this technology is still new to the industry and all merchants have yet to convert to Chip and PIN enabled machines, therefore there is a window of opportunity for fraud until merchants are mandated to have these Chip and PIN enabled machines. He used the term mandate, because eventually all Republic Bank debit cards would also be chip enabled. In summing up the interview the author probed the supervisor on the banks position on the studies done by the University of Cambridge team on Chip and PIN technology and the tested flaws of the system. His response was quite interesting, because it ventured into a thought-provoking discussion on research. He lamented that the sphere of research done on any topic would result in the researcher seeking out the positive and negative aspects of it. How the data is interpreted, reflects the real value of the research done. Questionnaire Findings Question 5: How often and where do you frequently use your credit card to make purchases? Aim: To assess how often the average Republic Bank cardholder uses their credit card. Findings: Most Republic Cardholders in this study used their credit card regularly, at least five times per month. Credit Cards are used for purchases at the supermarket, restaurant and retail clothing stores. Question 6: Has your credit card information ever been compromised? If yes provide details. Aim: To determine the number of incidents of attack on Republic Bank credit card holders. Findings: Less than 50% of the respondents have never had their credit card data compromised. Question 7: Do you understand the workings of Chip and PIN technology introduced to Republic Bank credit cardholders and the value to be derived from using this technology? Aim: To determine the extent of the customers perception of this technologys value and how the card is used. Findings: Although some customers are guarded about the use of their credit cards, most of the respondents are confident in the service that Republic Bank provides and believes that implementing Chip and PIN gives them that added security against fraudulent activities, especially those customers that frequently travel abroad. Question 8: How do you think by using Chip and PIN cards for making payments will make it easier in transacting? Aim: To establish the efficiencies in the use of Chip and PIN cards, on the time taken to complete a transaction. Findings: Many customers applaud this technology as it reduces the time taken at the cash register when making purchases. It is simple, easy and convenient and most customers are truly happy as there is no need to write their signature. For this reason they find the system most efficient as it prevents their signature from the likelihood of being forged. ANALYSIS The main objective for the research completed on this topic, was to show how and to what extent the adoption of Chip and PIN technology has improved credit card security for Republic Bank cardholders. At a glance, before Chip and PIN technology was introduced in the UK, there was nation-wide educational literature on the benefits of the technology for banks, merchants and most importantly, the customers. However, it seems that this programme led by EMV, created more enthusiasm in the build-up to its implementation rather than the actual usage of the system. From the research, the mounting negative features of the technology and use of the system is outweighed the decreasing positive ones. It seems that the card theft criminals were focused on a solution to obstruct the successful use of the technology before the intention to use. The question remains, which facet of credit card fraud has Chip and PIN really reduced? The research show that for point of sale transactions Chip and PIN has been useful in the prevention of skimming ones card information, however the fraudsters have found alternative ways to improve on that tactic. Chip and PIN technology can only be used à ¢Ã¢â€š ¬Ã…“successfullyà ¢Ã¢â€š ¬? for point of sale transactions and not online transactions, so fraudsters have modified their techniques as with the modifications of the technology. Based on the research framework adopted, Republic Bank has measured their net benefits of adopting the Chip and PIN technology by encircling the information, service and system qualities to deliver user satisfaction and usage of the system with this technology. The success of any information system is multi-dimensional and the relationships among the constructs relate to the comprehensive evaluation of the system. The variable dependent on these constructs are the net benefits of this system, and for whom? This local company has app

