Wednesday, July 31, 2019

Building a Green Kitchen

An ordinary kitchen consumes at least 41. 5 percent of energy consumed by the entire household. Lighting, cooking, and refrigeration are the biggest culprits (â€Å"Tech Set 8: Green Kitchen Remodel†). The high energy consumption of lights may be reduced by locating workspaces close to windows or installing new windows if not a skylight to make good use of daylight. Energy efficient refrigerators are also available. The most efficient of these are the 20-cubic-foot fridges that consume 47 percent less energy.Similarly, energy-efficient dishwashers are sold in the markets nowadays. Energy-efficient stoves, e. g. convection ovens as well as induction-element ranges, are better than old-fashioned stoves (â€Å"Creating a Green Kitchen†). Water efficiency must also be addressed in order to make a kitchen green. The kitchen faucet should be a changed if it is not a â€Å"water saving model (â€Å"Low Flow Kitchen Faucet†). † The new water efficient kitchen fauc ets could save a huge amount of water without significantly impacting the daily chores completed in the kitchen.These faucets use sensors that stop the flow of water if it is going to be wasted otherwise. They also use aerators that reduce the flow of water without the user noticing. But, of course, there are finer models available with newer technologies as well. There is a metered valve faucet, for example, that could deliver up to 0. 25 gallons of water before shutting off automatically (â€Å"Low Flow Kitchen Faucet†). As far as the indoor environment of a kitchen is concerned, ventilation and the quality of air are the most important issues to address if the kitchen must turn green.Installing new windows to create cross ventilation is a good idea. An exhaust hood over the stove that is energy efficient must also work wonders. Because mold may grow in places that are damp and could easily get mixed with breathable air to cause respiratory problems – it is essential to fix pipe leaks, too. Dangerous chemical based cleaning products may also pollute the kitchen environment with toxic fumes, which is why it is imperative to purchase only environmentally friendly products (â€Å"Creating a Green Kitchen†).Works Cited â€Å"Creating a Green Kitchen: From Resource Planning to Maintenance. † Green Home Guide. 5 Jul 2005. 14 Nov 2008. . â€Å"Low Flow Kitchen Faucet – Save Water Without Even Noticing. † Green Kitchen Design Guide. 14 Nov 2008. . â€Å"Tech Set 8: Green Kitchen Remodel. † Tool Base Services. 14 Nov 2008.

Tuesday, July 30, 2019

Our Town vs. Steel Magnolias Essay

To the casual observer, Our Town, the theatrical piece by Thornton Wilder, is very different from the cinematic production entitled Steel Magnolias (based on Robert Harling’s original stage play). Due to their differences in setting, characters, and mood, it can be difficult to see the obvious parallels. A more in-depth look at both pieces reveals many similarities in different areas, such as daily life, love, marriage, and death. Despite the fact that Our Town takes place between 1901 and 1913 and Steel Magnolias is set in the late 1980s, an average day in Grover’s Corners is much like one in Chinquapin. Both of these fictional cities demonstrate small-town life. On an ordinary day, in both cities, the newsboys make their morning rounds delivering the daily newspapers to the townspeople. In Chinquapin, the delivery man distributes parcels to their recipients, while the milkman in Grover’s Corners delivers his goods. A skirmish between George and Rebecca Gibbs corresponds to that of Shelby’s brothers, Jonathon and Tommy. This pair of presentational life dramas is alike in relation to love and marriage as well as daily life. Both stories, as a result of love, have wedding components. In both weddings, the grooms feel nervous about their futures. They are overcome by potential feelings of sorrow and abundant happiness. Both of the men want to see their brides on the day of the wedding, and are told that it is bad luck to do so. The parents also demonstrate â€Å"cold feet† by showing that they, too are nervous not only for their children, but also for themselves and the part of their lives that their children occupy. The final way in which these pieces are alike is the most important and profound way. It pertains to life and death, and is expressed in both instances. Both Shelby and Emily die in childbirth, and are succeeded by their husbands, parents, and one child. Though both Our Town and Steel Magnolias are alike in the aforementioned ways, this is also where they differ greatly. It is here that the â€Å"aura† or mood differs. In Our Town, the  tone is sorrowful and shows despair that Emily didn’t stop to notice things she should have. Steel Magnolias did not have what I would describe as a â€Å"happy ending,† but it does give a positive outlook with a â€Å"life goes on† message. In spite of the differences that are obvious between these performance pieces, they are undoubtedly alike in many ways. With the elements of daily life being as they are, the morning commotion and behavior of siblings, each resembling its counterpart, it is safe to say that both authors thought of the same thing when they thought of â€Å"small town life.† The substance of the stories that relate to love and marriage are also like each other, which is no surprise, because it is expected that the bride, groom, and parents are nervous when being part of such a large decision. Also the part death played had a lot to do with the lesson or message that was to be conveyed by these stories. Both of the wives dieing young and leaving behind almost all of their families, especially their children, which are an important factor in the deep-seated message from the authors, shows the value of life and abstruse value of people and nature. For Our Town this message can be simply stated as â€Å"you’ve got to love life to have life, and you’ve got to have life to love life.† Steel Magnolias moral can be expressed by saying that life should be enjoyed while it can, and when it can’t, life goes on.

Monday, July 29, 2019

Heroes & Odysseus Essay

This paper will seek out to explore the way in which Odysseus and Oedipus were created as heroes and how they either missed their mark or did indeed become legendary. Throughout Homer’s chronicle, The Odyssey, are found the feats of cunning, strength, moral fiber and bravery attributed to Odysseus. The tale recounts the days after the fall of Troy, and the meandering journey which took Odysseus back to his homeland – though never truly home. The Odyssey begins with Odysseus stranded on a small forest island – trapped by the goddess Calypso while Oedipus begins with the oracle of Delphi stating that Oedipus will live to kill his father and marry his mother and thereby wrecking his home. It is explained through the text that the gods, save for Neptune have begun to pity Odysseus because of the great suffering he had endured. This suffering is explained to be of â€Å"every kind of blandishment to make him forget his home, so that he is tired of life. † (Book I) Calypso is intent on forcing Odysseus to marry her, but he does not falter to her whim, but still longs for his wife and home. Oedipus on the other hand does fulfill the oracle’s prophesy and no god saves him or pities him his fate. This is brought to the attention of Jove, or Zeus, son of Saturn and most powerful of the gods. The goddess Minerva calls to Jove to end the suffering of Odysseus, to which Jove replies: My child, what are you talking about? How can I forget Ulysses than whom there is no more capable man on earth, nor more liberal in his offerings to the immortal gods that live in heaven? (Book I) It is through the voice of Jove, the king of all the gods and goddesses that the reader is shown the esteem that Odysseus has gained. Jove calls Odysseus the â€Å"[most] capable man on earth†, which intends to illustrate the favor that he has earned from the gods. When it is decided by Minerva and Jove that Odysseus will be allowed to return home, Minerva travels to Ithaca – the home of Odysseus to tell his son to prepare for his father’s return. However the situation on Ithaca has become troubled as many suitors are vying for the hand of the, presumed, widow of the king. During this debate, Telemachus, the son of Odysseus convened the council and spoke of the trouble that had fallen on his house. My grieveance is purely personal, and turns on two great misfortunes which have fallen upon my house. The first of these is the loss of my excellent father, who was chief among all you here present, and was like a father to every one of you [†¦]. (Book II) Here, it is shown that not only was Odysseus capable of pleasing the gods, but also he was a great and fair leader. The council of Ithaca, though his subordinates, where treated as his own children – rather than simply citizens subject to his rule. It is also during this discourse that Telemachus calls for an end of the forced courting of his mother by saying â€Å"we have now no Ulysses to ward off harm from our doors, and I cannot hold my own against them. I shall never all my days be as good a man as he was† (Book II) – which then illustrated the strength and power that the presence of Odysseus commanded. Characters in plays are the designated interlopers between the subconscious of the audience or readers. These characters translate into reality and become a relatable experience because the hero has one tragic flaw that conquers them, ruins them, and brings them humility. This fallible nature is show the imperfections of humanity designed through sin; sin is one of the many idiosyncrasies which mark us as human, that create specific characteristics and through confession or the confession of characters in a play, this nature becomes like a myth in the end there is death or forgiveness. Aristotle’s definition for a tragic hero is one who is not in control of his own fate, but instead is ruled by the gods in one fashion or another. The tragic hero for Aristotle is tragic because of their lack of control or will in the face of their predetermined future and downfall. A great tragic flaw (hamartia) is the hero’s devil may care attitude at the beginning of each story, and then their despondency and stagnation of hope that meets them at the end of the play (Aristotle Ibid. , Book XIII, 1085b 35 & 1086a 12—14, P. 909]. In drama, ego is the flaw to which the hero succumbs. This is Oedipus’ great error. His ego is a compromise to his fortune. Even in the gods’ world he stands out as unique or special. Heroes begin their stories with aplomb of luck, or ego, or a rosy view of the world, and each play seems to end with destruction. Oedipus is blind at the beginning of the play and then becomes physically blind at the end of the play thus making the ethereal concrete. With Greek drama; the tragedy of the unmistakable truth found in the character’s own self-realization is the typically denouement. The playwright’s tragic heroes have survived in life under false pretences, thus they are doomed to suffer from their one flaw of ego. It is interesting that while ego is Oedipus’ downfall it is Odysseus’ strength for it is ego which allows him to continue trying to find his home even after decades of looking. By the forth book of The Odyssey, Odysseus is still making his way home, and the tales of his exploits are recalled. As Helen, wife of Menelaus, and the cause of the Trojan war spoke of Odysseus, she recalled his cunning and forethought in his dealings with Troy. â€Å"I cannot indeed name every single one of the exploits of Odysseus†, Helen told the men, â€Å"but I can say what he did when he was before Troy. † (Book IV) Helen recounted Odysseus donning a disguise and entering the city dressed as a beggar. Though she saw through the disguise and recognized him, she was unable to question him because â€Å"he was too cunning for me†. (Book IV) It was the plan of Odysseus to gather information on the city, and kill some of the soldiers before returning his army – which, as Helen recalled, he did. This praise of Odysseus was echoed by her husband, Menelaus. After Helen had spoken, Menelaus said â€Å"I have traveled much, and have had much to do with heroes, but I have never seen such another man as Odysseus. What endurance too, and what courage he displayed†. (Book IV) The strength and bravery of Odysseus, as recounted by Menelaus, illustrated the degree to which Odysseus had gained favor among his fellow Grecian kings. In Oedipus there is another case of fate controlling the destiny of man. Due to fate’s interference in the lives of heroes, it must be pondered whether or not they are heroes because they are devoid of choice and by definition a hero chooses their actions, but with fate, their actions are predestined. For Oedipus, his only link to heroism is that in his redemptive attitude . His heroic stance in Greek culture is seen as a protagonist who felt guilt for what he had done and this translates to the audience that if a hero can succumb to evil then they themselves, as less than heroic, are more likely to fall in favor, in the eyes of the gods. Human nature is a nature of reason, not strictly adherent to passion or feelings, and in drama playwrights strive to be exact in their representation of reality. Morality then, becomes the crux of Oedipus Rex. Morality is reason. This is not to say that Plato and other classic Greek writers were ascetic; rather they placed passion, and feelings in their plays but the ethics of humanity are tied into the good of a person because reasonably, being virtuous, or good leads a character to happiness or release at the end of a modern play. The word for this given by Plato is eudemonism, which means blissful. Throughout The Odyssey, many individuals recount the feats of Odysseus. His exploits had gained him favor from man and God alike – something afforded to very few others in history or mythology. It was the total of every aspect of Odysseus’ persona that he gained this favor. Throughout his life he had shown courage, fairness, loyalty, strength and cunning – and it is because of these traits that Odysseus is remembered. As a Greek hero, Oedipus is controlled by fate: His remittance of gouging his eyes shows that he is a strong hero because of his debt payment of sight. For Oedipus the flaw could be contained within the word ego while Odysseus’ heroism is marked by it. Ego in answering the sphinx riddle and unbeknownst to him killing his birth father, marrying his mother, having children; ego accounts for all of Oedipus’s actions, and it is fate which had designed ego and thus was the ultimate ruler of Oedipus and luck for Odysseus but both are considered heroes. Works Cited Aristotle. Sophocles. (1977). The Oedipus Cycle. Harcourt Inc. Florida. Homer. â€Å"The Odyssey†. trans. Samuel Butler. University of Oregon. Date of Access: April 30 2009. URL: http://darkwing. uoregon. edu/~joelja/odyssey. html

