Sunday, December 29, 2019
Plato And Aristotle s Views On Plato s Philosophy
-INTRO: Plato and Aristotle are two of the most influential Greek philosophers of history. It would be just to say that Platoââ¬â¢s philosophical views were greatly influenced by his mentor, Socrates. Over time, Aristotle found solemn in Platoââ¬â¢s teachings and became his pupil. The philosophical theories that were originally conceived by Socrates passed from Plato, to Aristotle. In a perfect world, it would be nice to entertain the belief that Aristotleââ¬â¢s beliefs resembled his mentor, Platoââ¬â¢s and Platoââ¬â¢s mentor, Socrates. However, this is farthest from the truth. -SUMMARY OF PLATO GORGIAS: Gorgias is a dialogue text written by Plato, in which Gorgias, a Sicilian philosopher, orator, and rhetorician is in opposition to the beliefs of Platoââ¬â¢s mentor, Socrates. The exchanged begins following Gorgiasââ¬â¢s speech at an exhibition. Socrates was offered to question Gorgias for as long as he pleased, for he wanted to ââ¬Å"hear from him what is the nature of his art, and what it is which he professes and teachesâ⬠. Socrates begins by asking Gorgias what he and rhetoric is, to which he responds in a smooth, sophisticated manner, avoiding the questions entirely. He referred to rhetoric as an art. Although Gorgias avidly practiced rhetoric, he was not compelling when answering Socratesââ¬â¢s questions. Instead, he provided short responses. Socrates did not view rhetoric as an art. However, he was utilizing this ââ¬Ëartââ¬â¢ when asking Gorgias questions. His mission was to persuade the speakers at thisShow MoreRelatedPlato And Aristotle s Views On The Greek Philosophy1128 Words à |à 5 PagesSocrates, Plato and Aristotle, the three original thinkers and intelligent teachers of ancient Greece, together made the Greek philosophy reach its highest state and also opened up a new world of western philosophy and culture. Among three of them, Socrates was the very first one who appeared in history, and was the very first teacher and spreader of ancient Greek philosophy. His entire life was a legend that he had numbers of followers and students. However, unlike Plato and Aristotle, this greatRead MorePlato And Aristotle s Views On Philosophy1107 Words à |à 5 PagesThroughout the history of philosophy, the thoughts and works of two men have intertwined their way into the philosophers to follow. The two men were followers of Socrates; thus, technically, Socrates can take some of the credit. These two men are Plato and Aristotle. The Platonic and Aristotelian ideas of philosophy are contradicting but equally re presented in their influence. Plato believed that to find truth, one must look to the metaphysical world beyond reality. He believed this because he thoughtRead MorePlato And Aristotle s Views On Political Philosophy Essay3649 Words à |à 15 PagesIntroduction: The term ââ¬Å"Political Philosophyâ⬠is a normative study of state, government, relationships between individual and communities, laws, rights and justice. It depends on the philosophers that can be entangled with ethics, economics and also metaphysics. Political thinkers are the pioneers of ââ¬Å"Modern Politicsâ⬠in the world. The first serious political thinkers emerged in Greece. Plato and Aristotle are two great philosophers of ancient Greece. Plato in his book ââ¬Å"The Republicâ⬠delivers theRead MorePlato And Aristotle s Views On Life794 Words à |à 4 PagesAnalogy of Plato and Aristotle Aristotle and Plato were each great intellectual however their views on life are totally different. Plato was born round the year 428 BCE in Athens. (Plato) Plato was then introduce to was introduced to philosophy by Socrates in 469-399 B.C.( Plato)Who then became is mentor, however Socrates died , however shortly after his mentor die he had an an inspiration to induce his into politics this then lead him to be educated in Mediterranean. Plato then startedRead MoreAristotle s Contributions Of Aristotle931 Words à |à 4 PagesBiography of Aristotle Aristotle Headshot Aristotle was born in 384 BC, in Stagira, near Macedonia at the northern end of the Aegean Sea. His father, Nicomachus, was the family physician of King Amyntas of Macedonia. It is believed that Aristotle s ancestors had been the physicians of the Macedonian royal family for several generations. Having come from a long line of physicians, Aristotle received training and education that inclined his mind toward the study of natural phenomena. This educationRead MorePlato s Interpretation Of Utopia1630 Words à |à 7 PagesPlato and Aristotle shared many differences despite also sharing a teacher student relationship. This essay will strive to establish their understandings of reason and the role reason plays in their comprehensions of politics, differentiating between the kinds of reason and politics produced as a result. Plato is regarded as the first writer of political philosophy while Aristotle is recognised as the first political scientist. Platoââ¬â¢s interpretation of Utopia is founded upon the existence of threeRead MoreSocrates And Aristotle s Life1491 Words à |à 6 Pagesphilosopher Aristotle is widely thought to have said, The ultimate value of life depends upon awareness and the power of contemplation rather than upon mere survival. The earliest accounts of human history chronicle the struggle for survival against all odds. It is therefore remarkable that roughly 2400 years ago the question of virtue was raised, let alone contemplated at great length, forming a foundation upon which Western philosophers build to the present day. Socrates and Aristotle were twoRead MoreEssay about Comparison of Plato and Aristotleââ¬â¢s Philosophies1217 Words à |à 5 PagesAntonio Burkes Philosophy 1 June 4, 2001 Comparison of Plato and Aristotleââ¬â¢s Philosophies Plato and Aristotle are both great philosophers in their own regard. Both agree that the world has a purpose, and that itââ¬â¢s not just an accident. Both also hate materialists since in their (materialistsââ¬â¢) interpretation of the world, value, choice, and freedom are not plausible outcomes, and so morality and rationality do not make sense. And both ask the same question, what does it take to be a goodRead MoreAristotle s Realism Philosophy And Philosophy1590 Words à |à 7 PagesAristotleââ¬â¢s Realism Philosophy Realism