Wednesday, December 25, 2019
The Comedy of Hamlet Essay - 1191 Words
How does the use of comic relief best contrast the tragedy of Hamlet? In great works of literature a comic relief is used as contrast to a serious scene to intensify the overall tragic nature of the play or to relieve tension. As illustrated in Shakespeareââ¬â¢s tragedy Hamlet, intense scenes are joined with characterââ¬â¢s banter and vacuous actions as to add a comic relief. In Hamlet, Polonius acts as a comic relief by his dull and windy personality, Hamlet uses his intelligence and his negativity toward the king and queen to create humor, while on the other hand Rosencrantz and Guildenstern are a comic relief by their senseless actions and naà ¯ve natures. Polonius, Hamlet, Rosencrantz and Guildenstern are all used as a comic relief toâ⬠¦show more contentâ⬠¦Another instance where Polonius is a comic relief is when Hamlet is inviting the players into the castle. One player breaks into an emotional speech at Hamlets whim and Polonius interrupts with comments. ââ¬Å" Fore God, my lord, well spoken, with good accent and/ Good discretion.â⬠(IIii,447-448). Polonius is trying to commend the speaker to hasten him. After the speech keeps going on Polonius rudely interrupts with ââ¬Å"This is too longâ⬠(IIii,478). As the player recites a part of the speech he becomes emotional with color and Polonius points it out. ââ¬Å"Look wheââ¬â¢e he has not turned his color and has/ Tears inââ¬â¢s eyes.-Prithee, no more.â⬠(IIii,499-500). Polonius is rude and pokes fun at the emotional speaker. His actions contrast with the playerââ¬â¢s tragic speech emphasizing sorrow aspects of his speech. Rosencrantz and Guildenstern are comic reliefs by acting as the fool in the play Hamlet. The duoââ¬â¢s ignorant nature are picked at by Hamletââ¬â¢s sharp toungue through the play, intensifying itââ¬â¢s ultimate tragic nature. One example is in act two scene two of Hamlet, when Hamlet is questioning Rosencrantz and Guildenstern about the r eason they are at the castle. Hamlet offsets Humor in these scenes by his choice of words. Hamlet puts the pressure on the duo and Rosencrantz in an aside to Guildenstern asks what excuse they should make to Hamlet while the whole time Hamlet is aware of their conversation. ââ¬Å"(to Guildenstern) WhatShow MoreRelatedThe Comedy of Hamlet1827 Words à |à 8 PagesThe Comedy of Hamlet Shakespearean plays are often known for their outstanding entertainment and classic comic conflict. In his masterwork, Hamlet, Shakespeare uses these aspects to serve his thematic purpose. He has used comedy throughout many of his historic plays, but in this play, comedy is the drawing point that makes it fun and entertaining, yet clear and intuitive. Generally, his tragedies are not seen as comical, but in reality, they are full of humor. However, these comic elements donââ¬â¢tRead MoreHamlet : A Tragic Comedy1828 Words à |à 8 Pages Hamlet: A Tragic Comedy William Shakespeare once said that ââ¬Å"brevity is the soul of wit.â⬠This is heavily evident in regards to Hamlet and all of his short, witty comments throughout the play. In Act I Scene II Hamlet s wit comes out in full force during a discussion with his mother, Gertrude, and his uncle/stepfather, Claudius, with Hamletââ¬â¢s very first words in the play: ââ¬Å"A little more than kin, and less than kind!â⬠(Meyer, pg 1610) WIth this initial first line, he satirically assaults Claudiusââ¬â¢Read MoreHamlet As A Comedy, Witness The Dark Humor1477 Words à |à 6 PagesWhile Hamlet is considered a tragedy the humor that is displayed can change it from a tragedy to a tragi-comedy. Hamlet has been called one of William Shakespeareââ¬â¢s greatest works (Draudt, 85). Death is sad but the dark humor gives it a different satire to the event. The language of the play is used to create comedy with wit that is meant to be pleasing to the audience and define what kind of characters are in the play. Hamlet the person plays many parts the clown, the fool and the madman. HamletRead MoreEssay on Compare and Contrast Comedy and Tragedy914 Words à |à 4 PagesCompare and Contrast Comedy and Tragedy In a comparison of comedy and tragedy, I will begin by looking at narrative. The narration in a comedy often involves union and togetherness as we see in the marriage scene at the end of Midsummers Night Dream. William Hazlitt tells us that one can also expect incongruities, misunderstandings, and contradictions. I am reminded of the play The Importance of Being Ernest and the humor by way of mistaken identity. Sigmund Freud tells us to expect excessRead More tragoed Metamorphosis of the Tragedy in Oedipus Rex, Hamlet, and Desire Under the Elms736 Words à |à 3 PagesMetamorphosis of the Tragedy in Oedipus Rex, Hamlet, and Desire Under the Elms Tragedy is considered by many to be the greatest of the genres. Often something goes wrong and exposes something great. Characters generally have more depth as evidenced by Hamlet. Tragedy shows up in the great periods of history: Classical Greece, Renaissance, and the early 20th century. It is a far more complex genre than comedy or romance. It teaches people to think since the storylines never have a simpleRead More Comic Relief Of Hamlet Essay examples1404 Words à |à 6 Pages A Portrayal of Humor Within the Tragedy of Hamlet How does humor factor into a tragedy? Shakespeare knew the answer to this question and acted upon it quite frequently. Shakespeare has been known to write comedies and tragedies both but this does not qualify him at to not incorporate a little of each into each other. In the work of Hamlet there are many occasions where Shakespeare uses it for different effects. The main reason for the presence of humor within a tragedy is to keep the reader interestedRead MoreWilliam Shakespeare s Romeo And Juliet, King Lear, And A Midsummer s Night Dream1037 Words à |à 5 PagesThe Bard of Avon, commonly known as William Shakespeare is one of the best known playwrights in the (Video). A few of his most famous plays include Hamlet, Romeo and Juliet, King Lear, and A Midsummerââ¬â¢s Night Dream (McArthur). Although he was popular during his time, Shakespeareââ¬â¢s influence continued to grow after his death and today he well known around the world. He added 2,000 words to the English diction ary and he is the 2nd most quoted after the Bible (Video). Shakespeare is one of the mostRead MoreEssay on Hamlet and Tragedy524 Words à |à 3 PagesHamlet and Tragedy Hamlet: A Tragedy When you think of William Shakespeare, Hamlet is the first thing most people think of, as his work. Hamlet is also a classic example of a tragedy. In all tragedies the hero suffers, and usually dies at the end. All good pieces of literature written way back when, are usually tragedies. The most important element is the amount of free will the character has. In every tragedy, the characterRead More Hamlets Sense of Humor Essay1391 Words à |à 6 Pagesaudience to take, William Shakespeare strategically placed several humorous scenes throughout his masterpiece, Hamlet.à In particular, the character of Polonius fills the role of the comic fool; he is in two essential comedic scenes, one with his own children and then one with Hamlet.à Shakespeares acute ability to weave humor into this very heavy play is noteworthy, as his use of comedy goes beyond merely providing much-needed comic relief.à à In fact, the rather numerous comedic scenes serveRead MoreWilliam Shakespeare s The Ghosts 1116 Words à |à 5 Pageswere be powerful links between his art and the haunting of spirits (157). The richest and most complex exploitation of the theatrical capital Shakespeare found in ghosts is in Hamlet. The ghost in Hamlet is the specter of Hamletââ¬â¢s recently deceased father, who claims to have been murdered by Claudius and calls upon Hamlet to avenge him (Shakespeare xi). It is important to grasp how frequently and insistently the figure of the ghost repeats all through his plays. The inquiries the figure raises
Tuesday, December 17, 2019
John Rigas Founded Adelphia Communications Corporation
John Rigas founded Adelphia Communications Corporation (ââ¬Å"ACCâ⬠) in 1952 for $300. The company was fittingly named Adelphia, Greek for brother, as it employed generations of Rigas family. Skip ahead twenty years; Adelphia officially became incorporated. Roughly ten years later, John Rigas bought out his brother Gusââ¬â¢ stake, and his three sons became employees of Adelphia. His son-in-law was also the head of the board of directors. This positioned the Rigas family into all of the senior executive positions at ACC. After continued corporate growth, ACC made its initial public offering in 1986, yet the Rigas family held nearly all of the control over every aspect of operations. (International Directory of Company Histories, 2003) Adelphiaââ¬â¢s initial board was made up of nine board members and five of the nine were the family of John Rigas, owner and founder of Adelphia. This meant that the Rigases had 100% ownership of class B super voting shares, which gave the family majority voting rights. This is how the family maintained control of the board even after the company went public. Investors did not quickly pick up on this, as this was the era of the ââ¬Å"techâ⬠bubble and most were just looking to ââ¬Å"get inâ⬠on it. In an attempt to be competitive with large cable companies, ACC made several large acquisitions in 1999. Rigas acquired three cable companies at a price tag of over $8 billion growing Adelphiaââ¬â¢s subscriber count to over 5 million customers. Thus, ACC became theShow MoreRelatedAnalysis Of The Book The Adelphia Debacle 1418 Words à |à 6 PagesAldo Toomepuu 1 November 2015 ACG 6936 The Adelphia Debacle Some have been ensnared in the net of excessive debt. The net of interest holds them fast, requiring them to sell their time and energies to meet the demands of creditors. They surrender their freedom, becoming slaves to their own extravagance. ~Joseph B. Wirthlin Background At first glance this appears to be to another post-Enron big corporation fraud scandal. It was one of the first big cases tried after Enron. However, thereRead MoreAdelphia Communications Corporation: Financial Statements1544 Words à |à 7 PagesStatements The company that I have chosen to portray in my key assignment is the Adelphia Communications Corporation. The Adelphia Communications Corporation was a cable television company headquartered in Coudersport, Pennsylvania. It was owned by John Rigas and was founded in 1952; Adelphia became one of the largest cable companies in the United States. In 2002 Adelphia Corporation filed bankruptcy as a result of internal corruption. Shortly after filing bankruptcy the company headquartersRead MoreBusiness Ethics: Adelphia Scandal1476 Words à |à 6 Pages21st Century evolved, it appeared as if Adelphia Communications Corporation was on a direct path of success; unbeknownst to their investors and the public, they were in reality on a direct path of destruction instead. Unfortunately, Adelphia is not the first major company in the history of the United Statesââ¬â¢ business world to lose the trust of the American public, but it is certainly one of the most notable ones to do so. As the ev ents surrounding the Adelphia scandal unfolded in full view of theRead MoreEssay on Adelphia Scandal2340 Words à |à 10 Pagesï » ¿ The Adelphia Scandal The Dawn of Adelphia Adelphia was founded in 1952 by John Rigas and his brother Gus Rigas in Coudersport, Pennsylvania with the purchase of their first cable franchise for $300. After 20 years, the Rigas brothers incorporated their company under the name Adelphia which derived its name from a Greek word which means brothers, an apt corporate title for a business that would employ generations of the Rigas family. Adelphia was a cable television companyRead MoreForensic Paper1628 Words à |à 7 Pages I think five of the skills that a forensic account would need are communication skills, detail oriented, professional and ethical behavior, sound judgment and discretion. Communication skills are vital in any profession. It allows you to convey information for others to receive. The problem with communication is that it can be interpreted differently by other intended parties. As a forensic accountant, communication skills, verbal and non verbal, are important when it comes to conductingRead MoreRole of Criminology in Determining the Emerging Patterns of Corporate Crime3821 Words à |à 15 Pagescorporate crime has become. How Criminology has sought to explain Corporate Crime? Introduction In criminology, corporate crime denotes to crimes that are done either by a corporation (a business unit having a separate legal character from the natural persons that achieve its actions), or by individuals acting on behalf of a corporation or other business entity. White Collar crime is a quickly arising topic in the field of criminal justice. Recently, it has just been dubbed very popular with cases thatRead MoreOrganizational Fraud9733 Words à |à 39 PagesFIGURE 4 : How organizational frauds are detected 13 FIGURE 5: Organizational Fraud Triangle 21 LIST OF ANNEXURES ANNEXURE 1 : Case study of Enron i ANNEXURE 2 : Case Study of Refco Organization i ANNEXURE 3 : Case Study of Adelphia Communications Organization ii 1. INTRODUCTION In India the Satyam scam has grabbed all the headlines, but organizational frauds are likely to be uncovered in many countries. In the leading capitalist economy, the United States, such organizationalRead MoreManagement and Rolls Access Code14663 Words à |à 59 PagesNinth Edition, by Stephen P. Robbins and Mary Coulter. Published by Prentice Hall. Copyright à © 2007 by Pearson Education, Inc. Management Yesterday and Today 2008934301 ââ¬Å"Deliver more based on less.â⬠Thatââ¬â¢s the product design approach that John R. Hoke III now wants his designers to use as they create new footwear.1 As the vice president of global footwear design for Nike, Hoke leads an international team of global footwear designers responsible for dreaming up, creating, and commercializing
Monday, December 9, 2019
Old People free essay sample
In many countries, the proportion of old people is steadily increasing. Does this have more positive or negative effects on the society? With the development of technology and medical care, people now enjoy extended life expectancy. The percentage of elderly people who are over 65 has been increasing dramatically which is as a direct result of longevity. This trend is not only restricted to developed countries where have surging economy, advanced technology and relatively completed social welfare, but also in developing countries where infrastructure is still missing. However, hat aging population brings to us still remains controversial. Undoubtedly, a steady increase in the proportion of elderly in a particular country reflects the fact that the country has been enjoying a peaceful society, positive economic development and advancement in technology for at least few decades or in come cases, half a century. In some societies, these aged citizens are now taking responsibility of looking after young children, including sending and picking up kids from schools, preparing meals and doing other housework. We will write a custom essay sample on Old People or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Their contribution toward the family or the society as hole should never be neglected.However, as many people argue, aging population poses a challenge, for it creates many problems for a country where pension and welfare system is much less than perfect. In China, for instance, Elderliness are now taking vast amount of public fund for health care and pensions which is actually provided by young working tax payer rather than themselves. The worrying situation may eventually explode when social fund become insufficient to pay off the debt. Moreover, retired elderly people even pose a threat to young job seekers since they have taken many vacancies in job market.Finally , the problem is associate with sandwich generation people who have little kids and elderly members to look after at the same time, this situation actually add extra burden to the in between members of the family, which is always the young couples. Having considered the arguments on both sides of the debate, I believe that elderly people are positive for the society in developed countries and they can improve the medical science, and I would suggest that we should keep the balance between young people and elderly people.