Sunday, January 19, 2020

Modern technology is a bane Essay

INTRODUCTION Rationale Modern technology has increased influence in contemporary society. It seems to be contributed many social opportunities. Understanding and taking advantage from technology is the main aspect in contemporary world which is approachable society. The research question about modern technology is seemed to advantage for study and analysis because technology is the most importance in society. Throughout two years experience in Industrial Engineering field, most of mass production process in domestic and foreign countries have concerned with technology that it probably seems to replace social responsibility. Convenience and constant performance can be produced by modern technology. Profound foundation of technology is main propose in prospect of study for master of information and communication technology and master of computer science, therefore more experiences and argument researches can certainly advantage to establish potential basis of study. The analysis of the research topic The purpose of research questions, â€Å"Modern technology is a bane not a boon. Do you agree?† is to analyze and argue the disadvantage or the advantage of modern technology which is regarded as a bane or a boon. In the research topic question has two aspects of discussion about modern technology is a bane not a boon or modern technology is a boon not a bane. Bane of modern technology can attribute to social problems that have increased unemployment problem, social stress levels and destruction of natural ecology. There is more conclusive evidence of social problems that has contribute by disadvantage of modern technology; for example, machine replacement in factory, increased unemployment rate after terrorist attack, increased social stress level, pollution by modern technology, extinct of natural resources and forest area and hazardous waste in nature. Although it cannot be denied that modern technology has contributed to advantage, it should also be seen that modern technology has negatively affected social degeneration. Modern technology is a bane. The diagram in this below shows  structure of the analysis of research question. DATA COLLECTION The research method The research has completed in four steps. First of all, chosen research question, answer of the research question was required by exploit background and information from pass experience and analysis of key concept. In the second step, secondary source from research book and current journal article was analyzed and evaluated for selection to confirm main idea. The information and objectivity from author, which has encouraged an argument must be related and specified with question propose. Accordingly, it should confirm argument by provided strong and reasonable evidence to supporting research answer. The third step, review and revise of verbal structure and logical concept have done by reviewer in the draft of research. Although the research was based on personal observations or expert opinions, background and pass experience about argument in research answer is significance. The forth step was rewritten and improved the research by add more evidence to compose strongly research. Therefore more evidence has provided from current journal article in many way, such as newspaper or internet to modernized information. However, the research was completed in four steps, but analysis of argument research and technology foundation is required for improvement. Annotated bibliography Brown, A. (2001). Sometimes the luddites are right. The Futurist, 35(5), 38-41 This article identifies a disciplinary negative consequence of technological development behind the problematic of society. This article discusses about an argument that concerns with problem from new technology in 21st century. The main point of this article adequately presents the effects of modern technology based on contemporary problem. This article is written for the researchers who are studying in computer or technology education. DeLisle, J. R. (2002). Real estate and the capital market: A special look at the impact of terrorism. The appraisal Journal, 70(1), 10-20 This article attempts to show an economic downturn problem in United States of America in 2002. The prolonged economic crisis is caused from violent crime by terrorist attack on September 11th 2001. This article shows a content that concerns with an economic problem, which affects economic market in United States of America. The main point of this article adequately presents the information of economic crisis based on contemporary problem. This article is written for the researchers who are interesting in area of global crisis in the view of economics study. Foltz, B. V. (1995). The Technological Domination of Nature: Nature as inventory. In B. V. Foltz, Inhabiting the earth: Heidegger, environmental ethics, and the metaphysics of nature (pp.84-109). New Jersey: Humanities Press International, Inc.. This chapter discusses and clarifies the question of relationship between natural environment and policy of the future. The detail in this chapter can be presented as an attempt to clarify that possibility by explanation in details of how influential philosophers to rightly inhabit in the earth. The question how technology dominates on nature as inventory is described in this chapter. The significance of overwhelmingly disastrous consequence is emphasized in this chapter. This chapter is written for the researchers who are undertaking in area of natural environment philosophy. Hwang, S. (1999). Ecological panopticism; the problematization of the ecological crisis. College literature, 26(1), 137-149. This article attempts to identify a disciplinary apparatus behind the problem of ecological crisis. The detail in this chapter discusses about an argument that concerns with an ecological problem, which has been a problematic crisis. The main point of this article adequately presents the effects of ecological crisis based on contemporary technology. This article is written for the researchers who are undertaking in area of ecological sciences. Segal, H. P. (1994). Kurt Vonnegut’s Player Piano: Ambiguous Technological Dystopia. In H. P. Segal, Future imperfect: the mixed blessings of technology in America (pp.126-146). United State of America: The University of Messachusetts Press. This chapter describes the technology imperative lies, which is debated over technology and progress, at contemporary. It identifies the affect of technology in term of contemporary crisis from the historical problem based on American society and culture. This chapter uses case studies to analyze and illuminate a relation of today’s technology based on American history, especially in Maine. This chapter is written for researchers who are studying in unadulterated technological progress. Weil, M. M. & Rosen, L. D. (1997). How TechnoStressed Are You?. In M. M. Weil & L. D. Rosen, TechnoStress: coping with technology @ work @ home @ play (pp.1-26). New York: John Wiley & Sons, Inc.. This chapter describes how technology stresses people. It presents about increased stress levels in contemporary society which has caused by technology. The focus point of this chapter shows relationship