Chrystal Meekers Momma (1980) Essay Example | Topics and Well Written Essays - 500 words

Chrystal Meekers Momma (1980) - Essay Example The poem by Meeker can be realized as dealing with a child’s recognition of how a mother gives up anything and everything for the sake of her child. Whereas the poet deals with poverty and despair affecting the family, the mother’s unconditional sacrifice for the children is the central theme of the poem, and she gladly starves herself in order to make the children contented. Therefore, a reflective exploration of the poem â€Å"Momma† by Crystal Meeker makes clear that the poet compellingly deals with the true meaning of motherhood through the skillful use of literary devices. In a profound analysis of the poem â€Å"Momma†, it becomes lucid that Crystal Meeker’s major intention in writing the poem has been to glorify the true meaning of motherhood and the poet’s use of literary devices such as hyperbole, imagery, simile, etc. has helped him to convey his message persuasively. Significantly, any careful reader is reminded of a mother’s unconditional love and sacrifice for the well-being of her children and family. In this poem, Meeker magnificently presents a family facing the realities of poverty and the unlimited love and sacrifice of the mother becomes obvious to the reader. In order to present the life of the family, the poet employs hyperbole when he suggests that mother and daughter did not always meet eye to eye: â€Å"they clawed their womanhoods out of each other† (line 3).

Sunday, July 28, 2019

Performance Evaluation Essay Example | Topics and Well Written Essays - 1250 words

Performance Evaluation - Essay Example In this context, continuous performance evaluation plays a significant role for determining the merit or worth of a program or solution. The ultimate purpose of determining the value is to provide the information to the top level managers, for formulating action-oriented decisions that helps in enhancing performance of programs and organizations. As stated by Guerra-Lopez (2008), â€Å"every component driven by the evaluation must be aligned with the organizations’ expectations and objectives and the decisions that will have to be made as a result of the evaluation findings† (Guerra-Lopez, 2008). Evaluation of performance helps in comparing the result with expectation. It also assists in preparing action plans for improving the programs and solutions being analyzed, so that expected performance is achieved and sustained as well as organizational contributions and objectives can be realized. Job description and performance appraisal are the important parts of performance evaluation. Performance evaluation can be performed for any operating objectives of an organization but here employees’ performance evaluation with respect to their job and performance appraisal of McDonald’s will be conducted. T... The company also employs a considerable number of around 1.7 million people in its chain of restaurants (McDonald’s Corporation, 2010). With these given virtues and with due consideration to the organizational objectives, performance evaluation can apparently be stated as a vital aspect in McDonald’s. McDonald's being in a service-oriented industry, the company requires providing significant consideration to the aspect of employee satisfaction and productivity with the purpose to attain superior customer satisfaction. Attaining sustainable growth through employee satisfaction and quality services to customers is among the most crucial objectives considered by the organization at present (McDonald’s Corporation, 2010). Therefore, it becomes quite essential for the organization to focus on the continuous performance evaluation of its employees and the organization as well so as to identify the continuous change in the customers’ preferences and the employee performances. Compensation Strategy In this competitive market, it has become quite challenging task for the employers to acquire and sustain productive, knowledgeable and talented manpower, especially in the service sector so as to gain sustainable growth. With due consideration to the fact that employees in terms of human resources are quite significant for organizational growth, training and evaluation have emerged to be the prime concern of the Human Resource Department (HRD). It is in this context that Human Resource Management (HRM) approaches are being provided with greater stress in order to enhance the contribution of employees in the overall organizational

Saturday, July 27, 2019

Sexual diversity in schooling Essay Example | Topics and Well Written Essays - 2000 words

Sexual diversity in schooling - Essay Example schools in Australia through the education system about sexual diversity and inculcate in them values such as inclusion, respect for others, and fairness. The fact is, however, that sexual diversity remains a controversial topic and has largely been ignored in the education systems (Herron, & Javier, 2006). This essay will criticize the failure of the school education system to incorporate sexual diversity. The essay will also examine the consequences of failing to address these issues and helping to deal with homophobia among children and young people. According to the Australian Journal of Human Rights, sexual diversity refers to one’s experience of gender identity or transgender that goes beyond the binary or biological notions of being either male or female (Steinberg, 2009). Dr. Tracie O’Keefe originally coined the term in his paper about human rights submitted to Amnesty International in 2002. The term has gained wide usage in many circles within Australia. Sexual diversity mostly aims at celebrating diversity in gender identities as opposed to categorizing people in different sexes or genders. Sexual diversity is also a general term referring to individuals who do not identify with either masculinity or femininity with regard to their gender identity. The term includes different groups such as androgynous, transsexual, transexed, cross dressers or transgender. Other terms popular in various parts of Australia include pan-gendered, sistergirl or brotherboy, and intergender (Dijk, & Driel, 2007). Sexual diversity also includes other minority groups such as lesbians, gays, and bisexuals. These groups of individuals have received widespread discrimination and segregation in the community. Sexual diversity has been a major human rights issue in Australia in the past few years, with cases of homophobia, exclusion being on the rise. The Australian Human Rights Commission (AHRC) has been at the forefront in fighting for inclusion of transgender individuals in

Friday, July 26, 2019

Tour Essay Example | Topics and Well Written Essays - 1250 words

Tour - Essay Example Nowadays money is flowing into this business. To promote tours and travels, government and private companies are delivering different types of packages. Objectives like Festivals, Meeting and Events (FME) are playing an important role to promote tourism. London is the capital city of England. Because of its geographical structure travellers and business persons are coming to this place regularly. London is good for business like travel and tourism. Festivals are delivering high entertainment to people. I would like to organize festivals to promote tourism business in London. Generally, festivals and events attract people. As the major stakeholders in such activities realise the significant economic benefits of holding festivals, meetings and events. Tourism is a long term business. So stakeholders have to take enough responsibility when organizing and managing FME's. London is the safe bet for the stake holders. Why do we invest money to organise festivals or events to promote tourism business The reason is that it is totally a business programme. As far as I am concerned Travel and tourism industry is one of the world's largest foreign exchange earners. It is a very wide industry linked with so many areas which include government tourism department, travel agencies, hotels etc. Government tourism departments are associated with immigration and customs service. Many other departments are linked with travel agencies. Airlines, tour operators, hotels etc. are depending on travel agencies. This industry provides large number of employment directly and indirectly. Travel can be of different types. It can be leisure, pilgrim, adventure or purely business trips. In London, there are lot of things to see like London Eye, London Pass, and Madame Tussauds etc. London Eye is a giant wheel which provides you to see every tall building in London at once. This is one of the most attractions in London. M adame Tussauds is a wax museum where all cult figures like (Charlie Chaplin, Amithab Bachan, Tom cruise etc.) made by wax materials are exhibited. Travellers are coming to visit this place regularly. (Visit Britain direct). With the increase in visitors most travel promoters and companies are earning good revenue. This is a booming industry which offers good returns to the investors. With the increase of travellers, lots of people are investing their money in travel and tourism Industry. London is known as multicultural city. There are so many cultural and social programmes conducted in London. People of London gather together and celebrate social programmes like New-year Day, Good Friday, Easter Day, May Day, Christmas, Boxing Day etc. There are numerous festivals and events in London. Events like Wimbledon, FA cup football, Chelsea flower show, London Marathon, the queen's birthday parade, Europe's biggest and gay and lesbian festival, Notting hill carnival, Thames festivals, are attracting visitors to London. People of London celebrate plenty of bonfire festivals. Guy Hawks Night, Lord Mayor's show and Trafalgar Square are celebrated with bands and fireworks. Now we are planning to conduct festival