Sunday, December 1, 2019
Meridian By Alice Walker Essays - Meridian, Literature, Alice Walker
Meridian By Alice Walker In this compelling novel by Alice Walker, Meridian, the main character, grows up through the eyes of the reader. The author shows us the emotional, physical, and psychological stages of resistance that Meridian goes through during the height of the civil rights movement. In fact, if one looks at the life of Alice Walker, the author of the novel, similarities undeniably exist between the two women. First let us examine the early signs of resistance in Meridian. One of the first obvious examples of Meridian's individuality is when she rejects religion at a very young age despite her mother's devout Christian beliefs. In school, she is unable to finish a speech because she knows that there is no truth in the words she speaks. "Meridian was trying to explain to her mother that for the first time she really listened to what she was saying, knew she didn't believe it, and was so distracted by this revelation that she could not make the rest of her speech." (Walker, 121) This passage reveals the intellect that overpowers her emotion developing in Meridian. Yet another example is how Meridian is able to be a nonconformist when she gives up family life and motherhood when she has the opportunity to attend college. Her feelings are well explained in this passage. "When she gave him away she did so with a light heart. She did not look back, believing she had saved a small person's life." (Walker, 90-91) Although Meridian feels it will be best for the child as well as for herself, this decision causes great disturbance within her because of her mother's disapproval. The reader sees Meridian enter college after she has made all of these decisions, and she has also volunteered to work for voter registration, a decision that foreshadows further resistance throughout the novel. When Meridian enters college, she does so knowing that she will better herself. One of the first things the reader notes is her determinism to give the wild child a chance in society, and then, after the wild child's tragic and sudden death, give her a proper funeral. After being denied the opportunity by the authorities, the reaction from Meridian and other students was devastating. "The students sang through tears that slipped like melting pellets of sleet down their grieved and angered cheeks: ?We shall overcome...'" (Walker, 48) Meridian becomes actively involved in the civil rights movement, although she must conceal this from the university. She successfully encourages others to join the movement, and they go from door to door trying to convince others to have the courage to vote. After becoming aquainted with Truman Held, Meridian soon falls in love with him. This relationship ends disappointingly for Meridian, but it provides another excellent example of her prowess. She is able to go on despite the loss of her child, her lover, and her friend Anne-Marion, who was intent on convincing Meridian to be willing to "kill for the revolution" (Walker, 27). This is when the reader sees Meridian move into her next stage of life after overcoming severe illness at college. Meridian is alone. Truman has married Lynne, a white woman, Anne-Marion has forsaken her, and Meridian is just beginning to think about her views and beliefs from her perspective. She lives and works in the South, but she is frail and often suffers from paralysis. Although struggling with her own identity, she still acts as a servant and a saint among her people. For example, when black people were not allowed to swim in the public swimming pool, the mayor refused to build them one of their own. After several children drowned in floods while swimming in ditches that served as makeshift pools, the city officials were taught a lesson by Meridian. "It was Meridian who had led them to the mayor's office, bearing in her arms the bloated figure of a five-year-old boy who had been stuck in the sewer for two days before he was raked out with a grappling hook." (Walker, 191) Meridian also acts as a mediator, ironically, between Truman and his wife Lynne. She remains friends with both of them despite the pain that they once caused her. Throughout the novel, Meridian provides the reader with examples of her resistance to racial suppression and segregation and prejudice. Alice Walker, like her character Meridian, suffered many hardships in her life. One can see the similarities in the real person and the fictional character. Her mother suffered from numerous strokes, her partner cheated on her and
Tuesday, November 26, 2019
Describe and Evaluate Two Approaches to the Treatment of Self-Defeating Behaviour Essays
Describe and Evaluate Two Approaches to the Treatment of Self-Defeating Behaviour Essays Describe and Evaluate Two Approaches to the Treatment of Self-Defeating Behaviour Essay Describe and Evaluate Two Approaches to the Treatment of Self-Defeating Behaviour Essay Word count ââ¬â 2553 Describe and evaluate two approaches to the treatment of self-defeating behaviour. Module Five Jane Ovington May 2012 Jane Ovington Chrysalis North2A Tutor , Steven Lucas, page 1 of 9 Introduction This essay aims to describe and evaluate two approaches to the treatment of self defeating behaviour. To do this I am using the description of Anorexia Nervosa as a self defeating behaviour, one which has far reaching consequences. I will include possible origins, causes and maintenance of Anorexia and describe two of many ways in which a therapist may help with this condition whilst weighing up the strengths and weaknesses of each. Main essay What is self defeating behaviour? Self defeating behaviour could be described as behaviour that when compared to other possible courses of action, it is never the best possible action for that individual. A self defeating behaviour will at some point have been used successfully as a coping strategy to get through a difficult situation. This course of action is then stored in the subconscious by that individual as something that ââ¬Ëworkedââ¬â¢ and therefore the behaviour will be re-produced again in times of perceived trouble. The self defeating behaviour will by its very nature actually serve to ensure that the fear or consequence that the person is trying to avoid will in fact come to pass. (Chrysalis Year 2 Module5) What is Anorexia? Anorexia is an eating disorder whose main feature is excessive weight loss and obsessive exercise. A very low weight is achieved which is then maintained abnormally low for the patients age and height. The sufferer develops an intense desire to be thinner and an intense fear of becoming fat. Their body image becomes completely distorted and their body weight and shape become the main or even sole measure of self worth as maintaining an extremely low weight becomes equated with beauty, success, self-esteem, and self-control. It is not seen as a problem by the sufferer. Jane Ovington Chrysalis North2A Tutor , Steven Lucas, page 2 of 9 Contrary to popular belief this psychological and physical condition is not usually about food. It is a self defeating behaviour used as a way of taking control and trying to make life better and is accompanied by a variety of changes in behaviour, emotions, thinking, perceptions, and social interactions. The name Anorexia nervosa is somewhat misleading as it literally means nervous loss of appetite. However, for people with this disorder all waking thoughts are dominated by food, weight, and body image and incredible levels of self control are used to fight feelings of intense hunger. http://ehealthmd. com/content/what-anorexia-nervosa) Approximately 95% of those affected by anorexia are female and most often teenage girls. Higher incidence of anorexia is often seen in environments where thinness is deemed to be especially desirable or a professional requirement, such as athletes, models, dancers, and actors. In order to enter the state of Anorexia Nervosa, a person must lose weigh t. The majority set out to do so deliberately because rightly or wrongly they feel that they are too fat. For most people, dieting to lose weight is a struggle. Most dieters cheat or give up before they lose all the weight which they had intended to shed and for those who do reach their intended weight there is a measure of satisfaction and re-education of eating habits which allow them to maintain a healthy weight. In contrast, the soon to be anorexic finds slimming easy, rewarding and something they can be good at from the start, something they can control which brings feelings of success, power and triumph. The sense of satisfaction gained from the suppression of hunger and the level of self denial required to be successful is frequently reported by anorexic sufferers to be very empowering and so here we see how effective this behaviour may be viewed by the sufferer as a coping strategy. Jane Ovington Chrysalis North2A Tutor , Steven Lucas, page 3 of 9 My own experience of this condition was one that arose when my best friend died at the age of 17. I knew for many months prior to her death that death would almost certainly be the outcome of her condition. I felt ââ¬Ëout of controlââ¬â¢ there was nothing I could do to change the course of events. The one thing I could control however was what went into my mouth. This gave me a comforting sense of taking control of something. Something I turned out to be good at, something I could focus on to make all the other uncontrollable feelings subside. Once these feelings arise, a fear of losing control prevents the sufferer from resuming normal eating habits. Their experience is dominated by these feel good feelings of control and power but it is perceived by the sufferer to be precarious and vulnerable and therefore threatened by any behaviour that may cause unwanted weight gain. The sufferers preoccupation with maintaining this new postition begins to distort all other interests, concerns and relationships. In some cases the current position is never enough and weight loss progresses until it becomes life threatening. In most cases it seems that the anorexic starts out with similar behaviour and similar intention to the ordinary slimmer but something goes wrong and the slimming behaviour is inappropriately prolonged (My own experience). Ironically, while Anorexia starts out as a feeling of taking control, it rapidly descends into a fear of losing the control the sufferer perceives themselves to have taken. All the while the condition is actually controlling the sufferer. While the media definitely plays a role in how we view ourselves, anorexia is a way of coping with whatââ¬â¢s going on in a teenââ¬â¢s life. Stress, pain, anger, acceptance, confusion and fear can all become triggers for this debilitating eating disorder. The goal is one of trying to make their whole life better. Families can play a huge role. Some families are over protective and smothering which can create a need or rather a demand for independence. Jane Ovington Chrysalis North2A Tutor , Steven Lucas, page 4 of 9 Some families are critical of weight gain, academic or sporting accomplishments or are rigid and even abusive. Some younger people do not feel safe in their own homes, they donââ¬â¢t know where to turn or what to do and the need to find a way to deal with whatââ¬â¢s going on in their lives. Life transitions such as a break up, a divorce, death of a loved one, failure at school or at work are all stressful incidents that need to be dealt with. Genetic factors can also play its part in contributing anorexia in teenage girls occurs eight times more often in people who have relatives with the disorder. Anorexia ââ¬â a guide to sufferers and their families R. L Palmer 1980). My own Mother was grossly overweight at the time of my condition and I viewed her as someone who was completely out of control with no respect for herself. This was a very negative view, one which I could not see in myself at the other end of the spectrum! Effects on families and friends For parents and oth ers who are close to a person who is trapped inside the condition of anorexia, there can seem like there is no escape. It is difficult for them to understand and empathise with self destructive behaviours. It becomes extrememly distressing to see a loved one wasting away whilst refusing offers of food which seem such a tantalisingly simple solution to the problem. Feelings of helplesness and guilt set in, along with frustration, anger and despair. (Quote from my Mum from 1991). My Mother set about criticising my ââ¬Ëridiculous behaviourââ¬â¢ in a bid to scare me into eating this only served to make me more determined to empower myself with what had turned from self defeating behaviour into self destructive behaviour and ultimately formed a self defeating behaviour in my Mother. Jane Ovington Chrysalis North2A Tutor , Steven Lucas, page 5 of 9 Treatment The idea of being ââ¬Ëcuredââ¬â¢ of Anorexia by the sufferer is usually completely undesirable because what that ââ¬Ëcureââ¬â¢ implies is that they will eat more food, put on more weight and become fat, the very thing they are trying to avoid! Therefore, Anorexia has to be acknowledged as a problem by the sufferer before effective treatment can take place. Traditionaly the disorder is treated with a combination of individual psychotherapy and family therapy to look beyond the basic issue of food intake and address the emotional issues that underpin the disorder using a psychodynamic approach. Important ethical considerations It is important for therapists to consider that Anorexia Nervosa, although starts out as a self defeating behaviour, itââ¬â¢s consequences lead to many serious medical conditions which can range from malnutrition, loss of concentration and loss of periods to total organ failure and death. Therefore a therapist should never aim to treat the condition alone, but any psychological intervention to treat the underlying causes should take place alongside appropriate medical care. Any therapists working with an anorexic client would always need written medical consent and specialist supervision and should be experienced in this field of work. However, members of the sufferers family and close friends may also benefit from therapy to address any stress, anxiety and guilt surrounding the issue and in the absence of any other contraindications, medical consent for this group would not be necessary. The psychodynamic approach The psychodynamic approach will view the clients behaviour as being derived from some internal conflict, motive or unconscious force. Once it is discovered where this conflict began the therapist can set about working through those issues to a resolution. Jane Ovington Chrysalis North2A Tutor , Steven Lucas, page 6 of 9 Generally, it is believed that if behaviours are discontinued without addressing the underlying motives that are driving them, then a relapse will occur. During my battle with Anorexia, I was hospitalised and fed to increase my body weight. I ate willingly and was quickly considered cured and discharged from the hospital. However, I had deliberately manipulated the situation with the view that the sooner I could ââ¬Ëescapeââ¬â¢ the quicker I could get back on with the job. Taking control, to bring back the feel good feelings and the sense of empowerment that meant even more to me after having been ââ¬Ëoverpoweredââ¬â¢ in the hospital. Clearly this treatment was very ineffective. Later I sought help through a therapist who, using a psychodynamic approach, was able to take me back through the death of my friend and deal with the grief in an appropriate way. This eventually helped me to let go of controlling my food intake as a way of dealing with these suppressed emotions. Behavioural symptoms in the psychodynamic approach are viewed as expressions of the patients underlying needs. Often issues can disappear or lie dormant with the completion of working through these issues. However, a psychodynamic approach to anorexia is not all encompassing. During the recovery process, anorexics will frequently suffer from feelings of panic as they learn to lessen their control. As weight is gained, they will feel anxious much of the time and suffer from low self esteem or perhaps even feel that they are a bad person and have to become a people pleaser to make up for it. Anorexics are very often perfectionists and can be very harsh on themselves. All these things combined can make the process of recovery a very stressful, anxious and self deprecating experience (My own experience). A cognitive behavioural therapy approach may best meet the needs of a client feeling this way. Anorexics are often not fully aware of the initial cause of the condition and therapy may be a way to Jane Ovington Chrysalis North2A Tutor , Steven Lucas, page 7 of 9 lift the lid off of buried emotions to enable sufferers to deal with their underlying emotions. During the grip of the disorder the over-riding emotion felt is fear and this fear over rides the bodys natural wisdom around food and eating, the sufferer distrusts themselves and fears that their secret greedy self may emerge and they will lose control completely. The sufferer will hate their secret greedy self and cognitive behavioural therapy would be a valuable tool in rebuilding self trust, improving self esteem, and overcoming fear and anxiety that arises through the process of recovery. Cognitive behavioural therapy (CBT) is a time-limited and focused approach that helps a person understand how their thinking and negative self-talk and self-image can directly impact their eating and negative behaviours. CBT usually focuses on identifying and altering dysfunctional thought patterns, attitudes and beliefs that may perpetuate the sufferers restrictive eating. A researcher in the early 1980ââ¬â¢s by the name of Chris Fairburn developed a specific model of CBT to help in the treatment of Anorexia, using the traditional foundations of CBT therapy ââ¬â helping a person understand, identify and change their irrational thoughts (the ââ¬Ëcognitiveââ¬â¢ part) and helping a person make the changes real through specific behavioural interventions such as promoting healthy eating behaviours through rewards. (http://psychcentral. com/lib/2006/treatment-for-anorexia/all/1/) Strengths and weaknesses It is clear to see that both approaches are somewhat lacking and a multi-model approach should be taken to ensure success. The psychodynamic model will uncover the initial cause of the behaviour and addressing these issues will go a long way toward a successful outcome. However, it does not address the subsequent negative thought processes that keep the sufferer a prisoner within the condition. This is something that a CBT approach can successfully address but a CBT approach could fail to prevent a relapse if the underlying reasons for the negative self talk are not uncovered. Both treatments together will hold more strength in long term success, but neither seeks to address nutritional issues, food related symptoms or deep seated behavioural rituals of the eating disorder. Jane Ovington Chrysalis North2A Tutor , Steven Lucas, page 8 of 9 Summary Anorexia although initially can be viewed as a self defeating behaviour, is a complicated and mulit-faceted field and I would expect a consistent and long course of therapy that may focus on a psychodynamic approach alongside person centred counselling, alongside cognitive behavioural therapy, alongside appropriate medical intervention. Hypnotherapy may also be used to improve self esteem, reduce stress and anxiety, coping with panic and confidence building to help the sufferer relax levels of control and resume a more healthy relationship with themselves. As the anorexic begins to regain trust in themselves and their body, they can begin to feel back in control of their emotions and thoughts, thus lessening their levels of anxiety and helping toward a successful recovery. Ultimately, the pace of therapy has to be set by the client and the client has to admit to the problem in the first place before any type of therapy can begin. References: I personally suffered from this disorder from the ages of 17-21 and some of the information used has been based on my own experiences and that of my Parents. (Chrysalis Year 2 Module 5) R. L Palmer ââ¬â Anorexia Nervosa. A guide for sufferers and their families. Penguin Books 1980 (http://ehealthmd. com/content/what-anorexia-nervosa http://psychcentral. com/lib/2006/treatment-for-anorexia/all/1/) Jane Ovington Chrysalis North2A Tutor , Steven Lucas, page 9 of 9 any type of therapy can begin. has to be set by the client and the client has to admit to the problem in the first place before