is an educational philosophy; furthermore it is a teaching that stresses knowledge that develops from one s own senses.in my opinion this is great idea for educational philosphy, because it shows that sense deveolpement is the realest possible learning to have. Under this philosophy the idea exists that there is a real world not constructed by human minds, that can be known by one s own mind. It is through experiencing the world around everyone in whichRead MorePolitical Philosophy, By Steven Cahn1197 Words à |à 5 PagesIn Steven Cahn s book, Political Philosophy, The Essential Texts, philosophers such as Socrates, Plato, Aristotle, Hobbes, Locke and Rousseau created the circumstances to enable the fundamental principals of philosophy and politics. These knowledgeable, astute and significant men have helped to achieve the structure of our past and present democracy as well as a plan of action for the rights and values that we as citizens can all relate to today. They are grounded in their thinking and tied together
Saturday, December 21, 2019
The Absurdity of Man Essay - 621 Words
Absurdity is defined as that which is contrary to reason; clearly untrue, unreasonable or ridiculous. It is often a topic in existentialist writings relating to life. This subject is prevalent in Camusââ¬â¢ ââ¬Å"The Strangerâ⬠and ââ¬Å"The Myth of Sisyphus.â⬠Camus depicts absurdity bringing about happiness or indifference in each of these literary works. In ââ¬Å"The Myth of Sisyphus,â⬠it is made clear that Sisyphus is aware that his existence is absurd. He is sentenced to an eternity of rolling a boulder up a steep mountain only to let it roll back down when it reaches its peak. His tragedy lies in the fact that he is conscious of the extent of his own misery. What makes his struggle very absurd is that he knows that there is no death at the end of it.â⬠¦show more contentâ⬠¦The fact that Meursaultââ¬â¢s indifference led him outside the ââ¬Å"conventionalâ⬠moral code, was what brought about his death sentence. He was convicted because he adm itted that he felt no sadness over his mother dying, not because he killed a man. The only thing that concerned him was his upcoming execution, and he felt that his stay in prison was the same as living in his apartment. The few hours before his death is when Meursault begins to ââ¬Å"live.â⬠He realizes the change that is going to take place is permanent and final. This is when he awakens to absurdity, believing that death is just as meaningless as life. His lack of understanding of change was what had caused his indifference. He realized that everyone is ââ¬Å"privilegedâ⬠with one unavoidable change in life, which is death. He never actually ââ¬Å"livesâ⬠until change in his life is imminent. Meursaultââ¬â¢s absurdity achieves happiness as well. He realizes that before he was imprisoned he was happy, he had a good job and a girlfriend and nothing really to complain about. Since he also realizes his absurdity and has a reason for his indifference, he is happy. Once he realizes that life or death will achieve the same thing in his situation, heââ¬â¢s not concerned withShow MoreRelatedExistentialism in Invisible Man by Ralph Ellison Essay573 Words à |à 3 PagesRalph Ellisonââ¬â¢s Invisible Man tells the story of an intelligent black man who has been oppressed by various people throughout his life. Ellisonââ¬â¢s novel proves to be deeply existential, showing the essence of what it means to be a human being and actually existing with others while at the same time being independent. The nameless protagonist deals endlessly with authenticity, absurdity, and alienationââ¬âconditions Ellison links to the harsh realities of being black in America. This protagonist triesRead MoreThe Criticistity Of Absurdity In The Stranger By Albert Camus944 Words à |à 4 Pagesthis novel, I noticed how Camus involves his philosophical belief of absurdity through the main character. Absurdity is the state of being ridiculous or widely unreasonab le. The main character in this novel fits that definition perfectly. The main characters name was Meursault. I was able to tell after the the first few pages that the way he thought and the way that he viewed life was absurd. The first example of absurdity that I noticed was in the first 1 chapter. The novel opens with himRead MoreWhat is Mans Purpose for Living in Albert Camus The Stranger785 Words à |à 3 Pagesthat we do, but what about lifeââ¬â¢s intention? What is the meaning of manââ¬â¢s existence? Does man have a meaning, a reason or a purpose for him to be living at all? Is there something of significance or importance in oneââ¬â¢s life that he/she chooses to live for? As man opts to think and recognize that the world is pointless or that it is preposterous, or rather absurd, one leans towards the viewpoint of absurdity. This philosophical view encompasses the author of The Stranger, Albert Camus. Almost a yearRead More The Hitchhikerââ¬â¢s Guide to the Galaxy Essay1121 Words à |à 5 Pagesfilm adaption, portrays absurdity to be an all-encompassing system in the universe. Through the introduction and attempt to understand lack of reason, the narration of important elements and the human perception of the universe, the novel is as a whole, more complete than the film. With these points it is irrefutable that The Hitchhikerââ¬â¢s Guide to the Galaxy develops the theme of absurdity with greater prowess than the film, resulting in a deeper understanding of absurdity, with an outlook the readerRead MoreMr. Big, The Whore Of Mensa, And The Kuglemass Episode1597 Words à |à 7 PagesA Discussion of Satire, Humor, and Absurdity in Woody Allenââ¬â¢s ââ¬Å"Mr. Big,â⬠ââ¬Å"The Whore of Mensa,â⬠and ââ¬Å"The Kuglemass Episodeâ⬠ââ¬Å"It is my only regret in life that I am not someone elseâ⬠(Good Reads, 2017). This famous Woody Allen quote reflects a reason why he may love to write: so he can be someone else for a short while. To top it off Allen is an expert at using satire, humor and absurdity to entertain his audience. As one best storytellers of the twenty first century, he has a way of reaching hisRead MoreThe Stranger by Camus1492 Words à |à 6 PagesChristine Walsh Mr. Adams Period 7 AP Language Composition September 17, 2012 ââ¬Å"Everything is true and nothing is true!