Thursday, July 25, 2019

To what extent would you agree with the view that the protagonist of Essay

To what extent would you agree with the view that the protagonist of Poe's stories is language itself, and the structure of the tale is its hero discuss with r - Essay Example This internal battle causes Wilson to go insane and eventually attempt to murder a man who looks and acts just like him because he believes that this will reacquire his identity for him. Each of these stories has a protagonist that can be representative of language as a whole because each of them is battling against other forces who are trying to regulate their language. Dupin does not wish to be bound by the conventional rules of investigation, just like many do not like to be bound by the conventional rules of language, so he becomes an innovator in his field, which leads to him solving the crime. Wilson, on the other hand, believes that his own person language is being threatened and so he acts violently in order to protect it. Each of these characters represent language because language, while constantly evolving, must also be protected from external factors, otherwise we will all eventually end up speaking and writing exactly alike. In the story ‘The Murders in the Rue Morgue,’ by Edgar Allan Poe, the protagonist is an expert detective named C Auguste Dupin. Poe is often credited with creating the genre of detective fiction that is present today, as he â€Å"introduced three common motifs of detective fiction: the wrongly suspected man, the crime in the locked room, and the solution by unexpected means. Dupin solved the crime by reading the evidence better than the police did and by noticing clues that they had neglected, thus highlighting the importance of inference and observation†1. This story’s use of language focuses on both Dupin and the narrator, who is an overly sympathetic figure and does not believe that Dupin can do any wrong. Dupin forms the plot of this story around his belief that the Paris police department has not done all that it can do to solve this crime. He uses his power of observation to recognize clues at the crime scene

Wednesday, July 24, 2019

Sales proposal to Apple Inc Essay Example | Topics and Well Written Essays - 750 words

Sales proposal to Apple Inc - Essay Example I am the marketing manager at Amazon and I am writing on my behalf of my team. The purpose of this proposal is to offer you an opportunity into venturing into bed time stories for kids via our iPhone application.The world is advancing rapidly and no one knows that better than the geniuses at Apple. Every young should have access to all kinds of fun and exciting reading. ‘Bedtime Stories for Kids’ would be an I-phone based application that we propose to make; It will have the best literature for all children of all ages and would be made in the most user-friendly way for the parents to read out to their children via iPhone. It will be a very colorful application that would be specifically designed by Darren Smith, the famous children’s illustrator. It will contain very intriguing black and white drawings, pictures from famous artists in the children world and various other illustrations. It will also comprise of fascinating stories, fairy tales, myths, legends, hum or stories, fiction and accounts on lives of great men and women. It would be the most ideal application for parents who are too busy to go to book stores to fetch books for their children. They can cash in on this application and read it aloud to youngsters and children. The most amazing part of the offer is that, we are willing to make the entire application free of cost and willing to allocate 30 % of the revenue from the sale of stores to Apple. As this is only an application, there will be no shipping and other storage costs. We will also take care of the marketing of our application. This proposal will deal with other raw facts about Amazon and how we plan to go about marketing the application. Amazon.com is stationed in the United States. It is a multi-national electronic commerce company. Its headquarters are based in Seattle, Washington. Currently, it is America’s biggest online retailer. Its sales are three times the Internet a sale of Staples, Inc. Amazon was found in 1994 by Jeff Bezos. He launched it online in 1995. The company’s first name was Caracara Inc. Amazon’s name was very strategically chosen. It was chosen in conjunction with Amazon River. It is the largest river in the world, and begins with the letter â€Å"a†. Amazon.com hit off as an online bookstore. However they soon diversified their portfolio and ventured into selling DVDS, CDs, and MP3 downloads software’s, games, electronics, food, toys, furniture and apparel. They started spreading out from United States and established bases in Canada, the United Kingdom, Germany, France, Japan and China. Amazon’s business strategies: Amazon built its competitive edge on three core strategies. These were: 1. Cost Leadership 2. Customer differentiation 3. Focus Under its cost leadership strategy Amazon has stood out by offering rock-bottom prices. It provides good quality products at low prices. Its prices can’t be matched by its competitors. Th is makes it an obvious choice for customers. Under the second strategy, Amazon offers current and prospective customers differentiation via convenience. It is one of the largest e-stores at the moment. Its product assortment is huge. It capitalizes on its huge product assortment, fast and efficient delivery and efficient services. It has focused on 4 primary areas for its focus strategy. These include the 1. Product focus. 2. Customer focus 3. Technology focus 4. Distribution focus As mentioned before, Amazon has a huge product assortment. Its product assortment has always attracted customers. Technology has always been central to Amazon’s business. It is an e-commerce business, a virtual market place, where every transaction is done online. For the iPhone application we will focus on cost leadership and a customer focus strategy for the Children’s book application. Amazon’s E-marketing Strategy for the application: Amazon plans to ensure that it offers lowest p rices for most of the popular stories that it would be offering in the application.

The five forces model is used for assessing the attractiveness of Essay

The five forces model is used for assessing the attractiveness of industry sector. Evaluate the key factors that need to be considered when making a assessment of the current industrial environment - Essay Example When the number of players in a market increases, revenues will be shared among competitors and hence profitability of individual firms will decrease. According to this concept, an industrial sector in which â€Å"entry barriers are high and exit barriers are low† is considered to be potential for investment (Kotler, 2009, p.226). Availability of substitutes increases the tendency of customers to switch their demand to alterative products or services. To illustrate, coffee is a close substitute for tea. While analysing the threat of substitutes in an industry, the marketer must also consider a number of factors such as buyer’s inclination to substitute, prices of substitutes, switching costs, and availability of substitutes. An industry having few close substitutes is recommended to be the most attractive segment. Buyer power indicates the customer ability to influence marketers and it mainly depends on buyer volume, availability of substitutes, and degree of market competition. An industry with low buyer power is potential for business operations. Likewise, supplier power reflects the ability of suppliers to put the organisation under pressure. When there are few substitute products/services and supplying firms, supplier power over the marketer is relatively high. Such an industrial environment would not be beneficial for a business. This factor plays a pivotal role in determining the competitiveness of an industry in majority of the cases. An industrial sector where the intensity of competitive rivalry is low is the most potential for making an investment. This model is widely used for micro-environment analysis of industries since its development. For instance, it can be effectively applied to assess the potentiality of airlines industry in order for making a decision regarding whether or not to

Tuesday, July 23, 2019

An analysis of The Case of Charles Dexter Ward Essay

An analysis of The Case of Charles Dexter Ward - Essay Example His work was known to inculcate pessimism and cynicism which are the opposite of the concepts and philosophies being promoted in his era such as Enlightenment, Romanticism, and Christian humanism (Lovecraft â€Å"Works†¦Ã¢â‚¬  Biography page 1). The novel â€Å"The Case of Charles Dexter Ward† is one of the famous novels of Lovecraft in the same atmosphere of horror and fantasy. It is about the main character Charles who became a mental case due to the results of his quest in knowing the life of one of his ancestors Joseph Curwen who was known for his evil activities during his lifetime. There are important points in the novel. One is the impact of fantasy in the novel, which can be considered as the focal point of the story. Without the magical and demonic return of the spirit of Curwen through Charles, the novel would have failed to progress. In any novel, there is a fight between forces of good and evil. And in relation to the common theme of Lovecraft’s works , cosmic horror had an important role and created confusion in the story as well. This can be observed on the decision of the main character to dedicate his life in finding Curwen inspired by the possibility of achieving his capabilities (Lovecraft â€Å"Works†¦Ã¢â‚¬  Biography page 1; Lovecraft â€Å"The Case†¦.† Part 1 Par. 6). The focus of the paper is the theme of the novel regarding education which is another important point in the works of Lovecraft. The story specifically pointed out the dangers of biased knowledge based on education focused on a singular aspect which is the quest for an ancestor and his capabilities. Analysis of the Dangers of Biased Education in the Novel H.P. Lovecraft is known for his... H.P. Lovecraft is known for his style of writing in the fantasy and horror fiction genre but most importantly he is known for the importance of education in the themes of his works. The Case of Charles Dexter Ward also shares the same theme. In the story, one of the most important elements that affected the fate of the main character is his biased knowledge due to the lack of balanced perspective. This ultimately resulted in his mental condition. Ward is a an educated person with a degree but â€Å"during the boy’s last year at the Moses Brown School, when he suddenly turned from the study of the past to the study of the occult, and refuse to qualify for college on the ground that he had individual researches of much greater importance to make† (Lovecraft â€Å"The Case†¦.† Part 1 Par. 6). This became the onset of his research on Joseph Curwen and the change in his behavior. One of the observed changes is the behavior and attitude of Charles is the neglect o f other areas of his life to pursue his quest for the occult. This is one of the most important evidence of the dangers of biased education. Due to his obsession to focus on one area of knowledge he underwent a self consuming form of one sided education which led to his mental condition and change in behavior. The behavior that was exhibited by Charles can be compared to brainwashing and other forms of influential effects wherein a person can be totally focused on a single activity, a single aspect of life or a single objective and block the rest.