Saturday, November 23, 2019
Roy Cohn, Lawyer Whose Attacks Made Him Famous, Feared
Roy Cohn, Lawyer Whose Attacks Made Him Famous, Feared Roy Cohn was a highly controversial attorney who became nationally famous while in his twenties, when he became a prominent aide of Senator Joseph McCarthy. Cohns highly publicized pursuit of suspected communists was marked by bravado and recklessnessà and he was widely criticized for unethical behavior. His stint working for McCarthys Senate committee in the early 1950s ended disastrously within 18 months, yet Cohn would remain a public figure as a lawyer in New York City until his death in 1986. As a litigator, Cohn reveled in his reputation for being extraordinarily belligerent. He represented a host of notorious clients, and his own ethical transgressions would result in his own eventual disbarment. Apart from his widely publicizedà legal battles, he made himself a fixture of gossip columns. He often appeared at society events and even becoming a regular patron at the classic 1970s celebrity hangout, the disco Studio 54. Rumors about Cohns sexuality circulated for years, and he always denied he was gay. When he became seriously ill in the 1980s, he denied having AIDS. His influence in American life persists. One of his most prominent clients, Donald Trump, is credited with adopting Cohns strategic advice to never admit a mistake, always staying on the attack, and always claiming victory in the press. Early Life Roy Marcus Cohn was born February 20, 1927, in the Bronx, New York. His father was a judge and his mother was a member of a wealthy and powerful family. As a child, Cohn exhibited unusual intelligence and he attended prestigious private schools. Cohn met a number of politically powerful people growing up, and he became obsessed with how deals were struck in New York City courthouses and law firm offices. According to one account, while still a high school student he helped a family friend obtain an FCC license to operate a radio station by arranging a kickback to an FCC official. He was also said to have fixed parking tickets for one of his high school teachers. After sailing through high school, Cohn managed to avoid being drafted at the end of World War II. He entered Columbia University, finishing early, and managed to graduate from Columbias law school at the age of 19. He had to wait until he turned 21 to become a member of the bar. As a young lawyer, Cohn worked as an assistant district attorney. He crafted a reputation as an investigator by exaggerating cases he worked on to obtain glowing press coverage. In 1951 he served on the team that prosecuted the Rosenberg spy case, and he later claimed to have influenced the judge to impose the death penalty on the convicted couple. Early Fame After gaining some fame through his connection to the Rosenberg case, Cohn began to work as an investigator for the federal government. Fixated on discovering subversives in America, Cohn, while working at the Justice Department in Washington, D.C. in 1952, tried to prosecute a professor at Johns Hopkins University, Owen Lattimore. Cohn alleged Lattimore had lied to investigators about having communist sympathies. At the beginning of 1953, Cohn got his big break. Senator Joseph McCarthy, who was at the height of his own search for communists in Washington, hired Cohn as chief counsel of the Senates Permanent Subcommittee on Investigations. As McCarthy continued his anti-communist crusade, Cohn was at his side, taunting and threatening witnesses. But Cohns personal obsession with a friend, wealthy Harvard graduate G. David Schine, soon created its own enormous controversy. When he joined McCarthys committee, Cohn brought along Schine, hiring him as an investigator. The two young men visited Europe together, ostensibly on official business to investigate potential subversive activities in American institutions overseas. When Schine was called up to active duty in the U.S. Army, Cohn began trying to pull strings to get him out of his military obligations. The tactics he learned in a Bronx courthouse did not play wellà in Washingtons corridors of power, and a gigantic confrontation erupted between McCarthys committee and the Army. The Army hired a Boston attorney, Joseph Welch, to defend it against attacks by McCarthy. In televised hearings, after a series of unethical insinuations by McCarthy, Welch delivered a rebuke which became legendary: Have you no sense of decency? The Army-McCarthy hearings exposed McCarthys recklessnessà and hastened the end of his career. Roy Cohns career in federal service was also ended amidst rumors about his relationship with David Schine. (Schine and Cohn were apparently not lovers, though Cohn seemed to have an obsessive admiration for Schine). Cohn returned to New York and began a private law practice. Decades of Controversy Becoming known as a ferocious litigator, Cohn enjoyed success not so much for brilliant legal strategy but for his ability to threaten and bully opponents. His opponents would often settle cases rather than risk the onslaught they knew Cohn would unleash. He represented wealthy people in divorce cases and mobsters being targeted by the federal government. During his legal career he was often criticized for ethical transgressions. All the while he would call gossip columnists and seek publicity for himself. He moved in society circles in New York, as rumors about his sexuality swirled. In 1973 he met Donald Trump at a Manhattan private club. At the time, the business run by Trumps father was being sued by the federal government for housing discrimination. Cohn was hired by the Trumps to fight the case, and he did so with his usual fireworks. Cohn called a press conference to announce that the Trumps would be suing the federal government for defamation. The lawsuit was merely a threat, but it set the tone for Cohns defense. Trumps company skirmished with the government before finally settling the lawsuit. The Trumps agreed to government terms which ensured they couldnt discriminate against minority tenants. But they were able to avoid admitting guilt. Decades later, Trump skirted questions about the case by proudly asserting that he had never admitted guilt. Cohns strategy of always counter-attacking and then, no matter the outcome, claiming victory in the press, made an impression on his client. According to an article in the New York Times on June, 20, 2016, during the presidential campaign, Trump absorbed important lessons:à Decades later, Mr. Cohnââ¬â¢s influence on Mr. Trump is unmistakable. Mr. Trumpââ¬â¢s wrecking ball of a presidential bid - the gleeful smearing of his opponents, the embracing of bluster as brand - has been a Roy Cohn number on a grand scale. Final Decline Cohn was prosecuted several times, and according to his obituary in the New York Times, he was acquitted three times in federal court on various charges including bribery, conspiracy, and fraud. Cohn always maintained he was the victim of vendettas by enemies ranging from Robert F. Kennedy to Robert Morgenthau, who served as Manhattans district attorney. His own legal problems did little to harm his own law practice. He represented celebrities and famous institutions, ranging from Mafia bosses Carmine Galante and Anthony Fat Tony Salerno to the Catholic Archdiocese of New York. At his 1983 birthday party, the New York Times reported attendees included Andy Warhol, Calvin Klein, former New York mayor Abraham Beame, and conservative activist Richard Viguerie. At social functions, Cohn would mingle with friends and acquaintances including Normal Mailer, Rupert Murdoch, William F. Buckley, Barbara Walters, and a variety of political figures. Cohn was active in conservative political circles. And it was through his association with Cohn that Donald Trump, during Ronald Reagans 1980 presidential campaign,à met Roger Stone and Paul Manafort, who later became political advisers to Trump as he ran for president. In the 1980s, Cohn was accused of defrauding clients by the New York State Bar. He was disbarred in June 1986.à By the time of his disbarment, Cohn was dying of AIDS, which at the time was considered a gay disease. He denied the diagnosis, claiming in newspaper interviews that he was suffering from liver cancer. He died at the National Institute of Health in Bethesda, Maryland, where he was being treated, on August 2, 1986. His obituary in the New York Times noted that his death certificate indicated that he had indeed died of AIDS related complications.
Thursday, November 21, 2019
Safety of pedestrians and bicycles Term Paper Example | Topics and Well Written Essays - 3500 words
Safety of pedestrians and bicycles - Term Paper Example Over the period of last 20 years, these countries have taken some major steps to ensure safety like better facilities, better urban planning and traffic education for all those who use the road, be it pedestrian, cyclist or motor driven. The implementation of road safety laws has played a key role in this statistic. Other countries may imply the very same rules and models applied in Europe to have a better safety record for the coming future where more highways and road networks will be established for all kinds of commuters (Pucher, 2000). Introduction In the modern era; where fast cars, busses and sub-ways swell our urban and sub-urban lifestyle, people still prefer simple means to travel which includes the earliest mode of travel which is ââ¬Å"walkingâ⬠and a the use of two-wheel un-powered vehicle known as the bicycle. This trend has recently increased, especially in the metro-cities due to the limitation of traveling in powered vehicles. Some of the problems include parki ng space, fuel cost and taxes. The increase in technology has made sure that a network of roads and highway is established due to the nature and speed requirements of the motorists. This very fact has made modern urban planners to think about the safety of pedestrians and cyclists traveling on the road; especially the ones which they share with high speed cars, busses and other engine driven vehicles. This report helps in understanding the very danger faced by pedestrians and the people saving fuel on bicycles. The safety precautions taken by states and other agencies involved in the welfare of people on the road, be it any mode of travel. The report gives an insight of the future of pedestrian and bicycle riders with respect to change in historical terms or accident avoidance and self education of the people using highways and roads. Trends in Walking and Cycling The 2009 National Household Travel Survey (NHTS) shows us that the trips taken on foot were around 11 percent of all the trips reported where as trips on bicycle were recorded to a bare 1 percent. This accounts for a total of 12 percent. Although these stats do not show a healthy sign, but in comparison to the stats in 2001, show n increase of 25 percent overall. The total number for commuters on foot has almost doubled from 18 billion in 1990 to 24.5 billion in 2009. A similar trend was noticed in the area of bikes, where the numbers rose from 1.7 billion to 4 billion in the same time frame. Still, the required numbers in ratio with the current population are not being met to reduce engine driven vehicle related issues on a daily basis (Clifton, 2004). The method of data collection for reaching these trends has also turned into an efficient system by replacing the old system. The use of telephone to carry out the survey was later replaced by recovering data from travel logs. The National Household Travel Survey included another key assessment for calculating the number of people walking or riding a bicycle in a prescribed time frame. The survey asked people about the number of
Tuesday, November 19, 2019
Website for Marketing Firm Research Proposal Example | Topics and Well Written Essays - 500 words
Website for Marketing Firm - Research Proposal Example Another advantage that online advertising has is its capability to reach a global audience at a fast rate. This enables extensive exposure of the products, brands or services being advertised, resulting to a high success rate (Online Advertising - Advantages and disadvantages 2005). With these facts, the creation of a website would definitely be a great help to promote a business at a very reasonable cost. Websites now reach a greater audience than the traditional advertising vehicles. Moreover, websites represent a kind of dynamism that makes the product or brand being advertised looking very competitive and updated. The purpose of this website is mainly to promote the Marketing Firm, its company profile and most importantly, its products and services to the market. It would be a user-friendly site, in which interested clients could browse through to search on needed information regarding their required service. It basically aims to capture its target market and eventually lead to sales.
Sunday, November 17, 2019
Malaysia Airline System Berhad Company Profile Essay Example for Free
Malaysia Airline System Berhad Company Profile Essay Malaysia Airlines is listed on the stock exchange of Bursa Malaysia under the name Malaysian Airline System Berhad. MAS had been suffered high losses over the years because of the fuel price increases and poor management. Malaysiaââ¬â¢s government overhauled the operations of the airline. Under Idris Jala who was appointed as the new CEO in 1 December 2005 leadership, Malaysia Airlines unveiled its Business Turnaround Plan (BTP) in February 2006 which highlighted low yield, and an inefficient network and low productivity. (Refer to Appendix II) 2. Corporate Objective To produce a strategic, timely creative campaign targeting TIMEââ¬â¢s readership of international travelers for Malaysian Airlines. (Refer to Appendix II) 3. Corporate Mission To provide air travel and transport service that rank among the best in terms of safety, comfort and punctuality. (Refer to Appendix II) 4. Corporate Vision An airline uniquely renowned for its personal touch, warmth and efficiency. (Refer to Appendix II) 5. Corporate Logo [pic] This logo designed by Mara Institute of Technology later known as Mara University of Technology was introduced on 15 October 1987, retaining he essence of the moon kite, with a sheared swept-back look for a more aerodynamic posture. The red and blue divides equally in the mid-spine to connote equilibrium. (Refer to Appendix II) 6. Board of Directors and Managers Datoââ¬â¢ Dr Munir Majid is chairman of Malaysia Airlines, chairman of PECD Berhad and Board of Saujana Resorts (M) Berhad.. He was born in Penang in 16 February. His earl y education was at St. Markââ¬â¢s Primary School in Butterworth and the Bukit Mertajam High School. After that, he continued his upper secondary education at the Royal Military College in Sungai Besi near Kuala Lumpur.
Thursday, November 14, 2019
A Place to Remember Essay -- Personal Narrative Descent Essays
A Place to Remember When I was sixteen years of age, my Gram, Aunt Jamie, and I went to Scotland. We visited many places, such as Edinburgh, Sterling, and Dumfries. We also visited Arundel, Windsor, and London in England. The most exciting part of our trip was when we went and saw the house my Grandad born in and the family house. As I looked at those houses, I felt like I was home, I had found the place I was supposed to be. All my life I have known who I was and where I was from, I am Scottish, my Grandad was born in Scotland, so in a way, I am from Scotland as well. The flight to London felt like it took forever, we were all so tired and just wanted to take a shower and go to bed, but we had to get off that plane and get on another going to Scotland. When we finally landed in Scotland, I couldnââ¬â¢t believe I was actually in a foreign country, I was so excited. The first thing I did when we landed in Scotland was to look through the window, of course what I saw were other airplanes and men running around getting luggage and showing planes to the terminal. After we got all of our luggage and the rental car, we walked outside, as I looked around, I could see so much green in the distance; so many different colors of green. I had never seen so much beauty in one place. The first night we were there, we got lost looking for the bed and breakfast we were staying at that night. We kept driving by it, but we couldnââ¬â¢t find a way to get to it so we kept driving right by it and then get lost looking for it again. After forty five minutes of looking for the bed and breakfast we finally found it. We were finally able to take showers and then we went out to dinner, we found this cute little pizza place where ... ...cause they all looked the same; they were all painted the same color. When we found it I just stood there in amazement, knowing that my Grandad who was also one of my best friends lived in that house that was right in front of me. I had always dreamed to go to Scotland to see my Grandadââ¬â¢s house, and when my dream came true, I was amazed. Knowing that I was where I felt I belonged, was the best feeling in the world. All of the scenery, the important places we saw, the beautiful buildings and animals, was a site I will never forget. Being Scottish used to just be cool to me knowing that my Grandad was born in Scotland and that I had Scottish blood in my veins. After I saw the house he was born in, it changed my viewpoints, I felt that Scotland was one of the most beautiful places I knew about, and being apart of that wasnââ¬â¢t something I should take lightly.