â⬠: Meursaultââ¬â¢s Plague with Human Absurdity in Camusââ¬â¢s The Stranger In accordance with natural human behavior, we feel as though for every action there is a reaction, as well as a reason. We vie to inject logic inside our world because to accept the idea that there is not rationale for anything, including our own existence, is unthinkable. This idea that we unawarely manufactureRead MoreAbsurdity And Society1484 Words à |à 6 PagesPhilosophy Research paper Extra credit Absurdity and Society According to Camusââ¬â¢s philosophy of absurdity, a person is truly happy when he or she accepts that life is meaningless. For example, there is no fate, or anything past immediate experience. The hope of something better in the future is what keeps people happy, which raises a question; are people truly happy? If a person cannot be happy without finding meaning, then people must accept existence has no meaning beyond what each individualRead MoreThemes in Samuel Becketts Waiting for Godot985 Words à |à 4 PagesThemes in Samuel Beckettââ¬â¢s ââ¬ËWaiting for Godotââ¬â¢. Samuel Beckettââ¬â¢s ââ¬ËWaiting for Godotââ¬â¢ is a typical example of what is referred to in literary terms as ââ¬ËAbsurd Theatreââ¬â¢, a phrase referring to 20th century works that depict the absurdity of modern human creation, often with implicit reference to humanityââ¬â¢s loss or lack of religious, philosophical or cultural roots. Such works depict the individual as essentially isolated and alone, even when surrounded by other people and things. Many modern comicRead MoreAnalysis Of The Book Invisible Man 1671 Words à |à 7 PagesAP Quote of the Book Project Invisible Man ââ¬Å"I was naà ¯ve...I was looking for myself and asking everyone except myself questions which only I could answer.â⬠(prologue)- The invisible man is referring to his self-discovery in this quote. He was ââ¬Å"looking forâ⬠himself and was adopting all the white culture traits and ignoring his own, leaving behind someone that was not himself. He discovers that he is the only one who could determine who he is and what defines him. ââ¬Å"I was pulled this way and thatRead MoreThe Absurdity Of Existence Of The Book The Metamorphosis By Franz Kafka And The Stranger 1732 Words à |à 7 PagesAdriana Ramirez Dr. Brueck English 148 4 May 2016 Final Paper The Absurdity of Existence In many twentieth century English literary works, but particularly in the two novellas, The Metamorphosis by Franz Kafka and The Stranger by Albert Camus, ideas of absurdity are employed to analyze human nature and discover the true meaning of life, and death. Through the questioning of societal boundaries, both of the authors implement philosophy into their writing through their separate and unique styles
Friday, December 13, 2019
Survey of Research Literature â⬠Identity Theft Free Essays
string(145) " biased based on how that information came about, and therefore might require additional information to provide clear evidence and confirmation\." Research Analysis Survey of Research Literature in Information Technology Management Infrastructure Abstract: Identity theft is one of the fastest growing crimes in the United States. There are many definitions of identity theft, however this type of crime typically involves illegally utilizing somebody elseââ¬â¢s personal information for both personal and or financial gain. Thieves acquire personal information through different methods ranging from stealing physical documents all the way to hacking into corporate databases. We will write a custom essay sample on Survey of Research Literature ââ¬â Identity Theft or any similar topic only for you Order Now The field of Information Technology is one of the fastest growing fields in the world. Daily innovations and discoveries are flooding our lives. The continual strive for speed and efficiency make the world move faster into the new era of digital information. In addition to advances in computing, many other fields are forced to innovate and comply with the demands of the new 21st century consumer. However with all the convenience and access to this digital information the world faces those who use the technology to destroy information and control others for their own benefit. The two most evident industries that face such challenges are the health industry and the financial industry. Both consists of billions of dollars in revenue each year and pose a lucrative target for the digital underground. The finance industry is a more interesting topic when it comes to identity theft since it involves the financial system for businesses, financial institutions and consumers. By looking at this industry directly we can see how these affects influence each other and what can be done to protect the consumer and the business sector. This paper will be separated into consumer and business parts and then further divided into sub parts where the focus would be on specific sections on what is closely related to or can result in identity theft. Once such threats and security issues are identified and thoroughly described, the paper will also cover some of the existing solutions that are currently being implemented by, businesses, financial institutions and even consumers themselves. Looking at all sides of the problem, identity theft touches upon a variety of issues such as tools that are used to identify ones credentials, information that is stored on computers of thousands or retailers, financial institutions as well as taking into account the technology that makes authentication and financial transactions possible. The spectrum of this is so large that only a small part of it can be analyzed and covered in this paper. What is Identity Theft? According to numerous sources, identity theft is a way to take someone elseââ¬â¢s identity and utilize it for either financial or gains of being accountable for certain actions or consequences. The term identity theft has actually came from the word impersonation or cloning which describes a process of making an exact copy of something or in this case assuming an identity of another person. In this paper there is only one side to the identity theft and it is the financial loss or gain that occurs during the process. Looking at the identity theft from several prospective and analyzing how it affects the consumer, business, or financial institution is what this analysis is attempting to