Monday, July 22, 2019

African American-European American Iat Essay Example for Free

African American-European American Iat Essay The version of the IAT, that I chose to take is the African American – European American IAT. There were a few steps in order to complete the test; the first step was to fill out information about myself. The questions that I answered were related to my age my educational status, nationality, religious beliefs and my current state of employment. The next step of the test was to choose either ‘E,† or ‘I,† to indicate my choice of African American for a picture of a African American or European American for a picture of a European American. The next series of questions asked me to select either African American grouped with â€Å"bad,† or European American with â€Å"good’. Another series of questions was visually posed this time with, African American grouped with good and European American grouped with bad. The results show that data suggests a strong automatic preference for European American’s compared to African Americans. My automatic preference was toward European Americans. The results of this test aren’t very surprising to me. In class we were told how the test would go, so I already knew what to expect. There was a small bit of doubt whether or not the test would indicate a strong preference for one or the other at all though, because I am Hispanic. I would have speculate that based on the fact that I grew up primarily in white suburbia in a private school that almost exclusively consisted of all white students, that my preference is a subconscious choice. I am most familiar with European Americans therefore I chose them over African Americans. There is a distinction between implicit attitudes and explicit attitudes, that distinction is simple. Implicit attitudes are the attitudes that we don’t think about, they are automatic. Explicit attitudes are the attitudes that are consciously controlled. According to Gawronski and Bodenhausen, in the text, Social Psychology,†Our automatic implicit attitudes regarding someone or something often differ from our consciously controlled, explicit attitudes†(p.51). From the results of the IAT that I took, I would have to say that my implicit attitudes towards African Americans, do not match my explicit attitudes about African Americans. The reason that I believe that my implicit attitudes are different from my explicit attitudes is that I usually make a conscious decision to be friendly and welcoming to any person that I come in contact with regardless of gender, race, age, or sexual orientation. The results are mildly surprising, however, I believe that I am more accustomed to being in the company of European Americans, and therefore I show a distinct implicit attitude favoring them. Implicit attitudes are a dangerous thing; we should pay particular attention to how we label people explicitly, so that with time, we can manipulate our unconscious attitudes and impulse reactions to certain people. A good example of problems that people run into with their improper mind set comes to us from our text, Social Psychology. Age is the example Bugental and Hehman used in 2007, when they discovered that people treat the elderly differently than they do people whom are younger, they explain that â€Å"People’s perceptions of the elderly- as generally kind but frail, incompetent, and unproductive- predispose patronizing behavior†¦Ã¢â‚¬ (p. 308). It’s that attitude that people hold about the elderly that according to Bugental and Hehman, â€Å"predispose patronizing behavior, such as baby-talk speech that leads elderly people to feel less competent and act less capably’ (p. 308). It is important that we change our thinking, because if we continue to have the same biases, we not only do our selves a disservice in being implicitly and or explicitly inappropriate in our attitudes, but we also risk the chance of hurting others in our actions. Works Cited Myers, D. C. (2010). Social psychology (10th ed. ). New York: McGraw-Hill. Pages 51,308 Psych 312 Extra Credit 10pts 5-8-13 Eli J. Guymon Gender – Career IAT The second test that I took was the gender – career IAT. Before the test began, I was asked to report my beliefs about women versus men in the work force and women versus men in the home life. The second set of questions asked me to fill out information about myself. The questions that I answered were, what is my age, my educational status, nationality, religious beliefs and my current state of employment. Following those questions were questions about my family growing up, they wanted to know if I had a mother as a primary care giver, and if she worked outside of the home, specifying what she did for a living, and if there was a secondary caregiver, such as a father or step father, where they employed outside the home, and what their occupation was. The next step of the test was to choose either ‘E,† or ‘I,† to indicate my choice. The groupings in the first series of visual concepts to match were men’s names with the word men and women’s names with the word women. The next step was to match men with career minded words and women with household related words. Finally in the final sets of matching words the groupings were reversed so that men and household related items were a pair and women with career minded words belonged together. According to the results, data suggested little or no association between male and female with career and family. I did not have a automatic preference. My explicit and implicit attitudes match, I do not consciously nor do I subconscious place anyone in a group that favors either individual in the work place or family. I am not surprised by my results because I was raised in a home where my mother was a primary care giver but I also received care giving from my step father. Both my mother and my step father worked outside of the home. Both my mother and my step father shared responsibilities equally except where one person seemed to enjoy a task more than the other, that partner would assume say a specific domestic role that the other was happy to not have to do. For an example of a domestic role that both of my parents needed to be done but one seemed to favor it over the other, grilling outside, was my step fathers domestic role because my mother did not enjoy doing that work, and my step father rarely did his own laundry, because it was a task that my mother felt comfortable doing by herself.