Tuesday, November 12, 2019
History of Worldcup
INTRODUCTION The FIFA World Cup, often simply the World Cup, is an international association football competition contested by the senior men's national teams of the members of Federation Internationale de Football Association (FIFA), the sport's global governing body. The championship has been awarded every four years since the inaugural tournament in 1930, except in 1942 and 1946 when it was not held because of the Second World War. The current champions are Spain, who won the 2010 tournament.The current format of the tournament involves 32 teams competing for the title at venues within the host nation(s) over a period of about a month; this phase is often called the World Cup Finals. A qualification phase, which currently takes place over the preceding three years, is used to determine which teams qualify for the tournament together with the host nation(s). The 19 World Cup tournaments have been won by eight different national teams. Brazil have won five times, and they are the on ly team to have played in every tournament.The other World Cup winners are Italy, with four titles; Germany, with three titles; Argentina and inaugural winners Uruguay, with two titles each; and England, France, and Spain, with one title each. The World Cup is the world's most widely viewed sporting event; an estimated 715. 1 million people watched the final match of the 2006 FIFA World Cup held in Germany. The next three World Cups will be hosted by Brazil in 2014, Russia in 2018, and Qatar in 2022. HISTORY DEVELOPMENT OF THE WORLD CUP | |The world's first international football match was a challenge match played in Glasgow in 1872 between Scotland and England, which ended in a 0ââ¬â0 draw. The first international tournament, the inaugural edition of the British Home Championship, took place in 1884. As football grew in popularity in other parts of the world at the turn of the 20th century, it was held as a demonstration sport with no medals awarded at the 1900 and 1904 Summer Olympics (however, the IOC has retroactively upgraded their status to official events), and at the 1906 Intercalated Games.After FIFA was founded in 1904, it tried to arrange an international football tournament between nations outside the Olympic framework in Switzerland in 1906. These were very early days for international football, and the official history of FIFA describes the competition as having been a failure. At the 1908 Summer Olympics in London, football became an official competition. Planned by The Football Association (FA), England's football governing body, the event was for amateur players only and was regarded suspiciously as a show rather than a competition.Great Britain (represented by the England national amateur football team) won the gold medals. They repeated the feat in 1912 in Stockholm. With the Olympic event continuing to be contested only between amateur teams, Sir Thomas Lipton organised the Sir Thomas Lipton Trophy tournament in Turin in 1909. The Lipto n tournament was a championship between individual clubs (not national teams) from different nations, each one of which represented an entire nation.The competition is sometimes described as The First World Cup, and featured the most prestigious professional club sides from Italy, Germany and Switzerland, but the FA of England refused to be associated with the competition and declined the offer to send a professional team. In 1914, FIFA agreed to recognise the Olympic tournament as a ââ¬Å"world football championship for amateursâ⬠, and took responsibility for managing the event. This paved the way for the world's first intercontinental football competition, at the 1920 Summer Olympics, contested by Egypt and thirteen European teams, and won by Belgium. 8] Uruguay won the next two Olympic football tournaments in 1924 and 1928. Those were also the first two open world championships, as 1924 was the start of FIFA's professional BEGINNING OF WORLD CUP Due to the success of the Ol ympic football tournaments, FIFA, with President Jules Rimet the driving force, again started looking at staging its own international tournament outside of the Olympics. On 28 May 1928, the FIFA Congress in Amsterdam decided to stage a world championship itself. 9] With Uruguay now two-time official football world champions and to celebrate their centenary of independence in 1930, FIFA named Uruguay as the host country of the inaugural World Cup tournament. The national associations of selected nations were invited to send a team, but the choice of Uruguay as a venue for the competition meant a long and costly trip across the Atlantic Ocean for European sides. Indeed, no European country pledged to send a team until two months before the start of the competition. Rimet eventually persuaded teams from Belgium, France, Romania, and Yugoslavia to make the trip.In total thirteen nations took part: seven from South America, four from Europe and two from North America. The first two Worl d Cup matches took place simultaneously on 13 July 1930, and were won by France and USA, who defeated Mexico 4ââ¬â1 and Belgium 3ââ¬â0 respectively. The first goal in World Cup history was scored by Lucien Laurent of France. In the final, Uruguay defeated Argentina 4ââ¬â2 in front of a crowd of 93,000 people in Montevideo, and in doing so became the first nation to win the World Cup. [11] World Cups before SECOND WORLD WARAfter the creation of the World Cup, the 1932 Summer Olympics, held in Los Angeles, did not plan to include football as part of the schedule due to the low popularity of the sport in the United States, as American football had been growing in popularity. FIFA and the IOC also disagreed over the status of amateur players, and so football was dropped from the Games. Olympic football returned at the 1936 Summer Olympics, but was now overshadowed by the more prestigious World Cup. The issues facing the early World Cup tournaments were the difficulties of in tercontinental travel, and war.Few South American teams were willing to travel to Europe for the 1934 and 1938 tournaments, with Brazil the only South American team to compete in both. The 1942 and 1946 competitions, which Nazi Germany and Brazil sought to host, were cancelled due to World War II and its aftermath. World Cups after SECOND WORLD WAR The 1950 World Cup, held in Brazil, was the first to include British participants. British teams withdrew from FIFA in 1920, partly out of unwillingness to play against the countries they had been at war with, and partly as a protest against foreign influence on football, but rejoined in 1946 following FIFA's invitation.The tournament also saw the return of 1930 champions Uruguay, who had boycotted the previous two World Cups. Uruguay won the tournament again after defeating the host nation Brazil, in the match called ââ¬Å"Maracanazoâ⬠(Portuguese: Maracanaco). In the tournaments between 1934 and 1978, 16 teams competed in each tou rnament, except in 1938, when Austria was absorbed into Germany after qualifying, leaving the tournament with 15 teams, and in 1950, when India, Scotland and Turkey withdrew, leaving the tournament with 13 teams. 16] Most of the participating nations were from Europe and South America, with a small minority from North America, Africa, Asia and Oceania. These teams were usually defeated easily by the European and South American teams. Until 1982, the only teams from outside Europe and South America to advance out of the first round were: USA, semi-finalists in 1930; Cuba, quarter-finalists in 1938; Korea DPR, quarter-finalists in 1966; and Mexico, quarter-finalists in 1970. The tournament was expanded to 24 teams in 1982,[17] and then to 32 in 1998,[18] also allowing more teams from Africa, Asia and North America to take part.Since then, teams from these regions have enjoyed more success, with several having reached the quarter-finals: Mexico, quarter-finalists in 1986; Cameroon, qua rter-finalists in 1990; Korea Republic, finishing in fourth place in 2002; Senegal, along with USA, both quarter-finalists in 2002; and Ghana as quarter-finalists in 2010. Nevertheless, European and South American teams continue to dominate, e. g. , the quarter-finalists in 1994, 1998 and 2006 were all from Europe or South America.Two hundred teams entered the 2002 FIFA World Cup qualification rounds; 198 nations attempted to qualify for the 2006 FIFA World Cup, while a record 204 countries entered qualification for the 2010 FIFA World Cup. [19] THE AWARDS AND TROPHY From 1930 to 1970, the Jules Rimet Trophy was awarded to the World Cup winner. It was originally simply known as the World Cup or Coupe du Monde, but in 1946 it was renamed after the FIFA president Jules Rimet who set up the first tournament. In 1970, Brazil's third victory in the tournament entitled them to keep the trophy permanently.However, the trophy was stolen in 1983, and has never been recovered, apparently melt ed down by the thieves. [23] After 1970, a new trophy, known as the FIFA World Cup Trophy, was designed. The experts of FIFA, coming from seven different countries, evaluated the 53 presented models, finally opting for the work of the Italian designer Silvio Gazzaniga. The new trophy is 36 cm (14. 2 in) high, made of solid 18 carat (75%) gold and weighs 6. 175 kg (13. 6 lb). The base contains two layers of semi-precious malachite while the bottom side of the trophy bears the engraved year and name of each FIFA World Cup winner since 1974.The description of the trophy by Gazzaniga was: ââ¬Å"The lines spring out from the base, rising in spirals, stretching out to receive the world. From the remarkable dynamic tensions of the compact body of the sculpture rise the figures of two athletes at the stirring moment of victory. ââ¬Å"[24] This new trophy is not awarded to the winning nation permanently. World Cup winners retain the trophy until the next tournament and are awarded a gold-p lated replica rather than the solid gold original. [25] At the present, all members (players, coaches, and managers) of the top three eams receive medals with an insignia of the World Cup Trophy; winners' (gold), runner-ups' (silver), and third-place (bronze). In the 2002 edition, fourth-place medals were awarded to hosts South Korea. Prior to the 1978 tournament, medals were only awarded to the eleven players on the pitch at the end of the final and the third-place match. In November 2007, FIFA announced that all members of World Cup-winning squads between 1930 and 1974 were to be retroactively awarded winners' medals. [26][27][28] Format AND STRUCTURE Since the second World Cup in 1934, qualifying tournaments have been held to thin the field for the final tournament. 29] They are held within the six FIFA continental zones (Africa, Asia, North and Central America and Caribbean, South America, Oceania, and Europe), overseen by their respective confederations. For each tournament, FI FA decides the number of places awarded to each of the continental zones beforehand, generally based on the relative strength of the confederations' teams. The qualification process can start as early as almost three years before the final tournament and last over a two-year period. The formats of the qualification tournaments differ between confederations.Usually, one or two places are awarded to winners of intercontinental play-offs. For example, the winner of the Oceanian zone and the fifth-placed team from the Asian zone entered a play-off for a spot in the 2010 World Cup. [30] From the 1938 World Cup onwards, host nations received automatic qualification to the final tournament. This right was also granted to the defending champions between 1938 and 2002, but was withdrawn from the 2006 FIFA World Cup onward, requiring the champions to qualify. Brazil, winners in 2002, were the first defending champions to play qualifying matches. [31]The current final tournament features 32 na tional teams competing over a month in the host nation(s). There are two stages: the group stage followed by the knockout stage. [32] In the group stage, teams compete within eight groups of four teams each. Eight teams are seeded, including the hosts, with the other seeded teams selected using a formula based on the FIFA World Rankings and/or performances in recent World Cups, and drawn to separate groups. [33] The other teams are assigned to different ââ¬Å"potsâ⬠, usually based on geographical criteria, and teams in each pot are drawn at random to the eight groups.Since 1998, constraints have been applied to the draw to ensure that no group contains more than two European teams or more than one team from any other confederation. [34] Each group plays a round-robin tournament, in which each team is scheduled for three matches against other teams in the same group. The last round of matches of each group is scheduled at the same time to preserve fairness among all four teams. [35] The top two teams from each group advance to the knockout stage. Points are used to rank the teams within a group.Since 1994, three points have been awarded for a win, one for a draw and none for a loss (before, winners received two points). THE HOSTS OF WORLD CUP Early World Cups were given to countries at meetings of FIFA's congress. The locations were controversial because South America and Europe were by far the two centres of strength in football and travel between them required three weeks by boat. The decision to hold the first World Cup in Uruguay, for example, led to only four European nations competing. [37] The next two World Cups were both held in Europe.The decision to hold the second of these in France was disputed, as the South American countries understood that the location would alternate between the two continents. Both Argentina and Uruguay thus boycotted the 1938 FIFA World Cup. [38] Since the 1958 FIFA World Cup, to avoid future boycotts or controversy, FI FA began a pattern of alternating the hosts between the Americas and Europe, which continued until the 1998 FIFA World Cup. The 2002 FIFA World Cup, hosted jointly by South Korea and Japan, was the first one held in Asia, and the only tournament with multiple hosts. 39] South Africa became the first African nation to host the World Cup in 2010. The 2014 FIFA World Cup will be hosted by Brazil, the first held in South America since 1978,[40] and will be the first occasion where consecutive World Cups are held outside Europe. The host country is now chosen in a vote by FIFA's Executive Committee. This is done under an exhaustive ballot system. The national football association of a country desiring to host the event receives a ââ¬Å"Hosting Agreementâ⬠from FIFA, which explains the steps and requirements that are expected from a strong bid.The bidding association also receives a form, the submission of which represents the official confirmation of the candidacy. After this, a FI FA designated group of inspectors visit the country to identify that the country meets the requirements needed to host the event and a report on the country is produced. The decision on who will host the World Cup is usually made six or seven years in advance of the tournament. However, there have been occasions where the hosts of multiple future tournaments were announced at the same time, as was the case for the 2018 and 2022 World Cups, which were awarded to Russia and Qatar respectively.For the 2010 and 2014 World Cups, the final tournament is rotated between confederations, allowing only countries from the chosen confederation (Africa in 2010, South America in 2014) to bid to host the tournament. The rotation policy was introduced after the controversy surrounding Germany's victory over South Africa in the vote to host the 2006 tournament. However, the policy of continental rotation will not continue beyond 2014, so any country, except those belonging to confederations that hos ted the two preceding tournaments, can apply as hosts for World Cups starting from 2018. 41] This is partly to avoid a similar scenario to the bidding process for the 2014 tournament, where Brazil was the only official bidder. Other nations have also been successful when hosting the tournament. Sweden (runners-up in 1958), Chile (third place in 1962), Korea Republic (fourth place in 2002), and Mexico (quarter-finals in 1970 and 1986) all have their best results when serving as hosts. So far, South Africa (2010) was the only host nation to fail to advance beyond the first round. Organisation and media coverageThe World Cup was first televised in 1954 and is now the most widely viewed and followed sporting event in the world, exceeding even the Olympic Games. The cumulative audience of all matches of the 2006 World Cup is estimated to be 26. 29 billion. [1] 715. 1 million individuals watched the final match of this tournament (a ninth of the entire population of the planet). The 2006 World Cup draw, which decided the distribution of teams into groups, was watched by 300 million viewers. [42] Each FIFA World Cup since 1966 has its own mascot or logo.World Cup Willie, the mascot for the 1966 competition, was the first World Cup mascot. [43] Recent World Cups have also featured official match balls specially designed for each World Cup. CONCLUSION To date, the final of the World Cup has only been contested by European and South American teams. European nations have won ten titles; South American teams have won nine. Only two teams from outside these two continents have ever reached the semi-finals of the competition: USA (North, Central America and Caribbean) in 1930 and Korea Republic (Asia) who reached the semis in 2002.The best result of an African team is reaching the quarter-finals: Cameroon in 1990, Senegal in 2002 and Ghana in 2010. Only one Oceanian qualifier, Australia in 2006, has advanced to the second round. [51] Brazil, Argentina, and Spain are the onl y teams to win a World Cup outside their continental confederation; Brazil came out victorious in Europe (1958), North America (1970 and 1994) and Asia (2002), Argentina won a North American World Cup in 1986, while Spain won the only African World Cup in 2010.Only on three occasions have consecutive World Cups been won by teams from the same continent ââ¬â Italy and Brazil successfully defended their titles in 1938 and 1962 respectively, while Spain's 2010 triumph followed Italy's in 2006. Among the national teams, Germany have played the most World Cup matches, with 99,[66] while Brazil have scored the most World Cup goals, with 210. [67] The two teams have played each other only once in the World Cup, in the 2002 final. RERENCESS