identify. ââ¬Å"Each year, millions of consumers are victimized by identity theftââ¬âthe practice of using the identity of another to obtain credit. After the identity thief defaults, lenders and credit bureaus attribute the default to the impersonated consumer. Sovern 2004)â⬠According to Sovern 2004, the default that occurs between the lender and the pretend consumer, in the end falls upon the innocent consumer whose information has been stolen in one way or another and misused for financial gain. Typically there are numerous parts to what results in identity theft. First of all identity thieves typically obtain personal information that is used to identify an individual, as we ll as credentials that can be used to authenticate themselves. Then, they would utilize the credentials to impersonate other individuals and proceed to gain access to financial documents and finally actual monetary assets. ââ¬Å"Identity theftââ¬âthe appropriation of someone elseââ¬â¢s identity to commit fraud or theft (Milne 2003)ââ¬âis a serious consumer problem (Sovern 2004)â⬠. Identity theft is a commission of fraud that not only poses a serious threat to consumers but is a very serious crime that has unlimited consequences for everyone involved in the process. Although it is a serious crime and a wide spread problem there are many different ways that thieves can approach this type of method. The initial process of acquiring personal information that is needed to impersonate another individual can consist anywhere from finding the information in public records at the library, all the way to stealing financial documents like credit cards, checks, and digital information by hacking computer networks. The spectrum of this problem is endless and continues to grow on the daily basis, while financial information becomes ore widespread with the innovation of technology. Before looking at the specific areas of theft and their origins, identifying the meaning behind identity as being part of identity theft would be beneficial to the true understanding behind impersonating someone else. ââ¬Å"Identity is a means of denoting an entity in a particular namespace and is the basis of security and privacy -regardless if the context is digital identificati on or non-digital identification ( Katzan 2010 )â⬠. Unlike theft, identity is much harder to describe especially when looking at how it can be stolen and utilized for personal and financial gain. Katzan 2010 illustrates how an identity can also be referred to as a subject, which have several identities and belong to more than just one namespace. Identity is part of the management system which can establish a process to another system and therefore result in a trust that is facilitated by a third party and acknowledges the basis for the digital identity in the computer-based information systems. Another side is the information thatââ¬â¢s provided by a third party that claims the identity of a person but can be biased based on how that information came about, and therefore might require additional information to provide clear evidence and confirmation. You read "Survey of Research Literature ââ¬â Identity Theft" in category "Free Research Paper Samples" â⬠Identity is primarily used to establish a relationship between an attribute or set of attributes and a person, object, event, concept, or theory. The relationship can be direct, based on physical evidence, and in other cases, the relationship is indirect and based on a reference to other entities ( Katzan 2010)â⬠. Thieves acquire such attributes of the identity through resource such as customer service representatives, Trojan horse computer programs, dumpster diving, corporate databases, and physically stealing computers. To prevent such occurrences the author suggests implementing reponsibilized and individualized forms of risk management where individuals are encouraged to incorporate informational security practices into their daily lives and care for their virtual self in the digital world. Phishing Attacks Moving forward beyond what both identity and theft really mean, identifying he most popular ways of gaining access to individual identity data is the first step to preventing consumers from being the victims of such thefts. The first most common approach to gathering the necessary information to impersonate an individual is a Phishing Attack. A Phishing Attack is a way to deceive a consumer into revealing personal information to the attacker through digital communication. ââ¬Å"Phishin g has been a major problem for information systems managers and users for several years now. In 2008, it was estimated that phishing resulted in close to $50 billion in damages to U. S. onsumers and businesses (Wright, Marett, 2010). This obfuscation method of both email and Web sites is how thieves are able to convince users into fulfilling requests for personal information. Once that information is obtained it can be used to stage theft of either company or personal intellectual property. ââ¬Å"In the most common phishing scam, the ââ¬Å"phisherâ⬠sends an e-mail disguised to look like it is from a financial institution or e-commerce site. To appear credible and to attract the recipientââ¬â¢s attention, the e-mail uses the companyââ¬â¢s logos and trademarks and employs ââ¬Å"scare tacticsâ⬠such as threats of account closure (Lynch 2005)â⬠This method of obtaining identity information carries a relatively low risk in both legality and cost. The phisher who is carrying out the crime usually resides in an international location to avoid authorities which makes the apprehension and prosecuting of the fraud that is committed to be far more difficult. One of the studies that utilized analytical approach to find the reasoning behind the success of such a technique concluded that there are four phases in studying behavioral factors, which influence the replies coming from the consumer in regard to answering emails that request them to provide sensitive information. The study covered 299 subjects and analyzed the percentage of those who responded to different methods within the study of phishing. The final factor to the study is the awareness level that the communicator posses in regard to the security threats that are currently present in the digital world. Security awareness training is important in teaching Web