Sunday, July 21, 2019

Card Security For Republic Bank Customers

Card Security For Republic Bank Customers There is no doubt that most organisations today are becoming essentially dependant on the use of credit cards, arguably its most strategic asset, is to support existing business operations. However, credit card fraud and identity theft has continued to plague the banking and retail industries as there seems to be no feasible solution to these crimes. Advances in technology have opened a gateway for hackers to restructure their position of attack, intruding on ones personal life. The basis of this project is on the new Chip and PIN technology introduced on credit cards. Ive considered this to be an interesting topic because of the publicity this technology has been receiving across the world and it has even reached to our shores, here in Trinidad and Tobago. Hence, Republic Bank Limited one of the local banks would be the case studied in this research. Chapter two would encompass the existing literature on credit card history and Chip and PIN. This chapter would outline how credit cards have become smart cards and how the Chip and PIN cards are used. Chapter three gives the entire design of the project and the objectives to be obtained for the research. Moving to chapter four, the research framework adopted for this study on Chip and PIN and how it relates to the model undertaken in the research. The findings from this research would be summarized version of the data collected, with the analysis of the theory and research framework the author undertook in this study. In concluding, the author would report on the learning aspects of the research and provide an assessment of achievements, giving a position on the research question. Literature REVIEW This section is intended to place the scope of the project with literature surrounding the components of the research question. The Credit Card Transaction Process Discussed This payment mechanism was formally introduced in 1958, when the BankAmericard card, now known as Visa was franchised across the global community. By introducing an electronic authorization system, the BankAmericard was able to be used globally. Now by partnering with banks across the globe, Visa has been able to provide an international processing system for the exchange of money. The workings of a credit card transaction are such that it comprises of four main steps. These are: Authorization Batching Clearing Funding The cardholder requests a purchase from the merchant, which is then submitted to the acquirer by the merchant. The acquirer then sends a request to the issuer to authorize the transaction. Once the authorization code is sent to the acquirer verifying that credit is available, the transaction is authorized and the cardholder receives the product. (This is further explained in detail on page 9 of this document) This simple process of electronic transacting has opened up a world of e-commerce opportunities. From an information system perspective the processing workflow of an online credit card transaction is shown below: Figure 1: Online Credit Card Processing Workflow Diagram (Hubbard, 2003) Because of the vulnerabilities that lay in a transaction, more so the networks across which the information is exchanged, various security breaches can occur. Types of Credit Card Fraud There are many different types of credit card fraud. Fraudsters are very innovative in finding new ways of committing credit card crime and as technology changes so does their crime tactics. Security issues surrounding the card fraud has moved from the traditional ways of committing credit card crime (Application Fraud, Intercept Fraud and Lost/Stolen Card Fraud) to the modern techniques namely, Skimming, Site Cloning and most recently Triangulation. Skimming is the fastest growing type of credit card fraud around because of its simplicity. Pocket Skimming devices can be easily carried around and the cardholders data can be obtained by merely swiping the card through the battery-operated magnetic card reader. This technology has also evolved so as to read the data of Chip and PIN cards, with the use of a scanner. These scanners, which can write or even re-write the data on the Chip cards, are fully portable and have high storage capacities. Because some of these devices are not illegal, they are easily accessible to hackers and can be bought over the internet. Site Cloning involves cloning an entire site or just the pages where customers make purchases. Since the web pages are identical customers are not aware that their personal information is being compromised. Also, confirmation details are sent to the customer just as the official companys website would, so the crime goes undetected. The details entered on the cloned site are then used by the fraudster to commit credit card fraud. Another method of credit card fraud is Triangulation. Goods are presented on websites at discounted prices, which can be shipped to the customer before payment. Again, just as with site cloning, the site appears to be legitimate then the customer proceeds to enter their personal data. With this captured information the fraudster can then order goods from legitimate retail websites using the credit card number obtained. Due to these security issues surrounding credit card information security, there has been global industry-wide concern for the protection of cardholders data. Since security management is a systematic issue, a serious look at what can be done to prevent security breaches is necessary-whether it may be legislation, the use of fraud detection system monitors or the application of data encryption/ authentication techniques. Chip and PIN Technology Credit cards have been a feasible solution for making payment processing simple and efficient. The history of the credit card dates back to the 1900s when oil companies and proprietors created their own credit card as a means of obtaining customer loyalty and improving customer service. However, as with advances in technology, the credit cards have evolved from having just encoded magnetic stripes to modern day Chip and PIN cards, with embedded microchips, which can store and transmit data. These Chip and PIN cards were developed to provide an inter-operative system that would combat card fraud (counterfeit and plastic cards). This transaction processing infrastructure has enabled the cash-less revolution, whereby consumers, governments and businesses benefit from the electronic payment network, which has shifted payments by cash and cheques to an efficient electronic payment system. The mechanics of a credit card transaction is such that the merchant acquirer, usually the bank processes transactions on behalf of the merchant. This payment by credit card represents an offer for issuance of payment in exchange for the goods or services provided by the merchant, (Transaction Processing). There are two parts to this type of transaction processing: the first is front end processing which involves the capture of data messages across communication channels to the point of sale devices; and secondly the back end processing which involves the balancing of accounting information by acquirers and issuers and the submission of the payment to the acquiring merchants bank. As a result of the rapid advances in technology, data security continues to be a major concern as every transaction that involves the transmission data across networks is open to external attacks. Attacks on a consumers card information can come from any angle, whether it may be data thieves or network intruders. The Payment Card Industry Security Standards Council (PCI SSC), which comprises of major payment brands namely VISA, MasterCard, Discover and a few others, have created global compliance standards to protect cardholders data. These set of standards help govern and educate all merchants and organisations that process, store and transmit data, as well as the manufactures of the devices used in transaction processing. The PCI SSC (2010), Data Security Standard Quick Reference Guide, as summarized below, outlines the best practices for protecting cardholder data: Develop and Maintain a Secure Network Install and maintain firewall configuration to protect cardholders data. Do not use vendor-supplied defaults for system passwords or other security parameters. Protect cardholders data Protect stored data Encrypt transmission of cardholders data across open public networks Maintain a vulnerability management program Use and regularly update anti-virus software or programs Develop and maintain secure systems and applications Implement strong access control measures Restrict access to cardholder data by business need to know Assign a unique ID to persons with computer access Restrict physical access to cardholder data Regularly monitor and test networks Track and monitor all access to network resources and cardholder data Regularly test security systems and resources Maintain an information security policy Maintain a policy that address information security for all personnel Nevertheless, despite these procedures in place, there has been amplified instances of the various types of credit card fraud, namely Intercept Fraud, Skimming, Site Cloning as well as Triangulation. This propelled an industry and governmentà ¢Ã¢â€š ¬Ã¢â‚¬Å"led initiative in the UK to embark on the introduction of Chip and PIN card technology. Based on the EMV standard (Euro pay, MasterCard, Visa) Chip and PIN technology was launched in the UK on February 14th 2006. This programme was introduced to combat credit and debit card fraud, and to provide an ideal way of validating the cardholders identity. By utilizing smart card technology a microchip is embedded with the customers information which includes their unique four digit PIN. For transactions to be accepted, the customer PIN entered must match the one encoded on the microchip. These steps are further explained below: The card is inserted by the customer into the card reader. The card reader would then prompt the user to insert their PIN. A four-digit PIN is then entered by the customer. Once the reader accepts the PIN entered the transaction would be approved. Note the PIN entered is not displayed on the reader but rather represented by asterisks. The customer is issued a receipt as confirmation of the transaction process. This process removes the responsibility and accountability from the merchant to the customer for point of sale transactions. The card never leaves the customers hand and as such prevents skimming of ones card information. One of the benefits of the Chip and PIN cards is that the Chip itself is encrypted with a range of security features, which the transaction processing system uses to identify the cardholder. These security features are said to be virtually impossible to replicate. The terminals used for Chip and PIN transactions, use secure transmission technology to ensure the privacy of the cardholders data and can operate over a range of connectivity environments, such as wired, wireless and cellular networks. The PCI Security Standards Council also developed a framework of standards which is legally enforced through a merchant/service provider/card brand agreement. These include requirements that support the encryption of the cardholders account data and the point of sale terminal integration. Figure 2: Outline of the process of a Chip and PIN transaction The PIN entered replaces the request for signature as verification of the transaction. This is why the banking industry in the UK has campaigned for this technology, because signatures can be forged, however the PIN is unique to that person. Although the United States is yet to convert to this technology, countries such as Japan, China, Canada, Mexico as well as the majority of the European Countries have all introduced Chip and PIN technology and it is gaining momentum in various other countries including Trinidad and Tobago. Republic Bank Trinidad and Tobago Limited is the first local bank in Trinidad and Tobago to introduce Chip and PIN technology to make the concept of paying by credit card safer for cardholders. The bank adopted this type of technology because this is now an industry-wide conversion from the magnetic-stripe cards and it is also in keeping with the EMV standard. Conversely, a potential security issue with Chip and PIN card terminals is its capability of processing cards with the magnetic stripe as well. Because of this the request to enter the customers PIN can be bypassed by the merchant, with a receipt generated to be signed by the customer. Now because this option is still available it poses an added security threat to card transactions. So, unfortunately skimming still remains a huge problem for cardholders and sadly enough this includes Chip and PIN cardholders as well. Although this practice is slowly migrating from EMV compliant countries, once a card has been skimmed it can still be used in countries where the magnetic stripe is still prevalent, for example some Asian Countries and the United States. This is why many fraudsters can still create a fake card with stolen magnetic stripe information which can be used in for example the United States. The United States believes that although Chip and PIN has reduced fraud for face to face card transactions, there are a still a number of issues surrounding the security of the system used for this these transactions. Now as with any new system introduced, there have been a number of studies on whether Chip and PIN cards are really secure. So the question is has Chip and PIN technology impacted on the activities of overall card fraud or has the activities of fraudsters shifted from retail crime. In a study by Emily Finch (2010) The Impact of Chip and Pin Technology and The Activities of Fraudsters, it was recognised that since the implementation of Chip and PIN technology participants involved in card fraud made varying decisions when it came to their crime of choice. The Decision to Desist The Decision to Continue To work with others Shift to Distance Transactions Diversification of Theft into Identity The study also shows that there is a shift in the attack strategy of fraudsters from point of sale card fraud to Internet and Card Identity Fraud. In an analysis of Internet and Card Identity Fraud, we can note that Chip and PIN technology was not designed for preventing these types of card fraud. So, the question remains, was Chip and PIN successful at what it was set out to achievereduce card fraud? This too can be argued further as there are other limitations. How can one link a particular card to a specific owner? Once the PIN is known by the individual a transaction can be completed with ease. Other studies have shown that the card readers used for Chip and PIN transactions can be modified. In a study by a team of University of Cambridge Computer Scientists, they have uncovered a series of fatal flaws in the Chip and PIN system. One example is where the internal hardware can be replaced without external evidence of this. This new terminal could then be programmed and modified so that it performs just as a typical terminal, where the card details can be collected and allow criminals to make cards with a fake magnetic stripe, which along with the PIN would enable a fraudster to make valid purchases. Another example is that fraudsters can insert an electronic wedge between the stolen card and the terminal, which tricks the terminal into believing that the PIN was correctly verified. Further, with this wedge inserted, any PIN can be entered and the transaction would be verified. This type of