Saturday, November 9, 2019
The Ripple Effect of Smoking
The Ripple Effect of Smoking It has become common knowledge that smoking is bad for peopleââ¬â¢s health, nonetheless people continue to smoke. To be honest, that is fine. If people want to endanger themselves by smoking then I wish them a swift and peaceful end (though most smokers die a slow and agonizing death). What is not acceptable is the effect that smoke has on non-smokers who have almost no way of getting away from smoke unless they want to stay in their house. Smokers affect everyone around them for the worse. Smoking should be restricted or banned from all public places because the health of non-smokers should not be jeopardized by secondhand smoke. As stated before, almost everyone knows and accepts the fact that smoking is unhealthy. For those who donââ¬â¢t know, Phillip Morris, one of the leading tobacco manufacturers, must tell them that very fact. As part of a settlement agreement with the government, Philip Morris must publish that they ââ¬Å"agrees with the overwhelming medical and scientific consensus that cigarette smoking causes lung cancer, heart disease, emphysema (where the lungs basically break down), and other serious diseases inn smokersâ⬠(Philip Morris U. S. A. 1). Yet some donââ¬â¢t know how bad smoking actually is for people, both for the smokers and non-smokers alike. According to Michele Late, author for The Nationââ¬â¢s Health, published by the American Public Health Association, ââ¬Å"A new report by the U. S. urgeon general found that smoking causes disease in almost every organ of the human body. â⬠So aside from common knowledge that smoking causes lung cancer as well as other respiratory problems and diseases, people need to know that it also causes cancer in almost every other part of the body. Among those diseases are, ââ¬Å"leukemia, cataracts, and pneumonia as well as cancers of th e pancreas, cervix, and kidneysâ⬠(Late). According to the surgeon generalââ¬â¢s report, ââ¬Å"Other complications linked to smoking included diabetes complications, hip fractures and reproductive complicationsâ⬠(Late). Why anyone would want to smoke with the knowledge that smoking causes these problems is beyond reason. Ultimately though, it is a personââ¬â¢s choice as to whether they want to cause harm to themselves by smoking or not. Although people may choose to smoke, it is unfair of them to inflict the consequences of their choice upon others. The smoke that smokers put out into the air is nearly as harmful as what they take in to their own systems. When non- smokers happen to be in the vicinity of a smoker they inhale what the smoker puts out. This is called secondhand smoke. A definition from Philip Morris U. S. A. ââ¬â¢s website states that, ââ¬Å"Secondhand smoke, also known as environmental tobacco smoke or ETS, is a combination of the smoke coming from the lit end of a cigarette plus the smoke exhaled by a person smokingâ⬠(Philip Morris U. S. A2). Secondhand smoke is almost as harmful to the non-smoker as the firsthand smoke is to the smoker. According to William V. Corr, the executive director of Campaign for Tobacco-Free Kids, ââ¬Å"Secondhand smoke contains over 4,000 chemicals and 69 known carcinogens, including formaldehyde, cyanide, arsenic, carbon monoxide, methane, benzene, and radioactive polonium 210. With all these known cancer causing products in secondhand smoke, it is not surprising that, ââ¬Å"secondhand smoke is proven to cause lung cancer and serious respiratory illnessesâ⬠(Corr). Secondhand smoke also causes, ââ¬Å"asthma, respiratory infections, cough, wheeze, otitis media (middle ear infection) and Sudden Infant Death Syndrome,â⬠(Philip Mor ris U. S. A. 2) in children. According to Donna Halvorsen, writer for the Star Tribune in Minneapolis, ââ¬Å"The CDC (The Centers of Disease Control and Prevention) estimates that 3,000 nonsmokers die of lung cancer caused by secondhand smoke each year. An additional 35,000 die of heart disease also from secondhand smokeâ⬠¦Ã¢â¬ It is unfair to make those who choose not to smoke be damaged by the secondhand smoke of a smoker. What is the solution to this problem? The most effective solution is to ban smoking in all public places. If people who want to smoke then they can do so in the privacy of their own homes, where they can only hurt themselves and their loved ones. California has taken the first step by banning smoking in most indoor establishments. Yet more has to be done. It needs to be banned outdoors in public as well. Though the theory that outdoors smoke dissipates has some validity, if you are within 20 feet of a smoker, you are still affected. Other atmospheric conditions can cause you to be affected from farther away. There will be arguments against this solution, the main one being personal freedom. Opponents will say that their personal freedom to smoke is being violated. Though right now, smokers are violating millions of peopleââ¬â¢s rights. A non-smokerââ¬â¢s right to live in an uncontaminated and healthy environment is being violated by the smoker who chooses to engage in this repulsive habit. A non-smokerââ¬â¢s right to a longer, pain free life is being taken away by the diseases they get from inhaling secondhand smoke. This solution, though the most effective, is also the most extreme. Until we reach an ideal society where smoking is nonexistent, there are ways to help alleviate the problems posed by secondhand smoke. One is to have separate rooms in public places with high quality air filters. They have started doing this in airports. A new renovation is smokeless cigarettes. A U. S. company that makes this product is Longherb Health Products, Inc. According to them, ââ¬Å"This smokeless product, which consists of a menthol or cinnamon-flavored filter material ââ¬â like that used in a cigarette filter ââ¬â looks and feels like a cigarette, but contains no tobacco or nicotine, and does not burn. The smokers simply draw or inhale on Smoker's Option Cigarettes whenever they have the desire to smoke cigarettes. â⬠Unfortunately there is the problem that cigarettes are addictive. Some who are addicted to cigarettes need one every hour. An addiction causes physical pain when you donââ¬â¢t have your addictive substance. To help people quit there are many different solutions. They range from patches, to gum, to medication. Philip Morris U. S. A. has links on their website that can help you quit smoking, one being QuitAssistâ⠢. The information for quit assist was written by and is maintained by Cheryl K. Olson, Sc. D. of Harvard Medical School, as well as a review board. Secondhand smoke is a problem that must be dealt with. There are alternatives to smoking and ways to deal with secondhand smoke. Smoking must be banned or severely restricted in public for the well being of the multitudes of innocent non-smokers.
Thursday, November 7, 2019
Drug Awareness Essays
Drug Awareness Essays Drug Awareness Essay Drug Awareness Essay Drug abuse, also called substance abuse or chemical abuse, is a disorder that is characterized by a destructive pattern of using a substance that leads to significant problems or distress. It affects more than 7% of people at some point in their lives. Teens are increasingly engaging in prescription drug abuse, particularly narcotics (which are prescribed to relieve severe pain), and stimulant medications, which treat conditions like attention deficit disorder. What is drug addiction? Drug addiction, also called substance dependence or chemical dependency, is a disease that is characterized by a destructive pattern of drug abuse that leads to significant problems involving tolerance to or withdrawal from the substance, as well as other problems that use of the substance can cause for the sufferer, either socially or in terms of their work or school performance. More than 2. 6% of people suffer from drug addiction at some time in their life. The term dual diagnosis refers to the presence of both a drug-abuse or dependence issue in addition to a serious mental-health problem in an individual. Substance abuse or dependence unfortunately occurs quite commonly in people who also have severe mental illness. This is important given that people with a serious mental illness are far more at risk of engaging in violence, being incarcerated, or contracting infection with the human immunodeficiency virus (HIV). Individuals with dual diagnosis are also at higher risk of being noncompliant with treatment. Virtually any substance whose ingestion can result in a euphoric (high) feeling can be abused. While many are aware of the abuse of legal substances like alcohol or illegal drugs like marijuana (in most states) and cocaine, less well known is the fact that inhalants like household cleaners are some of the most commonly abused substances. The following are many of the drugs and types of drugs that are commonly abused. Cannabis: More commonly called marijuana, the scientific name for cannabis is tetrahydrocannabinol (THC). In addition to the negative effects the drug itself can produce (for example, infertility, paranoia, lack of motivation), the fact that it is commonly mixed (cut) with other substances so drug dealers can make more money selling the diluted substance or expose the user to more addictive drugs exposes the marijuana user to the dangers associated with those added substances. Examples of ingredients that marijuana is commonly cut with include baby powder, oregano, embalming fluid, PCP, opiates, and cocaine As these substances quell or depress the nervous system, they can cause death by respiratory arrest of the person who either uses these drugs in overdose or who mixes one or more of these drugs with another nervous system depressant drug .
Tuesday, November 5, 2019
Bhopal, India Poison Gas Leak Disaster, 1984
Bhopal, India Poison Gas Leak Disaster, 1984 During the night of December 2-3, 1984, a storage tank containing methyl isocyanate (MIC) at the Union Carbide pesticide plant leaked gas into the densely populated city of Bhopal, India. Killing an estimated 3,000 to 6,000 people, the Bhopal Gas Leak was one of the worst industrial accidents in history. Cutting Costs Union Carbide India, Ltd. built a pesticide plant in Bhopal, India in the late 1970s in an effort to produce pesticides locally to help increase production on local farms. However, sales of pesticide didnt materialize in the numbers hoped for and the plant was soon losing money. In 1979, the factory began to produce large amounts of the highly toxic methyl isocyanate (MIC), because it was a cheaper way to make the pesticide carbaryl. To also cut costs, training and maintenance in the factory were drastically cut back. Workers in the factory complained about the dangerous conditions and warned of possible disasters, but management did not take any action. The Storage Tank Heats Up On the night of December 2-3, 1984, something began to go wrong in storage tank E610, which contained 40 tons of MIC. Water leaked into the tank which caused the MIC to heat up. Some sources say that water leaked into the tank during routine cleaning of a pipe but that the safety valves inside the pipe were faulty. The Union Carbide company claims that a saboteur placed the water inside the tank, although there has never been proof of this. It is also considered possible that once the tank began to overheat, workers threw water on the tank, not realizing they were adding to the problem. The Deadly Gas Leak By 12:15 a.m. on the morning of December 3, 1984, MIC fumes were leaking out of the storage tank. Although there should have been six safety features that would have either prevented the leak or contained it, all six did not work properly that night. It is estimated that 27 tons of MIC gas escaped out of the container and spread across the densely populated city of Bhopal, India, which had a population of approximately 900,000 people. Although a warning siren was turned on, it was quickly turned off again so as to not cause panic. Most residents of Bhopal were sleeping when the gas began to leak. Many woke up only because they heard their children coughing or found themselves choking on the fumes. As people jumped up from their beds, they felt their eyes and throat burning. Some choked on their own bile. Others fell to the ground in contortions of pain. People ran and ran, but they did not know in which direction to go. Families were split up in the confusion. Many people fell to the ground unconscious and were then trampled upon. The Death Toll Estimates of the death toll vary greatly. Most sources say at least 3,000 people died from immediate exposure to the gas, while higher estimates go up to 8,000. In the two decades following the night of the disaster, approximately 20,000 additional people have died from the damage they received from the gas. Another 120,000 people live daily with the effects of the gas, including blindness, extreme shortness of breath, cancers, birth deformities, and early onset of menopause. Chemicals from the pesticide plant and from the leak have infiltrated the water system and the soil near the old factory and thus continue to cause poisoning in the people who live near it. The Man Responsible Just three days after the disaster, the chairman of Union Carbide, Warren Anderson, was arrested. When he was released on bail, he fled the country. Although his whereabouts were unknown for many years, recently he was found living in the Hamptons in New York. Extradition procedures have not started because of political issues. Anderson continues to be wanted in India for culpable homicide for his role in the Bhopal disaster. The Company Says They Are Not to Blame One of the worst parts of this tragedy is actually what has happened in the years following that fateful night in 1984. Although Union Carbide has paid some restitution to the victims, the company claims they are not liable for any damages because they blame a saboteur for the disaster and claim that the factory was in good working order before the gas leak. The victims of the Bhopal gas leak have received very little money. Many of the victims continue to live in ill health and are unable to work.