between development of technology on frustration feeling and annoyance feeling which has contributed to stress levels. This chapter is written for researchers who are undertaking in area of psychological sciences or development of technological science. The critical review During the past three decades, the ecological crisis has been problematic basis to society. Modern technology has constructed ecology crisis. Sung UK Hwang, in a 1999, attempts to identify a disciplinary apparatus behide the problematic ecological crisis. Hwang, a PhD in political science at the University of Connecticut, disserting on â€Å"Green Capitalism: A Dangerous Liaison†, focuses on personalized responsibility and provides a case of global management to treat ecologic problem. Therefore, sustainable  refinement of ecological crisis is complicated and seemed to be ideology. However this article is thought-provoking enhancement of natural ecology in contemporary society. This article can be advanced for natural research study for understanding contemporary ecology crisis. Disciplinary apparatus behide the ecological crisis is imperative proclamation in contemporary society. Ecological crisis can be defined as a natural degrading phenomenon, such as global warming, ozone depletion, resource exhaustion, and toxic pollution. An additional a disciplinary apparatus, Hwang has defined as an acceleration of ecology crisis that can analyze within three factors. The first is an increased population that can be impacted to ecological sources, the second is exhausted natural resources by consumption of technology, and the third is natural resources exploitation that is used for supporting economics. Thus, this article has presented detail of each mention as a key term of cause-effect in ecological crisis. However, it seems that the most important apparatus in this article is exhausted natural resources by technology because technology seems to be increased influence in contemporary society. On the other hand, it should be recognized negative affect of technology through ecology crisis. Among a disciplinary apparatus of ecological crisis in this analysis, perhaps the most interesting is the consistency which Hwang suggests between ecological degeneration from development of modern technology and increasing population in society. Indeed, it seems to be that an ecological crisis might be depended on increased population growth rate because more consumption demands of population are accelerated exhaust of natural resources and technology is as an apparatus for increased exhaust rate. An additional making this important relation, Hwang analyzes a greenism behavior that is claimed environmentalist and ecologist to study relationship between modern technology and the population rate in West Chester. However, Hwang’s view on each element of the ecological crisis has based on the claim that ecological crisis requires the supporting scientific evidence of advanced technology which is major cause of the ecology crisis but this  evidence is used a less of statistic database to support. This claim is reasonable, although it seems to be unprovable evidence. Because of many information from secondary sources shows that technology has increased ecology crisis in contemporary society. Hwang also suggests that the reason why affectation from modern technology must be proclaimed that is inseparability in ecological crisis because of it is unnoticed fact of ecological debacle. Without further documentation, this concept is hard to accept because it is unprovable claim. Moreover, Hwang calls upon research experience in a firm he founded on database from Intel Corporation, which is presented about hazardous waste from its product. However, more questions need to be made available by Hwang to prove and support the evidence so strong, such as How can modern technology make ecological disaster? Perhaps the fault in Hwang’s reasoning is his claim that technology itself is a major cause for ecology crisis. This claim is probably incorrect because ecology crisis maybe not only occur from technology but also it causes by the user who apply or implement technology. Even though modern technology can be validated a warning of ecological crisis, society should determine about the affect through the natural destruction. It seems that, in general, his research is more appropriate for the victim who receives more effect on the disaster crisis that has to deal with contemporary technology. Because technology can cause social problem through ecology crisis and unrecognized of disadvantaged technology is increased trouble in society. Finally from Hwang’s research, the conclusion of ecological crisis is caused from many factors and it is early imperative subject for society. One factor of ecological crisis is from modern technology because technology can be exhausted many natural resources that is caused about destruction of natural ecology and environment crisis. It is probably suitable way for contemporary society to utilize technology in only positive way not in the negative way by conserved natural resources because technology can extinct all of natural resources easier. The analysis of research The research was limited by the time limitation. Argument writing and evidence source is caused of trouble. According to the question of research must be related by pass experience and current information that can initiate time limitation. Research source and collected information was limited progress of the research because of un-updated information or unrelated research source and indistinguishable propose of author. An additional limitation, ambiguity of the research topic and aspect of research question can attributed to limited research. Consistent with research question should be specified or focused on the advantage or disadvantage of technology, such as computer or communication technology. Other possible factors that limit the research is deficiency of background in pass experience, but it can solve by searched secondary source form library or modernized information. Thus, although topical question has limited the research, the research can be improved foundation of technology and argument writing. The suggestions for future study If this topic area was chosen again, same kind of research question in technology field would be selected. Throughout pass experience and current global situation can construct proficient foundation about modern technology. Contemporary world has many kinds of resource to develop basis of technology knowledge; for instance, newspaper and internet is the modernized information to supply comprehensive demand. Consequently analysis of research topic area can implement with that kinds of modernized information. Moreover the possible areas that should be taken into consideration for any similar research in future maybe scope in politics about immigration from underdeveloped country or contemporary psychological problem because these problems have increased negative effect on many countries in the world. Based on pass experience and current opinion, it is different idea to evaluate consequence of technology throughout social problems; however technology should be regarded to utilize in only the positive way not in the negative way.