fraud makes it difficult for the victims of the attack to be refunded by the bank as the receipt given is authentic and would state verified by PIN. The bank in turn would be accurate in stating that no refund is required as their records show verified by PIN. This type of complaint appears as an act of negligence by the cardholder as he/she allowed their PIN to be compromised. So based on this study the point of sale attacks are much more prevalent, since before the introduction of Chip and PIN cards, consumers only entered their PIN at ATMs. Now with the introduction of Chip and PIN, consumers are using their cards at various other public areas. To combat the compromising of the consumers PIN a shield over the keypad has been used as added security but in many public areas there are video cameras and a persons PIN can still be captured on footage. So, although the UK banking industry has claimed to have rolled out this new technology successfully in 2006, there seems to be some negative aspects of this technology. The architecture surrounding Chip and PIN technology is questionable and the onus is on the banking industry to ensure that cardholders information is protected. Additionally, it also seems that Chip and PIN terminals offer no difference to what the magnetic stripe terminals offered. These terminals can be tampered with, which is a clear indication that there needs to be accurate configuration of these terminals so as to secure the cardholders data when transmitting transactions and that is not vulnerable to incident of attack. So the intent of Chip and PIN technology has more so opened a new marketplace for fraudsters than prevent/reduce fraudulent activity. PROJECT DESIGN, OBJECTIVES AND RESEARCH METHODS The scope of this project is to outline the features of Chip and PIN technology and whether its implementation thus far has been beneficial. This section of the project would provide the methods involved in achieving the data for the project as well as the results based on the data collected. The chosen approach to this design is online research (journals/scholarly articles) along with a case study on the implementation of Chip and PIN technology in Trinidad and Tobago, with the case being Republic Bank Limited. Objective 1 A good foundation for this objective would be the interpretation of the credit cards history. How has this cash-less mechanism moved from a local innovation to a global payment mechanism by use of digital communication across networks? In gaining a clear understanding on the reason for the implementation of this technology, a wealth of research would be conducted on credit card technology and digital security. Objective 2 A holistic understanding on the basis of credit card fraud and the types of fraudulent activities and the steps taken to prevent credit card crime. What technologies have been implemented and the effects/benefits drawn from these approaches. Objective 3 Expanding from objective two also discussed would be whether or not since the introduction of Chip and PIN technology in the UK, has there been a cascading effect of this new technology across countries. Analysing the increasing number of fraudulent activities reported from statistics, which compelled the global banking industry to find a seamless solution for the protection of cardholders data. Objective 4 An assessment on the introduction of Chip and PIN technology by Republic Bank Limited, which would include sourcing information on its implementation and the benefits derived. Further research would be on the acceptance (or non-acceptance) of the technology by customers. Objective 5 Lastly, from the feedback received from the interview conducted and by analysing the incidents of attack on Republic Bank credit cardholders, what was the determining factor in the bank aligning themselves with the UK standards set by EMV? CONCEPTUAL FRAMEWORK In identifying the framework to be adopted that can be referenced to the literature in this research, the author considered the Delone and Mc Lean IS Success Model. Using this model, the author would explain the net benefits of adopting Chip and PIN technology, relating it to Republic Banks implementation of this technology. DeLeone and McLean IS Success Model In evaluating the success of Information Systems, the DM IS Success Model, systems quality measures the technical success, information quality measures semantic success and organisational impacts and user satisfaction measures the effectiveness of the system. The processes in the model are inter-connected by links, across the dimensions of the system. Figure 3: Depiction of the Updated Information Systems Success Model (DeLeone McLean 2002, 2003) The updated DM Model interprets the evaluation of a system in terms of the information, system, and service qualities and how these characteristics attribute to user satisfaction. As a result of using the system, certain benefits will be achieved and the net benefits will in turn (positively or negatively) influence user satisfaction and the further use of the information system. So, therefore three basic components make up this model, the creation of a system, its use and the consequences of its use. Case study as it relates to the ISS model. Republic Bank has been providing banking and financial solutions to individuals and businesses for over 160 years. Their mission is not only to provide efficient and competitively priced services but also to implement sound policies which will be beneficial to their customers. These factors presented provide clarity and influences the net benefits of the implemented Chip and PIN system at Republic Bank thus far. By use of the ISS model to map the research done in this project, the author would complete a step by step relay of the framework discussing the implementation of Chip and PIN by Republic Bank. Information Quality-Information quality refers to the accuracy/protection of the content of the data in transacting. How secure is the personalized data being transmitted across networks. When a customer presents their card to make a purchase, are they confident that their card information is protected because of the added security enabled on this card. System Quality-The system quality refers to the reliability of the network and the response time in transacting, notwithstanding the approved devices that accept personal identification numbers for all PIN based entries (the ease of use of the system functionalities). Therefore in rolling out this new technology the bank along with their partner merchants would train staff so that they are familiar with the best practice guidelines when using Chip and PIN. Service Quality-This refers to the back-end support systems that assist in usage of the technology. How reliable are Republic Banks servers and IP networks? User Satisfaction- This encompasses measuring the users entire experience-the purchase payment, receipt and service (the ease of purchasing without the fear of being a victim of fraudulent activity). Net Benefits -This is the most important success measure and it encapsulates the cost savings and the decrease in the value of fraudulent transactions arising from stolen credit card data. Was the implementation of this technology beneficial in reducing the incidents of card fraud? Are Republic Bank cardholders satisfied that their bank is on par with global industry changes? The focus of this success model lies in determining the impact the features of technology (information, system, and service quality) have on the variables user satisfaction, use, and net benefits. The main objective for using this ISS model is to establish the ultimate benefits derived from the use of information system both in individual and organizational terms. FINDINGS This chapter will illustrate the findings from the questionnaires submitted to a sample of the Republic Banks credit card customers as well as a formal interview conducted with an employee of Republic Bank Credit Card Centre. The aim of the chapter is to source an awareness of the topic area Chip and PIN by cardholders and the personnel interviewed. Primary Data Collection For the basis of the findings of this research the author conducted a formal interview with a middle management employee at Republic Bank and also distributed questionnaires to a sample of the banks credit card customers. A summarized version of the responses from the interview is represented in this chapter, based on the interviewees knowledge. The questionnaires distributed were mostly closed questions so as to deliberately avoid open-ended respondent answers. Approximately 120 questionnaires were distributed to Republic Bank Customers. Only the answers to the key questions are represented in this chapter. Summarized responses from the interview This interview was conducted with the Supervisor, Card Services, which prove to be very insightful. The Supervisor spoke about the banks vision for their credit card market, and how they plan to continuously innovate so as to maintain their customer base and attract new profitable customers. Since the credit card industry is a highly competitive one, the bank is constantly reviewing their interest rates and looking for new ways to give customer returns from the use of their credit card. Due to his long tenure at the bank and having the customer service background, the supervisor was able to give insight on what infuriates a credit card customer. He explained that customers become frustrated when they see added charges and puffed up late fees placed by the bank on their card statements. In view of the fact that most customers do not read the fine print when completing a credit card application, they are not totally aware of all the charges that can arise from delinquent payments. He f urther added that although queries like this can be explained by representatives at the bank who can provide valued solutions to the cardholders problem, the most infuriating of all queries from customers are unexplainable purchases on their account. At Republic Bank, fraudulent activity on a card can be detected from the use of their state-of-the-art security systems and their experienced fraud expert team that are in place to monitor and detect any unusual activity on a customers credit cards, but even with these measures in place, fraud can occur. The supervisor expressed that by implementing Chip and PIN technology for credit cards, the bank was able to be a step ahead of the competition and most importantly the card criminals. He also stated that although credit card fraud is not as prevalent in Trinidad and Tobago as in the developed countries, continuous education in counteracting fraudulent activities for their customer base is an effective method of addressing credit card fraud. He explained that Republic Bank has not had many eye-opening occurrences of notified credit card fraud but they believe that Chip and PIN technology is an innovative solution to the likelihood of this problem. He was also truthful in expressing that this technology is still new to the industry and all merchants have yet to convert to Chip and PIN enabled machines, therefore there is a window of opportunity for fraud until merchants are mandated to have these Chip and PIN enabled machines. He used the term mandate, because eventually all Republic Bank debit cards would also be chip enabled. In summing up the interview the author probed the supervisor on the banks position on the studies done by the University of Cambridge team on Chip and PIN technology and the tested flaws of the system. His response was quite interesting, because it ventured into a thought-provoking discussion on research. He lamented that the sphere of research done on any topic would result in the researcher seeking out the positive and negative aspects of it. How the data is interpreted, reflects the real value of the research done. Questionnaire Findings Question 5: How often and where do you frequently use your credit card to make purchases? Aim: To assess how often the average Republic Bank cardholder uses their credit card. Findings: Most Republic Cardholders in this study used their credit card regularly, at least five times per month. Credit Cards are used for purchases at the supermarket, restaurant and retail clothing stores. Question 6: Has your credit card information ever been compromised? If yes provide details. Aim: To determine the number of incidents of attack on Republic Bank credit card holders. Findings: Less than 50% of the respondents have never had their credit card data compromised. Question 7: Do you understand the workings of Chip and PIN technology introduced to Republic Bank credit cardholders and the value to be derived from using this technology? Aim: To determine the extent of the customers perception of this technologys value and how the card is used. Findings: Although some customers are guarded about the use of their credit cards, most of the respondents are confident in the service that Republic Bank provides and believes that implementing Chip and PIN gives them that added security against fraudulent activities, especially those customers that frequently travel abroad. Question 8: How do you think by using Chip and PIN cards for making payments will make it easier in transacting? Aim: To establish the efficiencies in the use of Chip and PIN cards, on the time taken to complete a transaction. Findings: Many customers applaud this technology as it reduces the time taken at the cash register when making purchases. It is simple, easy and convenient and most customers are truly happy as there is no need to write their signature. For this reason they find the system most efficient as it prevents their signature from the likelihood of being forged. ANALYSIS The main objective for the research completed on this topic, was to show how and to what extent the adoption of Chip and PIN technology has improved credit card security for Republic Bank cardholders. At a glance, before Chip and PIN technology was introduced in the UK, there was nation-wide educational literature on the benefits of the technology for banks, merchants and most importantly, the customers. However, it seems that this programme led by EMV, created more enthusiasm in the build-up to its implementation rather than the actual usage of the system. From the research, the mounting negative features of the technology and use of the system is outweighed the decreasing positive ones. It seems that the card theft criminals were focused on a solution to obstruct the successful use of the technology before the intention to use. The question remains, which facet of credit card fraud has Chip and PIN really reduced? The research show that for point of sale transactions Chip and PIN has been useful in the prevention of skimming ones card information, however the fraudsters have found alternative ways to improve on that tactic. Chip and PIN technology can only be used à ¢Ã¢â€š ¬Ã…“successfullyà ¢Ã¢â€š ¬? for point of sale transactions and not online transactions, so fraudsters have modified their techniques as with the modifications of the technology. Based on the research framework adopted, Republic Bank has measured their net benefits of adopting the Chip and PIN technology by encircling the information, service and system qualities to deliver user satisfaction and usage of the system with this technology. The success of any information system is multi-dimensional and the relationships among the constructs relate to the comprehensive evaluation of the system. The variable dependent on these constructs are the net benefits of this system, and for whom? This local