Sunday, November 3, 2019
Law HW week 4 AM Essay Example | Topics and Well Written Essays - 250 words
Law HW week 4 AM - Essay Example It is important that every society is economically stable as this will facilitate the circulation of revenue and other economic advances. Acquiring the property and utilizing it in a manner that promises economic benefits for those who dwell in and around it is, as a result, constitutional. It does not violate the takings clause found in the fifth amendment of the constitution. Revitalizing the economy of the distressed city will serve to benefit the greater public in aspects such as the provision of jobs and taxes for the city government as well as improving the general welfare of the people. The Fifth Amendment law recognizes the acquisition and utilization of property if it promises to benefit the public in such a manner. The law also recognizes the importance that the property bears to their owners and, for this reason, asserts that the urban authority should give them a just compensation. The assurance that seizure of the property by the City of New England will result in many benefits for the public renders the urban authorityââ¬â¢s invocation of the power of eminent domain
Thursday, October 31, 2019
IHRM(international human resource management) Essay
IHRM(international human resource management) - Essay Example The following sections will deliberate on Volvoââ¬â¢s strategies of maintaining competitive advantage in the Curitiba market. Resources and capabilities that Volvo can obtain from Curitiba It is apparent that for any organisation to develop and maintain competitive advantage, just like Aaker and McLoughlin 2007 stipulated, some concepts of working towards attaining organisationââ¬â¢s goals should be articulated upon. Curitiba, being a region of congested traffic, has been a potential market for Volvo. This is arguably true because, as contingency theory stipulates, the environment in which an organisation operates involves articulation of factors such as size and technology among many other factors (Hooley, Piercy and Nicoulaud 2008). In this regard, it is evident that Volvo has strategized on gaining competitive advantage in the Curitiba market. The fact that Curitiba is traffic congested makes it a strategic market for Curitiba to operate in. in essence, Volvo specialises on providing the buses for public transport. Analytically, this is in line with strategically operating in an environment that can provide market for its automobiles. Basically, the primary goal of any organisation is to enter into a market that has demand for its products, thus offering an opportunity to make profits (Martin 2013). Nevertheless, it is indispensable of the management of organisations to apply principles of leadership and management in order to make the right decisions when entering new markets. In another dimension, Volvo must have considered the issue of corporate social responsibility. In any metropolitan area, organisations should focus on applying both economic and corporate social responsibilities in order to be successful. For example, before entering into the Curitiba market, Volvo was aware of the need to formulate a strategy that would bring growth in this region. For example, in the process of providing buses for public transport, Volvo has simultaneously cre ated jobs for many residents in the city. The CSR issues involve bringing in social and responsibility factors into action (Piercy 2009). When people get jobs through Volvoââ¬â¢s involvement in the public transport, their lives get uplifted, thus bringing the overall growth of the city. In addition, Volvo has been able to create its own organisational culture, through which its competitive advantage has been developed and maintained in Curitiba. Volvoââ¬â¢s organisational culture has been a reflection of its vision statement. However, organisationââ¬â¢s culture is developed strategically by its leaders and managers. It is the reflection of what the leaders and managers believes in and work towards realising their goals (Ranchhod and Gurau 2007). In order for Volvo to have managed to capture the Curitiba market, it is apparent that the management has developed a culture that keeps the company growing and surviving in a highly competitive market. For this to happen, the leade rship of the organisation should be well conversant with how to both manage the workforce and focus on customer satisfaction. Studies have document that forms that empowers their employees through various employees wellness and reward programs tend to have a smooth organisational culture development. Therefore, the human resource department must have a grasp of how it can motivate its employees in order to deliver top results. In regard to Volvoââ¬â¢s case, its workforce could be termed as proficient
Tuesday, October 29, 2019
Project Managment Scheduling queastion Essay Example | Topics and Well Written Essays - 2000 words
Project Managment Scheduling queastion - Essay Example The expected time for an activity represents the average time it would take if the activity is performed over and over again. It is known empirically that the probability density function of activity duration closely follows a Beta distribution, which defines the following relationship (Heldman & Baca, 267) Standard Deviation is used for calculating the variability associated with the high degree of uncertainty in estimated time durations. The standard deviation is represented by sigma symbol ââ¬ËÃÆ'ââ¬â¢ and is calculated as The time analysis elements such as the forward pass (Early Start time ES and Early Finish time EF) and the Backward Pass (Late Start time LS and Late Finish time LF) are used to find the Critical Path. These times are calculated using the Expected Time (te) for the respective activity relative to the zero date (date when the project clock starts ticking) of the project. The Backward Pass Late Start (LS) and Late Finish (LF) values are calculated considering that the earliest completion time of the project for the last activity and then working backwards towards the predecessors. For all the last activities, the LF will be equal to the respective EF value. Therefore, values of LF for the activities O, N, M, I and C are equal to the respective values of EF. The Critical Path can be determined by finding the Total Slack for each activity. Total Slack for any activity is the maximum time by which the start of an activity can be delayed without affecting the critical path. The path with the longest Expected time duration is the critical path. Activities on the critical path have slack as 0, since these activities cannot be delayed at all. Each path from the Start to the Finish node is defined along with the respective time duration. The Expected Completion Time (Et) for each path is equal to the expected duration of the constituent activities. For Example, A-E-H-K-I is calculated
Sunday, October 27, 2019
Card Security For Republic Bank Customers
Card Security For Republic Bank Customers There is no doubt that most organisations today are becoming essentially dependant on the use of credit cards, arguably its most strategic asset, is to support existing business operations. However, credit card fraud and identity theft has continued to plague the banking and retail industries as there seems to be no feasible solution to these crimes. Advances in technology have opened a gateway for hackers to restructure their position of attack, intruding on ones personal life. The basis of this project is on the new Chip and PIN technology introduced on credit cards. Ive considered this to be an interesting topic because of the publicity this technology has been receiving across the world and it has even reached to our shores, here in Trinidad and Tobago. Hence, Republic Bank Limited one of the local banks would be the case studied in this research. Chapter two would encompass the existing literature on credit card history and Chip and PIN. This chapter would outline how credit cards have become smart cards and how the Chip and PIN cards are used. Chapter three gives the entire design of the project and the objectives to be obtained for the research. Moving to chapter four, the research framework adopted for this study on Chip and PIN and how it relates to the model undertaken in the research. The findings from this research would be summarized version of the data collected, with the analysis of the theory and research framework the author undertook in this study. In concluding, the author would report on the learning aspects of the research and provide an assessment of achievements, giving a position on the research question. Literature REVIEW This section is intended to place the scope of the project with literature surrounding the components of the research question. The Credit Card Transaction Process Discussed This payment mechanism was formally introduced in 1958, when the BankAmericard card, now known as Visa was franchised across the global community. By introducing an electronic authorization system, the BankAmericard was able to be used globally. Now by partnering with banks across the globe, Visa has been able to provide an international processing system for the exchange of money. The workings of a credit card transaction are such that it comprises of four main steps. These are: Authorization Batching Clearing Funding The cardholder requests a purchase from the merchant, which is then submitted to the acquirer by the merchant. The acquirer then sends a request to the issuer to authorize the transaction. Once the authorization code is sent to the acquirer verifying that credit is available, the transaction is authorized and the cardholder receives the product. (This is further explained in detail on page 9 of this document) This simple process of electronic transacting has opened up a world of e-commerce opportunities. From an information system perspective the processing workflow of an online credit card transaction is shown below: Figure 1: Online Credit Card Processing Workflow Diagram (Hubbard, 2003) Because of the vulnerabilities that lay in a transaction, more so the networks across which the information is exchanged, various security breaches can occur. Types of Credit Card Fraud There are many different types of credit card fraud. Fraudsters are very innovative in finding new ways of committing credit card crime and as technology changes so does their crime tactics. Security issues surrounding the card fraud has moved from the traditional ways of committing credit card crime (Application Fraud, Intercept Fraud and Lost/Stolen Card Fraud) to the modern techniques namely, Skimming, Site Cloning and most recently Triangulation. Skimming is the fastest growing type of credit card fraud around because of its simplicity. Pocket Skimming devices can be easily carried around and the cardholders data can be obtained by merely swiping the card through the battery-operated magnetic card reader. This technology has also evolved so as to read the data of Chip and PIN cards, with the use of a scanner. These scanners, which can write or even re-write the data on the Chip cards, are fully portable and have high storage capacities. Because some of these devices are not illegal, they are easily accessible to hackers and can be bought over the internet. Site Cloning involves cloning an entire site or just the pages where customers make purchases. Since the web pages are identical customers are not aware that their personal information is being compromised. Also, confirmation details are sent to the customer just as the official companys website would, so the crime goes undetected. The details entered on the cloned site are then used by the fraudster to commit credit card fraud. Another method of credit card fraud is Triangulation. Goods are presented on websites at discounted prices, which can be shipped to the customer before payment. Again, just as with site cloning, the site appears to be legitimate then the customer proceeds to enter their personal data. With this captured information the fraudster can then order goods from legitimate retail websites using the credit card number obtained. Due to these security issues surrounding credit card information security, there has been global industry-wide concern for the protection of cardholders data. Since security management is a systematic issue, a serious look at what can be done to prevent security breaches is necessary-whether it may be legislation, the use of fraud detection system monitors or the application of data encryption/ authentication techniques. Chip and PIN Technology Credit cards have been a feasible solution for making payment processing simple and efficient. The history of the credit card dates back to the 1900s when oil companies and proprietors created their own credit card as a means of obtaining customer loyalty and improving customer service. However, as with advances in technology, the credit cards have evolved from having just encoded magnetic stripes to modern day Chip and PIN cards, with embedded microchips, which can store and transmit data. These Chip and PIN cards were developed to provide an inter-operative system that would combat card fraud (counterfeit and plastic cards). This transaction processing infrastructure has enabled the cash-less revolution, whereby consumers, governments and businesses benefit from the electronic payment network, which has shifted payments by cash and cheques to an efficient electronic payment system. The mechanics of a credit card transaction is such that the merchant acquirer, usually the bank processes transactions on behalf of the merchant. This payment by credit card represents an offer for issuance of payment in exchange for the goods or services provided by the merchant, (Transaction Processing). There are two parts to this type of transaction processing: the first is front end processing which involves the capture of data messages across communication channels to the point of sale devices; and secondly the back end processing which involves the balancing of accounting information by acquirers and issuers and the submission of the payment to the acquiring merchants bank. As a result of the rapid advances in technology, data security continues to be a major concern as every transaction that involves the transmission data across networks is open to external attacks. Attacks on a consumers card information can come from any angle, whether it may be data thieves or network intruders. The Payment Card Industry Security Standards Council (PCI SSC), which comprises of major payment brands namely VISA, MasterCard, Discover and a few others, have created global compliance standards to protect cardholders data. These set of standards help govern and educate all merchants and organisations that process, store and transmit data, as well as the manufactures of the devices used in transaction processing. The PCI SSC (2010), Data Security Standard Quick Reference Guide, as summarized below, outlines the best practices for protecting cardholder data: Develop and Maintain a Secure Network Install and maintain firewall configuration to protect cardholders data. Do not use vendor-supplied defaults for system passwords or other security parameters. Protect cardholders data Protect stored data Encrypt transmission of cardholders data across open public networks Maintain a vulnerability management program Use and regularly update anti-virus software or programs Develop and maintain secure systems and applications Implement strong access control measures Restrict access to cardholder data by business need to know Assign a unique ID to persons with computer access Restrict physical access to cardholder data Regularly monitor and test networks Track and monitor all access to network resources and cardholder data Regularly test security systems and resources Maintain an information security policy Maintain a policy that address information security for all personnel Nevertheless, despite these procedures in place, there has been amplified instances of the various types of credit card fraud, namely Intercept Fraud, Skimming, Site Cloning as well as Triangulation. This propelled an industry and governmentà ¢Ã¢â ¬Ã¢â¬Å"led initiative in the UK to embark on the introduction of Chip and PIN card technology. Based on the EMV standard (Euro pay, MasterCard, Visa) Chip and PIN technology was launched in the UK on February 14th 2006. This programme was introduced to combat credit and debit card fraud, and to provide an ideal way of validating the cardholders identity. By utilizing smart card technology a microchip is embedded with the customers information which includes their unique four digit PIN. For transactions to be accepted, the customer PIN entered must match the one encoded on the microchip. These steps are further explained below: The card is inserted by the customer into the card reader. The card reader would then prompt the user to insert their PIN. A four-digit PIN is then entered by the customer. Once the reader accepts the PIN entered the transaction would be approved. Note the PIN entered is not displayed on the reader but rather represented by asterisks. The customer is issued a receipt as confirmation of the transaction process. This process removes the responsibility and accountability from the merchant to the customer for point of sale transactions. The card never leaves the customers hand and as such prevents skimming of ones card information. One of the benefits of the Chip and PIN cards is that the Chip itself is encrypted with a range of security features, which the transaction processing system uses to identify the cardholder. These security features are said to be virtually impossible to replicate. The terminals used for Chip and PIN transactions, use secure transmission technology to ensure the privacy of the cardholders data and can operate over a range of connectivity environments, such as wired, wireless and cellular networks. The PCI Security Standards Council also developed a framework of standards which is legally enforced through a merchant/service provider/card brand agreement. These include requirements that support the encryption of the cardholders account data and the point of sale terminal integration. Figure 2: Outline of the process of a Chip and PIN transaction The PIN entered replaces the request for signature as verification of the transaction. This is why the banking industry in the UK has campaigned for this technology, because signatures can be forged, however the PIN is unique to that person. Although the United States is yet to convert to this technology, countries such as Japan, China, Canada, Mexico as well as the majority of the European Countries have all introduced Chip and PIN technology and it is gaining momentum in various other countries including Trinidad and Tobago. Republic Bank Trinidad and Tobago Limited is the first local bank in Trinidad and Tobago to introduce Chip and PIN technology to make the concept of paying by credit card safer for cardholders. The bank adopted this type of technology because this is now an industry-wide conversion from the magnetic-stripe cards and it is also in keeping with the EMV standard. Conversely, a potential security issue with Chip and PIN card terminals is its capability of processing cards with the magnetic stripe as well. Because of this the request to enter the customers PIN can be bypassed by the merchant, with a receipt generated to be signed by the customer. Now because this option is still available it poses an added security threat to card transactions. So, unfortunately skimming still remains a huge problem for cardholders and sadly enough this includes Chip and PIN cardholders as well. Although this practice is slowly migrating from EMV compliant countries, once a card has been skimmed it can still be used in countries where the magnetic stripe is still prevalent, for example some Asian Countries and the United States. This is why many fraudsters can still create a fake card with stolen magnetic stripe information which can be used in for example the United States. The United States believes that although Chip and PIN has reduced fraud for face to face card transactions, there are a still a number of issues surrounding the security of the system used for this these transactions. Now as with any new system introduced, there have been a number of studies on whether Chip and PIN cards are really secure. So the question is has Chip and PIN technology impacted on the activities of overall card fraud or has the activities of fraudsters shifted from retail crime. In a study by Emily Finch (2010) The Impact of Chip and Pin Technology and The Activities of Fraudsters, it was recognised that since the implementation of Chip and PIN technology participants involved in card fraud made varying decisions when it came to their crime of choice. The Decision to Desist The Decision to Continue To work with others Shift to Distance Transactions Diversification of Theft into Identity The study also shows that there is a shift in the attack strategy of fraudsters from point of sale card fraud to Internet and Card Identity Fraud. In an analysis of Internet and Card Identity Fraud, we can note that Chip and PIN technology was not designed for preventing these types of card fraud. So, the question remains, was Chip and PIN successful at what it was set out to achievereduce card fraud? This too can be argued further as there are other limitations. How can one link a particular card to a specific owner? Once the PIN is known by the individual a transaction can be completed with ease. Other studies have shown that the card readers used for Chip and PIN transactions can be modified. In a study by a team of University of Cambridge Computer Scientists, they have uncovered a series of fatal flaws in the Chip and PIN system. One example is where the internal hardware can be replaced without external evidence of this. This new terminal could then be programmed and modified so that it performs just as a typical terminal, where the card details can be collected and allow criminals to make cards with a fake magnetic stripe, which along with the PIN would enable a fraudster to make valid purchases. Another example is that fraudsters can insert an electronic wedge between the stolen card and the terminal, which tricks the terminal into believing that the PIN was correctly verified. Further, with this wedge inserted, any PIN can be entered and the transaction would be verified. This type of fraud makes it difficult for the victims of the attack to be refunded by the bank as the receipt given is authentic and would state verified by PIN. The bank in turn would be accurate in stating that no refund is required as their records show verified by PIN. This type of complaint appears as an act of negligence by the cardholder as he/she allowed their PIN to be compromised. So based on this study the point of sale attacks are much more prevalent, since before the introduction of Chip and PIN cards, consumers only entered their PIN at ATMs. Now with the introduction of Chip and PIN, consumers are using