Saturday, January 11, 2020

Andvantage and Disadvantage of Electrical Cars

Advantages Advantages & Disadvantages of Electric CarsAdvantages ~ a safe way to convert fossil fuels into automotive power ~ more efficient than gas-powered vehicles because their fuel can be harnessed from any source of electricity, which is available in most homes and businesses ~ the electricity created by electric cars is created by the burning of fossil fuels at power plants, instead of in an internal-combustion engine which pollutes the air. ~ the only new system required for electric cars is one that charges the batteries, and major automakers are working on creating a standard system for battery charging electric cars change the chemical composition of the pollution for the better ~ electric vehicles produce â€Å"zero emissions† in urban cities, where cleaner air is much needed. This is because the polluting power plants are situated far from the urban areas and therefore will improve the air quality in polluted urban areasDisadvantages disadvantage ~ electric vehicl es have not been widely adopted because they are rather impractical ~ Due to the lack of modern battery technology, electric cars are limited as to the distance that can be driven before the complete failure of the battery. Today, the average lifetime of a lead-acid battery is only about 100 miles. ~ Electric cars also cannot cruise, accelerate, or climb fast enough to compete with gasoline-powered cars, and accessories, such as air conditioning and radios, drain the battery even further. ~ Because electric cars are usually created by replacing the fuel tank and gasoline engine of a conventional car with electric motors, batteries, chargers, and controllers, the result is a car that is heavier and less efficient then a car solely running on electricity more expensive because the manufacturer cannot fully recover the cost of the discarded parts. ~ electric vehicles are not completely â€Å"emission-free†. If the electricity used is produced in a coal- or oil-fired generator, this only transfers the emissions from the tailpipe to the power plant. ~ They also change the composition of the pollution for the worse, by increasing the amount of sulfur oxide ( a key cause of acid rain) and ultra-fine soo t particles which also have negative health effects. Advantages & Disadvantages Of The Electric Car Written by Chris on 30 April 2010. Visited 107 times, 2 so far today In this article we take a look at the advantages and current (but improving) disadvantages of the Electric Car. With more and more car manufacturers making new Electric Cars, this is obviously the way forward for the future, but there is obviously a very long way to go. THE ADVANTAGES AND DISADVANTAGES OF THE ELECTRIC CAR Electric cars are not only cheaper and greener to run, but in the long term they will help with the problem the world is facing with running out of oil resources. THE DISADVANTAGES: * They are currently expensive to buy with some costing up to $50,000 * Short battery life (some have to recharge after only 100 miles) * The batteries take up a lot of space * lack of charging points in the community, although this is expected to improve in time * Recharging costs (although cheaper than liquid fuel) can put a sttain on your electricity bill * Recharging the battery can take anything from 1 hour and up to 8 hours * Some are considered to be too small Not an ideal family car, but again this is likely to improve over time * Some consider the designs to be â€Å"ugly† A NEW CONCEPT IDEA: A new concept to increase the cars travel compacity is to have two or more batteries installed, where you can switch to another battery when you start running out of charge. Then whilst you are running on a second battery, a dynamo can recharge your dead battery whilst you are driving. The problem with this is that the batteries would have to be made smaller to be able to fit nicely into the car.