users how to appropriately utilize both network and system resources. Complete review of security policies and their congruency with current threats is crucial in identifying noncompliance of both users and systems. Once systems are updated and users are aware of the different tactics that can be used against them and the different ways they can protect themselves from becoming victims the world can move closer to eliminating phishing as an urgent threat. Driverââ¬â¢s License Moving past the phishing technique on the consumer side, taking an in-depth look at how identification has become an essential part of identity theft and what are the different tools that we use as consumers to present that trust between our identity and the business entity from which we want to acquire services. The first and probably the most widespread tool of identification in United States of America is a driverââ¬â¢s license. A driverââ¬â¢s license is an identification document that corresponds to a Department of Motor Vehicles database record, therefore is considered to be a legitimate identification document. It is very valuable and the most circulated picture credential that gives one the ability to operate a vehicle as well. One of the reasons behind counterfeiting driverââ¬â¢s licenses is due to the broad spectrum of different types of licenses that exist in the USA. These counterfeits vary from simple laminates that are created on matrix printers, all the way to sophisticated and authentic, 45 degree hologram based laminates utilizing the same materials and even printing equipment that is used by the DMV. ââ¬Å" The typical criminal would use fungible credentials as an instrument to defraud because it offers reduced risk, minimal effort, and increased effectiveness. Financial frauds, money laundering, and identity theft are three common exploits that typically rely on fungible credentials. Fungible credentials are useful precisely because they simultaneously obscure the criminalââ¬â¢s real identity and facilitate any authentication that may be required. (Berghel 2006) This type of credentials is a way to shield the thiefââ¬â¢s real identity while still utilizing the facial identification with different credentials. Typically financial transactions are the most common way to utilize fungible credentials to gain access to the victimââ¬â¢s assets. Since the process involves getting several versions of identification based on the verification process, in the end the original counterfeit documents are disposable. This means that the final identifiers that are obtained, such as the drivers license are legitimate due to its issuance from the government agency. This type of a scheme makes the detection of the final credentials impossible to detect since it was acquired from a legitimate source. The only way to really prevent this from happening is by having all government agencies and law enforcement to authenticate all documents no matter where they came from. However currently due to the extreme overhead for such process, this is currently not possible to achieve. A threat analysis of RFID Passports The second and most widespread tool in the world is the passport. A passport is a document that is issued by a national government for the sole purpose of traveling between countries and having the ability to identify the nationality of the traveler as well as the identity of the holder. Since 2007 all passports that have been issued in USA, contain an imbedded RFID chip, which is valid for a time period of ten years. The reason behind such change in passport policy is to provide a safer way to store critical identification data on the chip as well as encrypt such data and keep it safe. However in the last few years there have been approaches that defy the design and the security of the chip and permit the identification information to be stolen. ââ¬Å"this individual used a small antenna connected to a computer in his backpack to eavesdrop on the radio communication between the security agentââ¬â¢s reader, which has the capacity to decrypt the highly sensitive and secured data on the passport, and the RFID-enabled passport itself(RAMOS, A. , SCOTT, W. , SCOTT, W. , LLOYD, D. , Oââ¬â¢LEARY, K. , ; WALDO, J. 2009)â⬠The process that is described above creates a way to find and obtain the information that is contained on the RFID chip, however in order to do so the proximity of the listening device and the timing of the transition are critical to its success. In addition to acquiring the data, the ability to decrypt the information before it can be utilized is a process in itself. ââ¬Å"Six pieces of information can be stolen from the RFID chip on a U. S. passport: your name, nationality, gender, date of birth, place of birth, and a digitized photograph. Numerous problems of identity theft could arise from someone taking that information, but this article focuses on the financial risk. (RAMOS, A. , SCOTT, W. , SCOTT, W. , LLOYD, D. , Oââ¬â¢LEARY, K. , WALDO, J. 2009)â⬠The information that is acquired during the intercept process is sufficient enough to create a duplicate passport and utilize it for financial gain. However due to the difficulty of this attack, cost of the equipment invo lved and the limited financial return as opposed to the high cost of blank passports, this type of scenario is not very likely. As a solution to this possible downside of RFID chips, integrating basic access-control and encryption using the secret key that is integrated right into the passport help mitigate the risk of data interception. Another approach would be to control the RF signals that occur between the reader and the passport during the verification process. This would help minimize the chances for eavesdropping on the RF signals and interception of all identity information. Identity Cards In order to go beyond the complications of the passport and the specialization of the driverââ¬â¢s license there is another way to identify a person and verify their credentials. This tool is called an Identity Card and is utilized on the government basis in several different countries. The idea behind the identity card is very similar to what a driverââ¬â¢s license does, however it only focuses on proving that the person who presents the card matches the credentials that the identity cards holds, without