company has app Card Security For Republic Bank Customers Card Security For Republic Bank Customers There is no doubt that most organisations today are becoming essentially dependant on the use of credit cards, arguably its most strategic asset, is to support existing business operations. However, credit card fraud and identity theft has continued to plague the banking and retail industries as there seems to be no feasible solution to these crimes. Advances in technology have opened a gateway for hackers to restructure their position of attack, intruding on ones personal life. The basis of this project is on the new Chip and PIN technology introduced on credit cards. Ive considered this to be an interesting topic because of the publicity this technology has been receiving across the world and it has even reached to our shores, here in Trinidad and Tobago. Hence, Republic Bank Limited one of the local banks would be the case studied in this research. Chapter two would encompass the existing literature on credit card history and Chip and PIN. This chapter would outline how credit cards have become smart cards and how the Chip and PIN cards are used. Chapter three gives the entire design of the project and the objectives to be obtained for the research. Moving to chapter four, the research framework adopted for this study on Chip and PIN and how it relates to the model undertaken in the research. The findings from this research would be summarized version of the data collected, with the analysis of the theory and research framework the author undertook in this study. In concluding, the author would report on the learning aspects of the research and provide an assessment of achievements, giving a position on the research question. Literature REVIEW This section is intended to place the scope of the project with literature surrounding the components of the research question. The Credit Card Transaction Process Discussed This payment mechanism was formally introduced in 1958, when the BankAmericard card, now known as Visa was franchised across the global community. By introducing an electronic authorization system, the BankAmericard was able to be used globally. Now by partnering with banks across the globe, Visa has been able to provide an international processing system for the exchange of money. The workings of a credit card transaction are such that it comprises of four main steps. These are: Authorization Batching Clearing Funding The cardholder requests a purchase from the merchant, which is then submitted to the acquirer by the merchant. The acquirer then sends a request to the issuer to authorize the transaction. Once the authorization code is sent to the acquirer verifying that credit is available, the transaction is authorized and the cardholder receives the product. (This is further explained in detail on page 9 of this document) This simple process of electronic transacting has opened up a world of e-commerce opportunities. From an information system perspective the processing workflow of an online credit card transaction is shown below: Figure 1: Online Credit Card Processing Workflow Diagram (Hubbard, 2003) Because of the vulnerabilities that lay in a transaction, more so the networks across which the information is exchanged, various security breaches can occur. Types of Credit Card Fraud There are many different types of credit card fraud. Fraudsters are very innovative in finding new ways of committing credit card crime and as technology changes so does their crime tactics. Security issues surrounding the card fraud has moved from the traditional ways of committing credit card crime (Application Fraud, Intercept Fraud and Lost/Stolen Card Fraud) to the modern techniques namely, Skimming, Site Cloning and most recently Triangulation. Skimming is the fastest growing type of credit card fraud around because of its simplicity. Pocket Skimming devices can be easily carried around and the cardholders data can be obtained by merely swiping the card through the battery-operated magnetic card reader. This technology has also evolved so as to read the data of Chip and PIN cards, with the use of a scanner. These scanners, which can write or even re-write the data on the Chip cards, are fully portable and have high storage capacities. Because some of these devices are not illegal, they are easily accessible to hackers and can be bought over the internet. Site Cloning involves cloning an entire site or just the pages where customers make purchases. Since the web pages are identical customers are not aware that their personal information is being compromised. Also, confirmation details are sent to the customer just as the official companys website would, so the crime goes undetected. The details entered on the cloned site are then used by the fraudster to commit credit card fraud. Another method of credit card fraud is Triangulation. Goods are presented on websites at discounted prices, which can be shipped to the customer before payment. Again, just as with site cloning, the site appears to be legitimate then the customer proceeds to enter their personal data. With this captured information the fraudster can then order goods from legitimate retail websites using the credit card number obtained. Due to these security issues surrounding credit card information security, there has been global industry-wide concern for the protection of cardholders data. Since security management is a systematic issue, a serious look at what can be done to prevent security breaches is necessary-whether it may be legislation, the use of fraud detection system monitors or the application of data encryption/ authentication techniques. Chip and PIN Technology Credit cards have been a feasible solution for making payment processing simple and efficient. The history of the credit card dates back to the 1900s when oil companies and proprietors created their own credit card as a means of obtaining customer loyalty and improving customer service. However, as with advances in technology, the credit cards have evolved from having just encoded magnetic stripes to modern day Chip and PIN cards, with embedded microchips, which can store and transmit data. These Chip and PIN cards were developed to provide an inter-operative system that would combat card fraud (counterfeit and plastic cards). This transaction processing infrastructure has enabled the cash-less revolution, whereby consumers, governments and businesses benefit from the electronic payment network, which has shifted payments by cash and cheques to an efficient electronic payment system. The mechanics of a credit card transaction is such that the merchant acquirer, usually the bank processes transactions on behalf of the merchant. This payment by credit card represents an offer for issuance of payment in exchange for the goods or services provided by the merchant, (Transaction Processing). There are two parts to this type of transaction processing: the first is front end processing which involves the capture of data messages across communication channels to the point of sale devices; and secondly the back end processing which involves the balancing of accounting information by acquirers and issuers and the submission of the payment to the acquiring merchants bank. As a result of the rapid advances in technology, data security continues to be a major concern as every transaction that involves the transmission data across networks is open to external attacks. Attacks on a consumers card information can come from any angle, whether it may be data thieves or network intruders. The Payment Card Industry Security Standards Council (PCI SSC), which comprises of major payment brands namely VISA, MasterCard, Discover and a few others, have created global compliance standards to protect cardholders data. These set of standards help govern and educate all merchants and organisations that process, store and transmit data, as well as the manufactures of the devices used in transaction processing. The PCI SSC (2010), Data Security Standard Quick Reference Guide, as summarized below, outlines the best practices for protecting cardholder data: Develop and Maintain a Secure Network Install and maintain firewall configuration to protect cardholders data. Do not use vendor-supplied defaults for system passwords or other security parameters. Protect cardholders data Protect stored data Encrypt transmission of cardholders data across open public networks Maintain a vulnerability management program Use and regularly update anti-virus software or programs Develop and maintain secure systems and applications Implement strong access control measures Restrict access to cardholder data by business need to know Assign a unique ID to persons with computer access Restrict physical access to cardholder data Regularly monitor and test networks Track and monitor all access to network resources and cardholder data Regularly test security systems and resources Maintain an information security policy Maintain a policy that address information security for all personnel Nevertheless, despite these procedures in place, there has been amplified instances of the various types of credit card fraud, namely Intercept Fraud, Skimming, Site Cloning as well as Triangulation. This propelled an industry and governmentà ¢Ã¢â€š ¬Ã¢â‚¬Å"led initiative in the UK to embark on the introduction of Chip and PIN card technology. Based on the EMV standard (Euro pay, MasterCard, Visa) Chip and PIN technology was launched in the UK on February 14th 2006. This programme was introduced to combat credit and debit card fraud, and to provide an ideal way of validating the cardholders identity. By utilizing smart card technology a microchip is embedded with the customers information which includes their unique four digit PIN. For transactions to be accepted, the customer PIN entered must match the one encoded on the microchip. These steps are further explained below: The card is inserted by the customer into the card reader. The card reader would then prompt the user to insert their PIN. A four-digit PIN is then entered by the customer. Once the reader accepts the PIN entered the transaction would be approved. Note the PIN entered is not displayed on the reader but rather represented by asterisks. The customer is issued a receipt as confirmation of the transaction process. This process removes the responsibility and accountability from the merchant to the customer for point of sale transactions. The card never leaves the customers hand and as such prevents skimming of ones card information. One of the benefits of the Chip and PIN cards is that the Chip itself is encrypted with a range of security features, which the transaction processing system uses to identify the cardholder. These security features are said to be virtually impossible to replicate. The terminals used for Chip and PIN transactions, use secure transmission technology to ensure the privacy of the cardholders data and can operate over a range of connectivity environments, such as wired, wireless and cellular networks. The PCI Security Standards Council also developed a framework of standards which is legally enforced through a merchant/service provider/card brand agreement. These include requirements that support the encryption of the cardholders account data and the point of sale terminal integration. Figure 2: Outline of the process of a Chip and PIN transaction The PIN entered replaces the request for signature as verification of the transaction. This is why the banking industry in the UK has campaigned for this technology, because signatures can be forged, however the PIN is unique to that person. Although the United States is yet to convert to this technology, countries such as Japan, China, Canada, Mexico as well as the majority of the European Countries have all introduced Chip and PIN technology and it is gaining momentum in various other countries including Trinidad and Tobago. Republic Bank Trinidad and Tobago Limited is the first local bank in Trinidad and Tobago to introduce Chip and PIN technology to make the concept of paying by credit card safer for cardholders. The bank adopted this type of technology because this is now an industry-wide conversion from the magnetic-stripe cards and it is also in keeping with the EMV standard. Conversely, a potential security issue with Chip and PIN card terminals is its capability of processing cards with the magnetic stripe as well. Because of this the request to enter the customers PIN can be bypassed by the merchant, with a receipt generated to be signed by the customer. Now because this option is still available it poses an added security threat to card transactions. So, unfortunately skimming still remains a huge problem for cardholders and sadly enough this includes Chip and PIN cardholders as well. Although this practice is slowly migrating from EMV compliant countries, once a card has been skimmed it can still be used in countries where the magnetic stripe is still prevalent, for example some Asian Countries and the United States. This is why many fraudsters can still create a fake card with stolen magnetic stripe information which can be used in for example the United States. The United States believes that although Chip and PIN has reduced fraud for face to face card transactions, there are a still a number of issues surrounding the security of the system used for this these transactions. Now as with any new system introduced, there have been a number of studies on whether Chip and PIN cards are really secure. So the question is has Chip and PIN technology impacted on the activities of overall card fraud or has the activities of fraudsters shifted from retail crime. In a study by Emily Finch (2010) The Impact of Chip and Pin Technology and The Activities of Fraudsters, it was recognised that since the implementation of Chip and PIN technology participants involved in card fraud made varying decisions when it came to their crime of choice. The Decision to Desist The Decision to Continue To work with others Shift to Distance Transactions Diversification of Theft into Identity The study also shows that there is a shift in the attack strategy of fraudsters from point of sale card fraud to Internet and Card Identity Fraud. In an analysis of Internet and Card Identity Fraud, we can note that Chip and PIN technology was not designed for preventing these types of card fraud. So, the question remains, was Chip and PIN successful at what it was set out to achievereduce card fraud? This too can be argued further as there are other limitations. How can one link a particular card to a specific owner? Once the PIN is known by the individual a transaction can be completed with ease. Other studies have shown that the card readers used for Chip and PIN transactions can be modified. In a study by a team of University of Cambridge Computer Scientists, they have uncovered a series of fatal flaws in the Chip and PIN system. One example is where the internal hardware can be replaced without external evidence of this. This new terminal could then be programmed and modified so that it performs just as a typical terminal, where the card details can be collected and allow criminals to make cards with a fake magnetic stripe, which along with the PIN would enable a fraudster to make valid purchases. Another example is that fraudsters can insert an electronic wedge between the stolen card and the terminal, which tricks the terminal into believing that the PIN was correctly verified. Further, with this wedge inserted, any PIN can be entered and the transaction would be verified. This type of fraud makes