Friday, January 3, 2020

The Statement Of Administrative Philosophy - 1227 Words

Statement of Administrative Philosophy It is in looking back that we can see the future; SANKOFA. This African symbol derived from the Akan Tribe in Ghana best describes my Administrative Philosophy. Translated, the word and the symbol mean, â€Å"it is not taboo to fetch what is at risk of being left behind.† (Carter G. Center for Education). Therefore, It is upon this strong belief that I stand unwavering in experiences, leadership, management style and values. Specifically, the genesis of my statement of administrative philosophy is derived from my gratitude to my elders and ancestors that paved the way for access to equal education. The impact of their courage and leadership has created a legacy that lives forever. At the center of my philosophy is the belief that it is my altruistic calling as well as duty to be a catalyst for student success. Academia is where I not only make a living but â€Å"Live my making!† Simply put, I am called to this profession and have a duty to serve unselfishly. To that end , as a theoretical underpinning of my practices, my preferred leadership style is servant and transformational leadership. Student Affairs is the department where my philosophy and leadership capacity can make the greatest impact. Vision of Leadership in Student Affairs The development of students both inside and outside the classroom can best be nurtured through student affairs. As a student affairs practitioner, and former at risk student, I believe that a student’s engagementShow MoreRelatedMy Philosophy Of Professional Practice1416 Words   |  6 PagesMy Philosophy of â€Å"Professional Practice† statement My philosophy of professional practice statement is to give the maximum in work not only for the students but also for those that surround me. My philosophy is very simple to respect all people to respect me.Strive to help students think critically, facilitate learning with customized modifications, and help students use problem-solving strategies. My personal core of belief is always practiced active listening to assist the students better. ItRead MoreSocial And Political Order : Seat Belt Laws1102 Words   |  5 Pagesand what is referred to as consequences from political bodies is defined by Hobbes in the ninth chapter of Leviathan. â€Å"1. Consequences from the features of †¢natural bodies; which is called NATURAL PHILOSOPHY. 2. Consequences from the features of †¢politic bodies; which is called POLITICS, and CIVIL PHILOSOPHY. (Hobbes, 1998). Agreeing with the argument presented by Hobbes that government should have absolute power allows for the seat belt law to be unquestioned. The law would be in place simply becauseRead MoreThe Ethics Of The Public Administration System Essay814 Words   |  4 PagesAdministrative Ethics is one of the terms of Administrative science which begins with and grounded in duty. The nature, meaning and scopes of ethics have overgrown in the course of time. Ethics is thickened to public administration. In public administration, ethics concentrates on how the public administrator should question and reflect in order to be able to act responsibly. We can simply bisect the two by saying that ethics deals with morals and values, while public administration is full of actionsRead MoreDesigning an Early Childhood Program1156 Words   |  5 PagesProgram When designing an early childhood program, the first step would be to assess the need in your community. You need to determine what is missing in your community and then offer a solution. The next step would be to develop your program philosophy. This will let people know how you plan on addressing the need and what values you will be instilling in the children you serve. The last step in establishing a program in your community is to decide the type of program or curriculum that willRead MoreH. George Frederickson’s The Spirit of Public Administration Essay1504 Words   |  7 Pagesdiscussed were governance, fairness and social equity, and ethics and public administration. nbsp;nbsp;nbsp;nbsp;nbsp;Frederickson begins in Chapter 1 by explaining that â€Å"public administration is both a profession and field of study (p. 19).† This statement is very exact. Often times public administrators focus on the profession and do not practice studying their role in society. â€Å"The word administration is the subject of extended study, analysis, and discourse (p. 19).† Meaning the role of the publicRead MoreThe Career Path Of Vocational Rehabilitation Counselor866 Words   |  4 PagesStatement of Service Philosophy The career path of vocational rehabilitation counselor has come to me later in my professional career and it is not a path I would have anticipated taking. I do not recall taking interest assessments in high school, but if I had I would have probably fallen into the category of conventional personality type on John Holland’s personality scale. My early educational pursuits leaned toward administrative and business type positions. Most of my career I have workedRead MoreStrategic Planning Model for Homeless Shelter1038 Words   |  5 Pagessupported by the Malaysian Women, Family and Community Development Ministry. Its management consists of five former Malaysian government senior officers previously working under various social groups in Malaysia with staff strength of 20 full-time administrative staffs supported by another 50 part-time volunteers. HEM plans to provide supports and services annually to approximately 2,000 homeless people around Kuala Lumpur, the central ci ty of Malaysia under Anjung Singgah shelter. HEM supports andRead MoreAcc 400 Week 5 Team Assignment1090 Words   |  5 Pages From: Team B Date: May 24, 2010 Re: Financial Statement Analysis The purpose of this memo is to explain (a) the bases for comparison in analyzing Ventura financial statements and (b) the limitations, if any, in financial statement analysis. The financial statement holds pertinent information about the company, such as the financial status of the company and changes, if any, which should be made. These statements are important to investors and stockholders and therefore complianceRead MoreAnita Roddick809 Words   |  4 Pages2. How do you evaluate Anita Roddick’s management philosophy and style? How important a contribution did she make to the creation of The Body Shop? How important is her role in its ongoing management? Anita Roddick’s Management Philosophy amp; Style 1. PHILOSOPHY The 4 basic management functions of Planning, Organizing, Leading amp; Controlling can be analyzed in detail for drawing a picture of Anita Roddick’s Management Philosophy for The Body Shop. 1. Planning * First majorRead MoreThe Organizational Structure Of A Healthcare Organization Essay1338 Words   |  6 Pagescarry out their duties efficiently and successfully. What separates the organizational structure of a healthcare organization from a business, essentially that the hospital s organization is chiefly founded on the amalgamation of medical and administrative staff (Carayon, et al., 2014). The organizational structure of the twenty-first century solutions in health care hospitals involves, both divisional and hierarchical structure. In the of the chain of command hierarchy, there are various levels