granting driving privileges as does the driverââ¬â¢s license. This new concept of identity card consists of two components, one is the database identity and the other is token identity. Database identity is the gathering of all information about a certain individual and recorded into databases, which is then accessible by the government. Token identity on the other hand only comprises of very specific information about the individual. This information consists of name, gender, date and place of birth, date of death, signature, photograph and biometrics. In addition biometrics consists of a face scan, two iris scans and ten fingerprints. In the context of identity theft, token identity is considered to be more than just information about an individual. ââ¬Å"Unlike the individual pieces of information that comprise it, token identity has the essential characteristics of intangible property. Its misuse by another person not only infringes the individualââ¬â¢s personal right to identity, it infringes the individualââ¬â¢s proprietary rights in his/her registered identity, particularly in token identity. Sullivan 2009)â⬠Utilization of token identity for transactional purposes constitutes an individualsââ¬â¢ identity which is all the information that the token holds. This is the information that is most useful for an identity thief since it is all that is required to enable a transaction. Not all of the information in the token is used for every transaction and therefore depends on the nature of the transaction, therefore the required information is automatically chosen from the token to match the transactional requirements. The phrase ââ¬Ëidentity theftââ¬â¢ is a misnomer, as identity theft does not actually deprive a person of their identity. The offence of theft or larceny traditionally involves an appropriation of the personal property of another with the intention to deprive him or her of that property permanently. Wrongfully accessing and using a personââ¬â¢s personal information or forging proof of identity documents, without taking any physical document or thing, would not deprive the person of the ability to use that information. (Sullivan 2009) Although wrongfully accessing or forging of the documents does not deprive the person of access to such information, it does however fundamentally damage the integrity of the individual token identity by denying exclusive use of the identity. Personally Identifiable Information Utilizing tools that identify oneself are needed to acquire, obtain and steal financial information, however in addition to that and the rapid innovation of the digital world, all the information that identifies us is freely available on the internet. In the last several years the internet progressed so rapidly that it is being used for social interaction, product purchases and financial transactions. In addition to that many companies are continuously collect personal information utilizing social networks, service providers, and retail sites. These companies claim that under the customer license agreements information provided will be safe guarded and released in a non identifiable form. This means that the information will be de-identified by changing the fixed set of attributes that it currently resides in. Once it is de-identified it will become safe enough to release to the public and will prevent others from using it for marketing or advertising purposes. ââ¬Å"The emergence of powerful re-identification algorithms demonstrates not just a flaw in a specific anonymization technique(s), but the fundamental inadequacy of the entire privacy protection paradigm based on ââ¬Å"de-identifyingâ⬠the data. De-identification provides only a weak form of privacy. (Narayanan, A. , Shmatikov, V. 2010)â⬠This type of technique is only part of the solution when it comes to privacy protection. The ability to develop effective technologies to protect private information is being developed on continuous basis and there is still no definite answer as to what the best approach really is. Utilizing the de-identifying approach is a step in the right direction but it only patches the problem instead of solving it. Currently there are limitation to the way privacy is preserved and protected, therefore a better method of protection needs to be build and implemented. Security through Technology Now that we covered the outstanding issues with the identity tools and even ways of how to protect the personal identifiable information, next step is to identify technology flaws that jeopardize the security of the process. The technology plays a crucial role in how secure the data is both inside and outside the primary location. When it comes to computer systems and security, the weakest components are the end users, especially when they are accessing corporate information from their home location. With progression of wireless based network technology, the adaptation rate has been enormous and is justified by the convenience that wireless technology provides for both basic and business consumer. Numerous applications have been developed to utilize the convenience of working from home for employee and to have them access databases of their organization using just the Internet browser. This scenario also works for those who are continuously traveling and therefore use wireless services at the hotels or other lodge places. Many of such systems only rely on passwords to authenticate users and pose a real threat when it comes to accessing corporate information. In such a case a hacker can intercept such credential information and utilize it to access the corporate databases and therefore conduct an intrusion which will go undetected since it relies on real user account information. ââ¬Å"Hackers do not require specific hacking tools, as operating systems can find nearby routers and connect to them almost automatically. Hackers can then perform illegal operations such as hacking other computers, spreading viruses, organizing terrorist activities, and so on. (Loo 2008)â⬠As the technology progresses and innovation takes place it would still be close to impossible to solve all security problems no matter what technology is in place. Security depends on several different factors including coordination between employers, end user and manufactures of the technology