their cards at various other public areas. To combat the compromising of the consumers PIN a shield over the keypad has been used as added security but in many public areas there are video cameras and a persons PIN can still be captured on footage. So, although the UK banking industry has claimed to have rolled out this new technology successfully in 2006, there seems to be some negative aspects of this technology. The architecture surrounding Chip and PIN technology is questionable and the onus is on the banking industry to ensure that cardholders information is protected. Additionally, it also seems that Chip and PIN terminals offer no difference to what the magnetic stripe terminals offered. These terminals can be tampered with, which is a clear indication that there needs to be accurate configuration of these terminals so as to secure the cardholders data when transmitting transactions and that is not vulnerable to incident of attack. So the intent of Chip and PIN technology has more so opened a new marketplace for fraudsters than prevent/reduce fraudulent activity. PROJECT DESIGN, OBJECTIVES AND RESEARCH METHODS The scope of this project is to outline the features of Chip and PIN technology and whether its implementation thus far has been beneficial. This section of the project would provide the methods involved in achieving the data for the project as well as the results based on the data collected. The chosen approach to this design is online research (journals/scholarly articles) along with a case study on the implementation of Chip and PIN technology in Trinidad and Tobago, with the case being Republic Bank Limited. Objective 1 A good foundation for this objective would be the interpretation of the credit cards history. How has this cash-less mechanism moved from a local innovation to a global payment mechanism by use of digital communication across networks? In gaining a clear understanding on the reason for the implementation of this technology, a wealth of research would be conducted on credit card technology and digital security. Objective 2 A holistic understanding on the basis of credit card fraud and the types of fraudulent activities and the steps taken to prevent credit card crime. What technologies have been implemented and the effects/benefits drawn from these approaches. Objective 3 Expanding from objective two also discussed would be whether or not since the introduction of Chip and PIN technology in the UK, has there been a cascading effect of this new technology across countries. Analysing the increasing number of fraudulent activities reported from statistics, which compelled the global banking industry to find a seamless solution for the protection of cardholders data. Objective 4 An assessment on the introduction of Chip and PIN technology by Republic Bank Limited, which would include sourcing information on its implementation and the benefits derived. Further research would be on the acceptance (or non-acceptance) of the technology by customers. Objective 5 Lastly, from the feedback received from the interview conducted and by analysing the incidents of attack on Republic Bank credit cardholders, what was the determining factor in the bank aligning themselves with the UK standards set by EMV? CONCEPTUAL FRAMEWORK In identifying the framework to be adopted that can be referenced to the literature in this research, the author considered the Delone and Mc Lean IS Success Model. Using this model, the author would explain the net benefits of adopting Chip and PIN technology, relating it to Republic Banks implementation of this technology. DeLeone and McLean IS Success Model In evaluating the success of Information Systems, the DM IS Success Model, systems quality measures the technical success, information quality measures semantic success and organisational impacts and user satisfaction measures the effectiveness of the system. The processes in the model are inter-connected by links, across the dimensions of the system. Figure 3: Depiction of the Updated Information Systems Success Model (DeLeone McLean 2002, 2003) The updated DM Model interprets the evaluation of a system in terms of the information, system, and service qualities and how these characteristics attribute to user satisfaction. As a result of using the system, certain benefits will be achieved and the net benefits will in turn (positively or negatively) influence user satisfaction and the further use of the information system. So, therefore three basic components make up this model, the creation of a system, its use and the consequences of its use. Case study as it relates to the ISS model. Republic Bank has been providing banking and financial solutions to individuals and businesses for over 160 years. Their mission is not only to provide efficient and competitively priced services but also to implement sound policies which will be beneficial to their customers. These factors presented provide clarity and influences the net benefits of the implemented Chip and PIN system at Republic Bank thus far. By use of the ISS model to map the research done in this project, the author would complete a step by step relay of the framework discussing the implementation of Chip and PIN by Republic Bank. Information Quality-Information quality refers to the accuracy/protection of the content of the data in transacting. How secure is the personalized data being transmitted across networks. When a customer presents their card to make a purchase, are they confident that their card information is protected because of the added security enabled on this card. System Quality-The system quality refers to the reliability of the network and the response time in transacting, notwithstanding the approved devices that accept personal identification numbers for all PIN based entries (the ease of use of the system functionalities). Therefore in rolling out this new technology the bank along with their partner merchants would train staff so that they are familiar with the best practice guidelines when using Chip and PIN. Service Quality-This refers to the back-end support systems that assist in usage of the technology. How reliable are Republic Banks servers and IP networks? User Satisfaction- This encompasses measuring the users entire experience-the purchase payment, receipt and service (the ease of purchasing without the fear of being a victim of fraudulent activity). Net Benefits -This is the most important success measure and it encapsulates the cost savings and the decrease in the value of fraudulent transactions arising from stolen credit card data. Was the implementation of this technology beneficial in reducing the incidents of card fraud? Are Republic Bank cardholders satisfied that their bank is on par with global industry changes? The focus of this success model lies in determining the impact the features of technology (information, system, and service quality) have on the variables user satisfaction, use, and net benefits. The main objective for using this ISS model is to establish the ultimate benefits derived from the use of information system both in individual and organizational terms. FINDINGS This chapter will illustrate the findings from the questionnaires submitted to a sample of the Republic Banks credit card customers as well as a formal interview conducted with an employee of Republic Bank Credit Card Centre. The aim of the chapter is to source an awareness of the topic area Chip and PIN by cardholders and the personnel interviewed. Primary Data Collection For the basis of the findings of this research the author conducted a formal interview with a middle management employee at Republic Bank and also distributed questionnaires to a sample of the banks credit card customers. A summarized version of the responses from the interview is represented in this chapter, based on the interviewees knowledge. The questionnaires distributed were mostly closed questions so as to deliberately avoid open-ended respondent answers. Approximately 120 questionnaires were distributed to Republic Bank Customers. Only the answers to the key questions are represented in this chapter. Summarized responses from the interview This interview was conducted with the Supervisor, Card Services, which prove to be very insightful. The Supervisor spoke about the banks vision for their credit card market, and how they plan to continuously innovate so as to maintain their customer base and attract new profitable customers. Since the credit card industry is a highly competitive one, the bank is constantly reviewing their interest rates and looking for new ways to give customer returns from the use of their credit card. Due to his long tenure at the bank and having the customer service background, the supervisor was able to give insight on what infuriates a credit card customer. He explained that customers become frustrated when they see added charges and puffed up late fees placed by the bank on their card statements. In view of the fact that most customers do not read the fine print when completing a credit card application, they are not totally aware of all the charges that can arise from delinquent payments. He f urther added that although queries like this can be explained by representatives at the bank who can provide valued solutions to the cardholders problem, the most infuriating of all queries from customers are unexplainable purchases on their account. At Republic Bank, fraudulent activity on a card can be detected from the use of their state-of-the-art security systems and their experienced fraud expert team that are in place to monitor and detect any unusual activity on a customers credit cards, but even with these measures in place, fraud can occur. The supervisor expressed that by implementing Chip and PIN technology for credit cards, the bank was able to be a step ahead of the competition and most importantly the card criminals. He also stated that although credit card fraud is not as prevalent in Trinidad and Tobago as in the developed countries, continuous education in counteracting fraudulent activities for their customer base is an effective method of addressing credit card fraud. He explained that Republic Bank has not had many eye-opening occurrences of notified credit card fraud but they believe that Chip and PIN technology is an innovative solution to the likelihood of this problem. He was also truthful in expressing that this technology is still new to the industry and all merchants have yet to convert to Chip and PIN enabled machines, therefore there is a window of opportunity for fraud until merchants are mandated to have these Chip and PIN enabled machines. He used the term mandate, because eventually all Republic Bank debit cards would also be chip enabled. In summing up the interview the author probed the supervisor on the banks position on the studies done by the University of Cambridge team on Chip and PIN technology and the tested flaws of the system. His response was quite interesting, because it ventured into a thought-provoking discussion on research. He lamented that the sphere of research done on any topic would result in the researcher seeking out the positive and negative aspects of it. How the data is interpreted, reflects the real value of the research done. Questionnaire Findings Question 5: How often and where do you frequently use your credit card to make purchases? Aim: To assess how often the average Republic Bank cardholder uses their credit card. Findings: Most Republic Cardholders in this study used their credit card regularly, at least five times per month. Credit Cards are used for purchases at the supermarket, restaurant and retail clothing stores. Question 6: Has your credit card information ever been compromised? If yes provide details. Aim: To determine the number of incidents of attack on Republic Bank credit card holders. Findings: Less than 50% of the respondents have never had their credit card data compromised. Question 7: Do you understand the workings of Chip and PIN technology introduced to Republic Bank credit cardholders and the value to be derived from using this technology? Aim: To determine the extent of the customers perception of this technologys value and how the card is used. Findings: Although some customers are guarded about the use of their credit cards, most of the respondents are confident in the service that Republic Bank provides and believes that implementing Chip and PIN gives them that added security against fraudulent activities, especially those customers that frequently travel abroad. Question 8: How do you think by using Chip and PIN cards for making payments will make it easier in transacting? Aim: To establish the efficiencies in the use of Chip and PIN cards, on the time taken to complete a transaction. Findings: Many customers applaud this technology as it reduces the time taken at the cash register when making purchases. It is simple, easy and convenient and most customers are truly happy as there is no need to write their signature. For this reason they find the system most efficient as it prevents their signature from the likelihood of being forged. ANALYSIS The main objective for the research completed on this topic, was to show how and to what extent the adoption of Chip and PIN technology has improved credit card security for Republic Bank cardholders. At a glance, before Chip and PIN technology was introduced in the UK, there was nation-wide educational literature on the benefits of the technology for banks, merchants and most importantly, the customers. However, it seems that this programme led by EMV, created more enthusiasm in the build-up to its implementation rather than the actual usage of the system. From the research, the mounting negative features of the technology and use of the system is outweighed the decreasing positive ones. It seems that the card theft criminals were focused on a solution to obstruct the successful use of the technology before the intention to use. The question remains, which facet of credit card fraud has Chip and PIN really reduced? The research show that for point of sale transactions Chip and PIN has been useful in the prevention of skimming ones card information, however the fraudsters have found alternative ways to improve on that tactic. Chip and PIN technology can only be used à ¢Ã¢â ¬Ã
âsuccessfullyà ¢Ã¢â ¬? for point of sale transactions and not online transactions, so fraudsters have modified their techniques as with the modifications of the technology. Based on the research framework adopted, Republic Bank has measured their net benefits of adopting the Chip and PIN technology by encircling the information, service and system qualities to deliver user satisfaction and usage of the system with this technology. The success of any information system is multi-dimensional and the relationships among the constructs relate to the comprehensive evaluation of the system. The variable dependent on these constructs are the net benefits of this system, and for whom? This local company has app Card Security For Republic Bank Customers Card Security For Republic Bank Customers There is no doubt that most organisations today are becoming essentially dependant on the use of credit cards, arguably its most strategic asset, is to support existing business operations. However, credit card fraud and identity theft has continued to plague the banking and retail industries as there seems to be no feasible solution to these crimes. Advances in technology have opened a gateway for hackers to restructure their position of attack, intruding on ones personal life. The basis of this project is on the new Chip and PIN technology introduced on credit cards. Ive considered this to be an interesting topic because of the publicity this technology has been receiving across the world and it has even reached to our shores, here in Trinidad and Tobago. Hence, Republic Bank Limited one of the local banks would be the case studied in this research. Chapter two would encompass the existing literature on credit card history and Chip and PIN. This chapter would outline how credit cards have become smart cards and how the Chip and PIN cards are used. Chapter three gives the entire design of the project and the objectives to be obtained for the research. Moving to chapter four, the research framework adopted for this study on Chip and PIN and how it relates to the model undertaken in the research. The findings from this research would be summarized version of the data collected, with the analysis of the theory and research framework the author undertook in this study. In concluding, the author would report on the learning aspects of the research and provide an assessment of achievements, giving a position on the research question. Literature REVIEW This section is intended to place the scope of the project with literature surrounding the components of the research question. The Credit Card Transaction Process Discussed This payment mechanism was formally introduced in 1958, when the BankAmericard card, now known as Visa was franchised across the global community. By introducing an electronic authorization system, the BankAmericard was able to be used globally. Now by partnering with banks across the globe, Visa has been able to provide an international processing system for the exchange of money. The workings of a credit card transaction are such that it comprises of four main steps. These are: Authorization Batching Clearing Funding The cardholder requests a purchase from the merchant, which is then submitted to the acquirer by the merchant. The acquirer then sends a request to the issuer to authorize the transaction. Once the authorization code is sent to the acquirer verifying that credit is available, the transaction is authorized and the cardholder receives the product. (This is further explained in detail on page 9 of this document) This simple process of electronic transacting has opened up a world of e-commerce opportunities. From an information system perspective the processing workflow of an online credit card transaction is shown below: Figure 1: Online Credit Card Processing Workflow Diagram (Hubbard, 2003) Because of the vulnerabilities that lay in a transaction, more so the networks across which the information is exchanged, various security breaches can occur. Types of Credit Card Fraud There are many different types of credit card fraud. Fraudsters are very innovative in finding new ways of committing credit card crime and as technology changes so does their crime tactics. Security issues surrounding the card fraud has moved from the traditional ways of committing credit card crime (Application Fraud, Intercept Fraud and Lost/Stolen Card Fraud) to the modern techniques namely, Skimming, Site Cloning and most recently Triangulation. Skimming is the fastest growing type of credit card fraud around because of its simplicity. Pocket Skimming devices can be easily carried around and the cardholders data can be obtained by merely swiping the card through the battery-operated magnetic card reader. This technology has also evolved so as to read the data of Chip and PIN cards, with the use of a scanner. These scanners, which can write or even re-write the data on the Chip cards, are fully portable and have high storage capacities. Because some of these devices are not illegal, they are easily accessible to hackers and can be bought over the internet. Site Cloning involves cloning an entire site or just the pages where customers make purchases. Since the web pages are identical customers are not aware that their personal information is being compromised. Also, confirmation details are sent to the customer just as the official companys website would, so the crime goes undetected. The details entered on the cloned site are then used by the fraudster to commit credit card fraud. Another method of credit card fraud is Triangulation. Goods are presented on websites at discounted prices, which can be shipped to the customer before payment. Again, just as with site cloning, the site appears to be legitimate then the customer proceeds to enter their personal data. With this captured information the fraudster can then order goods from legitimate retail websites using the credit card number obtained. Due to these security issues surrounding credit card information security, there has been global industry-wide concern for the protection of cardholders data. Since security management is a systematic issue, a serious look at what can be done to prevent security breaches is necessary-whether it may be legislation, the use of fraud detection system monitors or the application of data encryption/ authentication techniques. Chip and PIN Technology Credit cards have been a feasible solution for making payment processing simple and efficient. The history of the credit card dates back to the 1900s when oil companies and proprietors created their own credit card as a means of obtaining customer loyalty and improving customer service. However, as with advances in technology, the credit cards have evolved from having just encoded magnetic stripes to modern day Chip and PIN cards, with embedded microchips, which can store and transmit data. These Chip and PIN cards were developed to provide an inter-operative system that would combat card fraud (counterfeit and plastic cards). This transaction processing infrastructure has enabled the cash-less revolution, whereby consumers, governments and businesses benefit from the electronic payment network, which has shifted payments by cash and cheques to an efficient electronic payment system. The mechanics of a credit card transaction is such that the merchant acquirer, usually the bank processes transactions on behalf of the merchant. This payment by credit card represents an offer for issuance of payment in exchange for the goods or services provided by the merchant, (Transaction Processing). There are two parts to this type of transaction processing: the first is front end processing which involves the capture of data messages across communication channels to the point of sale devices; and secondly the back end processing which involves the balancing of accounting information by acquirers and issuers and the submission of the payment to the acquiring merchants bank. As a result of the rapid advances in technology, data security continues to be a major concern as every transaction that involves the transmission data across networks is open to external attacks. Attacks on a consumers card information can come from any angle, whether it may be data thieves or network intruders. The Payment Card Industry Security Standards Council (PCI SSC), which comprises of major payment brands namely VISA, MasterCard, Discover and a few others, have created global compliance standards to protect cardholders data. These set of standards help govern and educate all merchants and organisations that process, store and transmit data, as well as the manufactures of the devices used in transaction processing. The PCI SSC (2010), Data Security Standard Quick Reference Guide, as summarized below, outlines the best practices for protecting cardholder