it difficult for the victims of the attack to be refunded by the bank as the receipt given is authentic and would state verified by PIN. The bank in turn would be accurate in stating that no refund is required as their records show verified by PIN. This type of complaint appears as an act of negligence by the cardholder as he/she allowed their PIN to be compromised. So based on this study the point of sale attacks are much more prevalent, since before the introduction of Chip and PIN cards, consumers only entered their PIN at ATMs. Now with the introduction of Chip and PIN, consumers are using their cards at various other public areas. To combat the compromising of the consumers PIN a shield over the keypad has been used as added security but in many public areas there are video cameras and a persons PIN can still be captured on footage. So, although the UK banking industry has claimed to have rolled out this new technology successfully in 2006, there seems to be some negative aspects of this technology. The architecture surrounding Chip and PIN technology is questionable and the onus is on the banking industry to ensure that cardholders information is protected. Additionally, it also seems that Chip and PIN terminals offer no difference to what the magnetic stripe terminals offered. These terminals can be tampered with, which is a clear indication that there needs to be accurate configuration of these terminals so as to secure the cardholders data when transmitting transactions and that is not vulnerable to incident of attack. So the intent of Chip and PIN technology has more so opened a new marketplace for fraudsters than prevent/reduce fraudulent activity. PROJECT DESIGN, OBJECTIVES AND RESEARCH METHODS The scope of this project is to outline the features of Chip and PIN technology and whether its implementation thus far has been beneficial. This section of the project would provide the methods involved in achieving the data for the project as well as the results based on the data collected. The chosen approach to this design is online research (journals/scholarly articles) along with a case study on the implementation of Chip and PIN technology in Trinidad and Tobago, with the case being Republic Bank Limited. Objective 1 A good foundation for this objective would be the interpretation of the credit cards history. How has this cash-less mechanism moved from a local innovation to a global payment mechanism by use of digital communication across networks? In gaining a clear understanding on the reason for the implementation of this technology, a wealth of research would be conducted on credit card technology and digital security. Objective 2 A holistic understanding on the basis of credit card fraud and the types of fraudulent activities and the steps taken to prevent credit card crime. What technologies have been implemented and the effects/benefits drawn from these approaches. Objective 3 Expanding from objective two also discussed would be whether or not since the introduction of Chip and PIN technology in the UK, has there been a cascading effect of this new technology across countries. Analysing the increasing number of fraudulent activities reported from statistics, which compelled the global banking industry to find a seamless solution for the protection of cardholders data. Objective 4 An assessment on the introduction of Chip and PIN technology by Republic Bank Limited, which would include sourcing information on its implementation and the benefits derived. Further research would be on the acceptance (or non-acceptance) of the technology by customers. Objective 5 Lastly, from the feedback received from the interview conducted and by analysing the incidents of attack on Republic Bank credit cardholders, what was the determining factor in the bank aligning themselves with the UK standards set by EMV? CONCEPTUAL FRAMEWORK In identifying the framework to be adopted that can be referenced to the literature in this research, the author considered the Delone and Mc Lean IS Success Model. Using this model, the author would explain the net benefits of adopting Chip and PIN technology, relating it to Republic Banks implementation of this technology. DeLeone and McLean IS Success Model In evaluating the success of Information Systems, the DM IS Success Model, systems quality measures the technical success, information quality measures semantic success and organisational impacts and user satisfaction measures the effectiveness of the system. The processes in the model are inter-connected by links, across the dimensions of the system. Figure 3: Depiction of the Updated Information Systems Success Model (DeLeone McLean 2002, 2003) The updated DM Model interprets the evaluation of a system in terms of the information, system, and service qualities and how these characteristics attribute to user satisfaction. As a result of using the system, certain benefits will be achieved and the net benefits will in turn (positively or negatively) influence user satisfaction and the further use of the information system. So, therefore three basic components make up this model, the creation of a system, its use and the consequences of its use. Case study as it relates to the ISS model. Republic Bank has been providing banking and financial solutions to individuals and businesses for over 160 years. Their mission is not only to provide efficient and competitively priced services but also to implement sound policies which will be beneficial to their customers. These factors presented provide clarity and influences the net benefits of the implemented Chip and PIN system at Republic Bank thus far. By use of the ISS model to map the research done in this project, the author would complete a step by step relay of the framework discussing the implementation of Chip and PIN by Republic Bank. Information Quality-Information quality refers to the accuracy/protection of the content of the data in transacting. How secure is the personalized data being transmitted across networks. When a customer presents their card to make a purchase, are they confident that their card information is protected because of the added security enabled on this card. System Quality-The system quality refers to the reliability of the network and the response time in transacting, notwithstanding the approved devices that accept personal identification numbers for all PIN based entries (the ease of use of the system functionalities). Therefore in rolling out this new technology the bank along with their partner merchants would train staff so that they are familiar with the best practice guidelines when using Chip and PIN. Service Quality-This refers to the back-end support systems that assist in usage of the technology. How reliable are Republic Banks servers and IP networks? User Satisfaction- This encompasses measuring the users entire experience-the purchase payment, receipt and service (the ease of purchasing without the fear of being a victim of fraudulent activity). Net Benefits -This is the most important success measure and it encapsulates the cost savings and the decrease in the value of fraudulent transactions arising from stolen credit card data. Was the implementation of this technology beneficial in reducing the incidents of card fraud? Are Republic Bank cardholders satisfied that their bank is on par with global industry changes? The focus of this success model lies in determining the impact the features of technology (information, system, and service quality) have on the variables user satisfaction, use, and net benefits. The main objective for using this ISS model is to establish the ultimate benefits derived from the use of information system both in individual and organizational terms. FINDINGS This chapter will illustrate the findings from the questionnaires submitted to a sample of the Republic Banks credit card customers as well as a formal interview conducted with an employee of Republic Bank Credit Card Centre. The aim of the chapter is to source an awareness of the topic area Chip and PIN by cardholders and the personnel interviewed. Primary Data Collection For the basis of the findings of this research the author conducted a formal interview with a middle management employee at Republic Bank and also distributed questionnaires to a sample of the banks credit card customers. A summarized version of the responses from the interview is represented in this chapter, based on the interviewees knowledge. The questionnaires distributed were mostly closed questions so as to deliberately avoid open-ended respondent answers. Approximately 120 questionnaires were distributed to Republic Bank Customers. Only the answers to the key questions are represented in this chapter. Summarized responses from the interview This interview was conducted with the Supervisor, Card Services, which prove to be very insightful. The Supervisor spoke about the banks vision for their credit card market, and how they plan to continuously innovate so as to maintain their customer base and attract new profitable customers. Since the credit card industry is a highly competitive one, the bank is constantly reviewing their interest rates and looking for new ways to give customer returns from the use of their credit card. Due to his long tenure at the bank and having the customer service background, the supervisor was able to give insight on what infuriates a credit card customer. He explained that customers become frustrated when they see added charges and puffed up late fees placed by the bank on their card statements. In view of the fact that most customers do not read the fine print when completing a credit card application, they are not totally aware of all the charges that can arise from delinquent payments. He f urther added that although queries like this can be explained by representatives at the bank who can provide valued solutions to the cardholders problem, the most infuriating of all queries from customers are unexplainable purchases on their account. At Republic Bank, fraudulent activity on a card can be detected from the use of their state-of-the-art security systems and their experienced fraud expert team that are in place to monitor and detect any unusual activity on a customers credit cards, but even with these measures in place, fraud can occur. The supervisor expressed that by implementing Chip and PIN technology for credit cards, the bank was able to be a step ahead of the competition and most importantly the card criminals. He also stated that although credit card fraud is not as prevalent in Trinidad and Tobago as in the developed countries, continuous education in counteracting fraudulent activities for their customer base is an effective method of addressing credit card fraud. He explained that Republic Bank has not had many eye-opening occurrences of notified credit card fraud but they believe that Chip and PIN technology is an innovative solution to the likelihood of this problem. He was also truthful in expressing that this technology is still new to the industry and all merchants have yet to convert to Chip and PIN enabled machines, therefore there is a window of opportunity for fraud until merchants are mandated to have these Chip and PIN enabled machines. He used the term mandate, because eventually all Republic Bank debit cards would also be chip enabled. In summing up the interview the author probed the supervisor on the banks position on the studies done by the University of Cambridge team on Chip and PIN technology and the tested flaws of the system. His response was quite interesting, because it ventured into a thought-provoking discussion on research. He lamented that the sphere of research done on any topic would result in the researcher seeking out the positive and negative aspects of it. How the data is interpreted, reflects the real value of the research done. Questionnaire Findings Question 5: How often and where do you frequently use your credit card to make purchases? Aim: To assess how often the average Republic Bank cardholder uses their credit card. Findings: Most Republic Cardholders in this study used their credit card regularly, at least five times per month. Credit Cards are used for purchases at the supermarket, restaurant and retail clothing stores. Question 6: Has your credit card information ever been compromised? If yes provide details. Aim: To determine the number of incidents of attack on Republic Bank credit card holders. Findings: Less than 50% of the respondents have never had their credit card data compromised. Question 7: Do you understand the workings of Chip and PIN technology introduced to Republic Bank credit cardholders and the value to be derived from using this technology? Aim: To determine the extent of the customers perception of this technologys value and how the card is used. Findings: Although some customers are guarded about the use of their credit cards, most of the respondents are confident in the service that Republic Bank provides and believes that implementing Chip and PIN gives them that added security against fraudulent activities, especially those customers that frequently travel abroad. Question 8: How do you think by using Chip and PIN cards for making payments will make it easier in transacting? Aim: To establish the efficiencies in the use of Chip and PIN cards, on the time taken to complete a transaction. Findings: Many customers applaud this technology as it reduces the time taken at the cash register when making purchases. It is simple, easy and convenient and most customers are truly happy as there is no need to write their signature. For this reason they find the system most efficient as it prevents their signature from the likelihood of being forged. ANALYSIS The main objective for the research completed on this topic, was to show how and to what extent the adoption of Chip and PIN technology has improved credit card security for Republic Bank cardholders. At a glance, before Chip and PIN technology was introduced in the UK, there was nation-wide educational literature on the benefits of the technology for banks, merchants and most importantly, the customers. However, it seems that this programme led by EMV, created more enthusiasm in the build-up to its implementation rather than the actual usage of the system. From the research, the mounting negative features of the technology and use of the system is outweighed the decreasing positive ones. It seems that the card theft criminals were focused on a solution to obstruct the successful use of the technology before the intention to use. The question remains, which facet of credit card fraud has Chip and PIN really reduced? The research show that for point of sale transactions Chip and PIN has been useful in the prevention of skimming ones card information, however the fraudsters have found alternative ways to improve on that tactic. Chip and PIN technology can only be used à ¢Ã¢â€š ¬Ã…“successfullyà ¢Ã¢â€š ¬? for point of sale transactions and not online transactions, so fraudsters have modified their techniques as with the modifications of the technology. Based on the research framework adopted, Republic Bank has measured their net benefits of adopting the Chip and PIN technology by encircling the information, service and system qualities to deliver user satisfaction and usage of the system with this technology. The success of any information system is multi-dimensional and the relationships among the constructs relate to the comprehensive evaluation of the system. The variable dependent on these constructs are the net benefits of this system, and for whom? This local company has app