that is being used. It is up to the employees to be aware of security risks and protect the technology they are using no matter where they are. Investing time into learning about countermeasures is a worthy investment which can eventually prevent unrecoverable events such as an intrusion. Employers and providers of technology should focus on the usability and simplicity of the technology as well as establishing the necessary guidelines for usability and finding the right tools to address it. Protect Government Information Identity theft has an enormous impact on both time and finance of a consumer who becomes the target of it; however itââ¬â¢s not only consumers that see the consequences of such thefts. Businesses are being impacted by this occurrence as well. Organizations need to protect their assets from cyber crime, web attacks, data breaches and fraud. Criminals utilize such attacks to harvest data through these means for financial, political and personal gain. Such actions are becoming firm motivators for adaptation of information system security approach to protect assets of companies. The ISS approach utilizes an accreditation process that mandates that all government agencies are complying with such standard. A unified security approach would have been ideal in the case of government agencies however even with proper accreditation and mandated requirements, more than half the agencies demonstrated resistance by their management to implement such rules. One of the reasons for such resistance was the norms and culture with the organizations which could not be unified by one system covering all the agencies. Secondly the management of the government branches that lacked the accreditation pointed out that it was due to the lack of resources that was being committed by Treasury to pay for the needed changes that were part of the compliance process. ââ¬Å"The key lesson learned from this study was that a large-scale IS/IT project conducted across multiple government agencies and sites of varying sizes requires that the implementation be staggered and suited to agency size, thus breaking down the complexity of the tasks enabling resources (people and budgets) to be put in place and allocated to future project phases. Smith, S. , Winchester, D. , Bunker, D. , Jamieson, R. 2010)â⬠The authors point out that the failure of implementation was mostly due to the long term financial backing of the project and that adequate resources and senior management commitment is crucial to the success of ISS. Data Breaches and Identity Theft Data security is an ongoing process and affects both consumer s and businesses, however retailers and financial institutions are responsible for storing and processing consumer financial data, and they are solely responsible for the security of it. One of the leading causes of identity theft is data breaches which are a process of loosing data due to a security or network flaw. This is why a proportionate combination of security vs. amount of data collected needs to be found. If there is too much data and not enough security than the potential cost of a data breach is very high. ââ¬Å"Dollar estimates of the cost of identity theft do not by themselves indicate that too much identity theft is occurring. However, press accounts of data breaches suggest that personal identifying data (PID) is being stolen too frequently, and that the data thefts are unduly facilitating various kinds of identity theft. 2 (Roberds, W. , Schreft, S. 2008)â⬠Establishing policies that can ensure that the balance between data collection and security is properly maintained will be crucial in preventing data breaches. Data network can help prevent theft by securing its databases better as well as increasing the amount of PID compiled in order to identify possible fraudulent attempts on the network. The downside of over collecting is the spillover effect where the data can be stolen and used on another network, therefore breaching the other network. ââ¬Å"â⬠¦the approach here allows for explicit calculation of the efficient levels of data accumulation and data security, and for straightforward evaluation of policies meant to attain efficiency. More generally, it offers an illustration of how any such calculation should balance the costs associated with data misuse against the substantial gains afforded by the relaxation of anonymity. (Roberds, W. , Schreft, S. 2008)â⬠There are specific variables that need to be adjusted in order to achieve the highest possible degree of security and consider the costs that are associated with implementing this specific formula. Formal Identity Theft Prevention Programs As was already discussed previously, identity theft is a serious problem, and can take a very long time to even notice that it is taking place in our lives. Due to the amount of damage that is caused to the consumerââ¬â¢s life and financial situation, the government has taken steps to combat identity theft at federal, state and local levels therefore attempting to assist victims of this crime. There are several steps that have been taken in legislation, however there are still no laws in place that can regulate the general use of personally identifiable information in regard to government branches and both public and private sector. The key piece of information that is considered to be most valuable to the identity thieves is the Social Security Number (SSN), therefore one of the prevention initiatives is in regard to displaying and using Social Security Numbers in easily accessible laces. Other initiatives include securing the availability of personal information though information resellers, security weaknesses in the federal agency information systems, and breaches in data security. ââ¬Å".. federal systems and sensitive information are at increased risk of unauthorized access and disclosure, modification, or destruction, as well as inadvertent or deliberate disruption of system operations and services. ( Bertoni, D. 2009)â⬠. According to the GAO study it has been reported that federal agencies still experience a large number of security related incidents and that provides access to large amounts of personally identifiable information that reside in the federal records that could be utilized for identity theft purposes. Protecting personally identifiable