data: Develop and Maintain a Secure Network Install and maintain firewall configuration to protect cardholders data. Do not use vendor-supplied defaults for system passwords or other security parameters. Protect cardholders data Protect stored data Encrypt transmission of cardholders data across open public networks Maintain a vulnerability management program Use and regularly update anti-virus software or programs Develop and maintain secure systems and applications Implement strong access control measures Restrict access to cardholder data by business need to know Assign a unique ID to persons with computer access Restrict physical access to cardholder data Regularly monitor and test networks Track and monitor all access to network resources and cardholder data Regularly test security systems and resources Maintain an information security policy Maintain a policy that address information security for all personnel Nevertheless, despite these procedures in place, there has been amplified instances of the various types of credit card fraud, namely Intercept Fraud, Skimming, Site Cloning as well as Triangulation. This propelled an industry and governmentà ¢Ã¢â ¬Ã¢â¬Å"led initiative in the UK to embark on the introduction of Chip and PIN card technology. Based on the EMV standard (Euro pay, MasterCard, Visa) Chip and PIN technology was launched in the UK on February 14th 2006. This programme was introduced to combat credit and debit card fraud, and to provide an ideal way of validating the cardholders identity. By utilizing smart card technology a microchip is embedded with the customers information which includes their unique four digit PIN. For transactions to be accepted, the customer PIN entered must match the one encoded on the microchip. These steps are further explained below: The card is inserted by the customer into the card reader. The card reader would then prompt the user to insert their PIN. A four-digit PIN is then entered by the customer. Once the reader accepts the PIN entered the transaction would be approved. Note the PIN entered is not displayed on the reader but rather represented by asterisks. The customer is issued a receipt as confirmation of the transaction process. This process removes the responsibility and accountability from the merchant to the customer for point of sale transactions. The card never leaves the customers hand and as such prevents skimming of ones card information. One of the benefits of the Chip and PIN cards is that the Chip itself is encrypted with a range of security features, which the transaction processing system uses to identify the cardholder. These security features are said to be virtually impossible to replicate. The terminals used for Chip and PIN transactions, use secure transmission technology to ensure the privacy of the cardholders data and can operate over a range of connectivity environments, such as wired, wireless and cellular networks. The PCI Security Standards Council also developed a framework of standards which is legally enforced through a merchant/service provider/card brand agreement. These include requirements that support the encryption of the cardholders account data and the point of sale terminal integration. Figure 2: Outline of the process of a Chip and PIN transaction The PIN entered replaces the request for signature as verification of the transaction. This is why the banking industry in the UK has campaigned for this technology, because signatures can be forged, however the PIN is unique to that person. Although the United States is yet to convert to this technology, countries such as Japan, China, Canada, Mexico as well as the majority of the European Countries have all introduced Chip and PIN technology and it is gaining momentum in various other countries including Trinidad and Tobago. Republic Bank Trinidad and Tobago Limited is the first local bank in Trinidad and Tobago to introduce Chip and PIN technology to make the concept of paying by credit card safer for cardholders. The bank adopted this type of technology because this is now an industry-wide conversion from the magnetic-stripe cards and it is also in keeping with the EMV standard. Conversely, a potential security issue with Chip and PIN card terminals is its capability of processing cards with the magnetic stripe as well. Because of this the request to enter the customers PIN can be bypassed by the merchant, with a receipt generated to be signed by the customer. Now because this option is still available it poses an added security threat to card transactions. So, unfortunately skimming still remains a huge problem for cardholders and sadly enough this includes Chip and PIN cardholders as well. Although this practice is slowly migrating from EMV compliant countries, once a card has been skimmed it can still be used in countries where the magnetic stripe is still prevalent, for example some Asian Countries and the United States. This is why many fraudsters can still create a fake card with stolen magnetic stripe information which can be used in for example the United States. The United States believes that although Chip and PIN has reduced fraud for face to face card transactions, there are a still a number of issues surrounding the security of the system used for this these transactions. Now as with any new system introduced, there have been a number of studies on whether Chip and PIN cards are really secure. So the question is has Chip and PIN technology impacted on the activities of overall card fraud or has the activities of fraudsters shifted from retail crime. In a study by Emily Finch (2010) The Impact of Chip and Pin Technology and The Activities of Fraudsters, it was recognised that since the implementation of Chip and PIN technology participants involved in card fraud made varying decisions when it came to their crime of choice. The Decision to Desist The Decision to Continue To work with others Shift to Distance Transactions Diversification of Theft into Identity The study also shows that there is a shift in the attack strategy of fraudsters from point of sale card fraud to Internet and Card Identity Fraud. In an analysis of Internet and Card Identity Fraud, we can note that Chip and PIN technology was not designed for preventing these types of card fraud. So, the question remains, was Chip and PIN successful at what it was set out to achievereduce card fraud? This too can be argued further as there are other limitations. How can one link a particular card to a specific owner? Once the PIN is known by the individual a transaction can be completed with ease. Other studies have shown that the card readers used for Chip and PIN transactions can be modified. In a study by a team of University of Cambridge Computer Scientists, they have uncovered a series of fatal flaws in the Chip and PIN system. One example is where the internal hardware can be replaced without external evidence of this. This new terminal could then be programmed and modified so that it performs just as a typical terminal, where the card details can be collected and allow criminals to make cards with a fake magnetic stripe, which along with the PIN would enable a fraudster to make valid purchases. Another example is that fraudsters can insert an electronic wedge between the stolen card and the terminal, which tricks the terminal into believing that the PIN was correctly verified. Further, with this wedge inserted, any PIN can be entered and the transaction would be verified. This type of fraud makes it difficult for the victims of the attack to be refunded by the bank as the receipt given is authentic and would state verified by PIN. The bank in turn would be accurate in stating that no refund is required as their records show verified by PIN. This type of complaint appears as an act of negligence by the cardholder as he/she allowed their PIN to be compromised. So based on this study the point of sale attacks are much more prevalent, since before the introduction of Chip and PIN cards, consumers only entered their PIN at ATMs. Now with the introduction of Chip and PIN, consumers are using their cards at various other public areas. To combat the compromising of the consumers PIN a shield over the keypad has been used as added security but in many public areas there are video cameras and a persons PIN can still be captured on footage. So, although the UK banking industry has claimed to have rolled out this new technology successfully in 2006, there seems to be some negative aspects of this technology. The architecture surrounding Chip and PIN technology is questionable and the onus is on the banking industry to ensure that cardholders information is protected. Additionally, it also seems that Chip and PIN terminals offer no difference to what the magnetic stripe terminals offered. These terminals can be tampered with, which is a clear indication that there needs to be accurate configuration of these terminals so as to secure the cardholders data when transmitting transactions and that is not vulnerable to incident of attack. So the intent of Chip and PIN technology has more so opened a new marketplace for fraudsters than prevent/reduce fraudulent activity. PROJECT DESIGN, OBJECTIVES AND RESEARCH METHODS The scope of this project is to outline the features of Chip and PIN technology and whether its implementation thus far has been beneficial. This section of the project would provide the methods involved in achieving the data for the project as well as the results based on the data collected. The chosen approach to this design is online research (journals/scholarly articles) along with a case study on the implementation of Chip and PIN technology in Trinidad and Tobago, with the case being Republic Bank Limited. Objective 1 A good foundation for this objective would be the interpretation of the credit cards history. How has this cash-less mechanism moved from a local innovation to a global payment mechanism by use of digital communication across networks? In gaining a clear understanding on the reason for the implementation of this technology, a wealth of research would be conducted on credit card technology and digital security. Objective 2 A holistic understanding on the basis of credit card fraud and the types of fraudulent activities and the steps taken to prevent credit card crime. What technologies have been implemented and the effects/benefits drawn from these approaches. Objective 3 Expanding from objective two also discussed would be whether or not since the introduction of Chip and PIN technology in the UK, has there been a cascading effect of this new technology across countries. Analysing the increasing number of fraudulent activities reported from statistics, which compelled the global banking industry to find a seamless solution for the protection of cardholders data. Objective 4 An assessment on the introduction of Chip and PIN technology by Republic Bank Limited, which would include sourcing information on its implementation and the benefits derived. Further research would be on the acceptance (or non-acceptance) of the technology by customers. Objective 5 Lastly, from the feedback received from the interview conducted and by analysing the incidents of attack on Republic Bank credit cardholders, what was the determining factor in the bank aligning themselves with the UK standards set by EMV? CONCEPTUAL FRAMEWORK In identifying the framework to be adopted that can be referenced to the literature in this research, the author considered the Delone and Mc Lean IS Success Model. Using this model, the author would explain the net benefits of adopting Chip and PIN technology, relating it to Republic Banks implementation of this technology. DeLeone and McLean IS Success Model In evaluating the success of Information Systems, the DM IS Success Model, systems quality measures the technical success, information quality measures semantic success and organisational impacts and user satisfaction measures the effectiveness of the system. The processes in the model are inter-connected by links, across the dimensions of the system. Figure 3: Depiction of the Updated Information Systems Success Model (DeLeone McLean 2002, 2003) The updated DM Model interprets the evaluation of a system in terms of the information, system, and service qualities and how these characteristics attribute to user satisfaction. As a result of using the system, certain benefits will be achieved and the net benefits will in turn (positively or negatively) influence user satisfaction and the further use of the information system. So, therefore three basic components make up this model, the creation of a system, its use and the consequences of its use. Case study as it relates to the ISS model. Republic Bank has been providing banking and financial solutions to individuals and businesses for over 160 years. Their mission is not only to provide efficient and competitively priced services but also to implement sound policies which will be beneficial to their customers. These factors presented provide clarity and influences the net benefits of the implemented Chip and PIN system at Republic Bank thus far. By use of the ISS model to map the research done in this project, the author would complete a step by step relay of the framework discussing the implementation of Chip and PIN by Republic Bank. Information Quality-Information quality refers to the accuracy/protection of the content of the data in transacting. How secure is the personalized data being transmitted across networks. When a customer presents their card to make a purchase, are they confident that their card information is protected because of the added security enabled on this card. System Quality-The system quality refers to the reliability of the network and the response time in transacting, notwithstanding the approved devices that accept personal identification numbers for all PIN based entries (the ease of use of the system functionalities). Therefore in rolling out this new technology the bank along with their partner merchants would train staff so that they are familiar with the best practice guidelines when using Chip and PIN. Service Quality-This refers to the back-end support systems that assist in usage of the technology. How reliable are Republic Banks servers and IP networks? User Satisfaction- This encompasses measuring the users entire experience-the purchase payment, receipt and service (the ease of purchasing without the fear of being a victim of fraudulent activity). Net Benefits -This is the most important success measure and it encapsulates the cost savings and the decrease in the value of fraudulent transactions arising from stolen credit card data. Was the implementation of this technology beneficial in reducing the incidents of card fraud? Are Republic Bank cardholders satisfied that their bank is on par with global industry changes? The focus of this success model lies in determining the impact the features of technology (information, system, and service quality) have on the variables user satisfaction, use, and net benefits. The main objective for using this ISS model is to establish the ultimate benefits derived from the use of information system both in individual and organizational terms. FINDINGS This chapter will illustrate the findings from the questionnaires submitted to a sample of the Republic Banks credit card customers as well as a formal interview conducted with an employee of Republic Bank Credit Card Centre. The aim of the chapter is to source an awareness of the topic area Chip and PIN by cardholders and the personnel interviewed. Primary Data Collection For the basis of the findings of this research the author conducted a formal interview with a middle management employee at Republic Bank and also distributed questionnaires to a sample of the banks credit card customers. A summarized version of the responses from the interview is represented in this chapter, based on the interviewees knowledge. The questionnaires distributed were mostly closed questions so as to deliberately avoid open-ended respondent answers. Approximately 120 questionnaires were distributed to Republic Bank Customers. Only the answers to the key questions are represented in this chapter. Summarized responses from the interview This interview was conducted with the Supervisor, Card Services, which prove to be very insightful. The Supervisor spoke about the banks vision for their credit card market, and how they plan to continuously innovate so as to maintain their customer base and attract new profitable customers. Since the credit card industry is a highly competitive one, the bank is constantly reviewing their interest rates and looking for new ways to give customer returns from the use of their credit card. Due to his long tenure at the bank and having the customer service background, the supervisor was able to give insight on what infuriates a credit card customer. He explained that customers become frustrated when they see added charges and puffed up late fees placed by the bank on their card statements. In view of the fact that most customers do not read the fine print when completing a credit card application, they are not totally aware of all the charges that can arise from delinquent payments. He f urther added that although queries like this can be explained by representatives at the bank who can provide valued solutions to the cardholders problem, the most infuriating of all queries from customers are unexplainable purchases on their account. At Republic Bank, fraudulent activity on a card can be detected from the use of their state-of-the-art security systems and their experienced fraud expert team that are in place to monitor and detect any unusual activity on a customers credit cards, but even with these measures in place, fraud can occur. The supervisor expressed that by implementing Chip and PIN technology for credit cards, the bank was able to be a step ahead of the competition and most importantly the card criminals. He also stated that although credit card fraud is not as prevalent in Trinidad and Tobago as in the developed countries, continuous education in counteracting fraudulent activities for their customer base is an effective method of addressing credit card fraud. He explained that Republic Bank has not had many eye-opening occurrences of notified credit card fraud but they believe that Chip and PIN technology is an innovative solution to the likelihood of this problem. He was also truthful in expressing that this technology is still new to the industry and all merchants have yet to convert to Chip and PIN enabled machines, therefore there is a window of opportunity for fraud until merchants are mandated to have these Chip and PIN enabled machines. He used the term mandate, because eventually all Republic Bank debit cards would also be chip enabled. In summing up the interview the author probed the supervisor on the banks position on the studies done by the University of Cambridge team on Chip and PIN technology and the tested flaws of the system. His response was quite interesting, because it ventured into a thought-provoking discussion on research. He lamented that the sphere of research done on any topic would result in the researcher seeking out the positive and negative aspects of it. How the data is interpreted, reflects the real value of the research done. Questionnaire Findings Question 5: How often and where do you frequently use your credit card to make purchases? Aim: To assess how often the average Republic Bank cardholder uses their credit card. Findings: Most Republic Cardholders in this study used their credit card regularly, at least five times per month. Credit Cards are used for purchases at the supermarket, restaurant and retail clothing stores. Question 6: Has your credit card information ever been compromised? If yes provide details. Aim: To determine the number of incidents of attack on Republic Bank credit card holders. Findings: Less than 50% of the respondents have never had their credit card data compromised. Question 7: Do you understand the workings of Chip and PIN technology introduced to Republic Bank credit cardholders and the value to be derived from using this technology? Aim: To determine the extent of the customers perception of this technologys value and how the card is used. Findings: Although some customers are guarded about the use of their credit cards, most of the respondents are confident in the service that Republic Bank provides and believes that implementing Chip and PIN gives them that added security against fraudulent activities, especially those customers that frequently travel abroad. Question 8: How do you think by using Chip and PIN cards for making payments will make it easier in transacting? Aim: To establish the efficiencies in the use of Chip and PIN cards, on the time taken to complete a transaction. Findings: Many customers applaud this technology as it reduces the time taken at the cash register when making purchases. It is simple, easy and convenient and most customers are truly happy as there is no need to write their signature. For this reason they find the system most efficient as it prevents their signature from the likelihood of being forged. ANALYSIS The main objective for the research completed on this topic, was to show how and to what extent the adoption of Chip and PIN technology has improved credit card security for Republic Bank cardholders. At a glance, before Chip and PIN technology was introduced in the UK, there was nation-wide educational literature on the benefits of the technology for banks, merchants and most importantly, the customers. However, it seems that this programme led by EMV, created more enthusiasm in the build-up to its implementation rather than the actual usage of the system. From the research, the mounting negative features of the technology and use of the system is outweighed the decreasing positive ones. It seems that the card theft criminals were focused on a solution to obstruct the successful use of the technology before the intention to use. The question remains, which facet of credit card fraud has Chip and PIN really reduced? The research show that for point of sale transactions Chip and PIN has been useful in the prevention of skimming ones card information, however the fraudsters have found alternative ways to improve on that tactic. Chip and PIN technology can only be used à ¢Ã¢â ¬Ã
âsuccessfullyà ¢Ã¢â ¬? for point of sale transactions and not online transactions, so fraudsters have modified their techniques as with the modifications of the technology. Based on the research framework adopted, Republic Bank has measured their net benefits of adopting the Chip and PIN technology by encircling the information, service and system qualities to deliver user satisfaction and usage of the system with this technology. The success of any information system is multi-dimensional and the relationships among the constructs relate to the comprehensive evaluation of the system. The variable dependent on these constructs are the net benefits of this system, and for whom? This local company has app
Subscribe to:
Posts (Atom)