information that is stored in the federal system is critical since its loss and unauthorized disclosure could result in devastating consequences for the individuals. The consequences could range from fraud, theft, embarrassment and even inconvenience in the cases of identity and financial related transactions. Results of identity theft have direct impact on the credit records of individuals and can also carry substantial costs related to this activity; in addition denial of loans and even convictions for crimes that an individual did not commit is a possible outcome of identity theft on the federal level. Solutions: Identifying all the sub categories of identity theft is outside the scope of this paper, however with a general understanding of how it affects consumers and business, as well as the severity of the issue; the next step is to see what can really be done to minimize the damage. One approach to combating identity theft is the implementation of smart cards into the financial system. These cards are designed to incorporate embedded computer chips that rely on encryption algorithms to safe guard the information and aid in authorization of transactions and identity verifications. If the technology is properly implemented it can really aid consumers, merchants, banks and others in securing transaction and combating identity theft. In addition it will help lower the costs of fraud prevention and provide benefits in the form of creating a more efficient payment system. Such technology has already seen implementation internationally and have proven to be a much more secure and efficient method of payments. ââ¬Å"Payment smart cards hold the promise to improve the security of payment authorization and help reduce the costs of identity theft and payments fraud. Smart cards allow a range of security options and some issuers have implemented the strongest upgrades, while others have not. (Sullivan 2008) The reduced infrastructure costs are yet another benefit that financial institutions can use in favor of implementing the system in United States. However there are some significant challenges moving forward with this system in regard to adaptation of smart cards by issuers, as well as having the whole industry agree on specific security protocols that will be used in the new smart cards. Identifying the true cost and both hardware and software limitation of the new product is also crucial in preventing adoption limitations. There is also the problem of having criminals shift efforts towards areas of weakness in the security of payments, however due to the lack of competitive advantage in the security standard there is a lack of willingness from the providerââ¬â¢s side in investing time and money. The complex network structure that is required to support the new standards is also a roadblock for implementation and development. Smart cards have the potential to become the new payment authorization standard but at this time they are facing a number of adaptation and development challenges that are discouraging financial institutions from moving towards them. Enforcement of physical identification cards to improve security is viable way; however a bigger issue of security and lack of it still takes places in many businesses. In the case of ID cards the outcome of implementing such a system would result in large databases of information that will utilize the technology for identification purposes. The problem here is what goes on behind the closed doors of the organization that houses such large amount of personal data. Part of it has to do with proper disposal of sensitive documents which most consumers donââ¬â¢t shred and even businesses that donââ¬â¢t properly take care of them. Once the information is housed in a database and is protected by firewalls and encryption routines, there is no clear process of how to prevent it from leaving the organization through unauthorized parties, computer theft, loss of physical media or records. â⬠¦there is a significant need to widely implement measures for tracking and tracing identity thieves and fraudsters once a breach has occurred. There are various means of doing so, whether electronic or physical (Gregory, A. 2008). These undercover tracking and tracing agents can log all the activity that is taking place by phone or email and then can be used for verification purposes and zero out any anomalies or breach attacks. This type of tracking can help companies stay on top of the activities that are taking place and even intervene in the process in order to minimize the outcome of the breach or fraudulent transactions. It will also help prevent the amount of complains, loss of reputation and damage to the company and its brand. The database of personal data can become quite large and is continuously exposed to security threats and data corruption, thatââ¬â¢s why companies hire consultants to investigate risk and exposures of the database information. Consultants check for compliance with Data Protection Act as well as other required transactional practices. In some cases the database can be subjected to quality assessment and data hygiene as to keep the information up to date and as accurate as possible. The results of the analysis can then be used to create an actionable strategy to manage the databases and maintain integrity and efficiency for both short and long term. An increasing amount of identity theft incidents have also provoked major changes in the financial industry, especially with banking applications and the way that they protect data and ensure legitimate transactions. To insure such security and integrity, financial institutions have integrated biometric technologies such as fingerprint and facial recognition that are mandatory for customers and ensure higher level of security. Biometric methods are based on physiological or behavioral characteristics. Since they take advantage of mostly unchangeable characteristics, they are more reliable than traditional methods of authorization (Koltzsch, G. 2006)â⬠The usage of such technology that can be so closely bound to a physical attribute of a person is very promising, especially in the financial sector and has been lo oked at it for the last 10 years. However due to the cost and the complexity on the implementation part as well as inconvenience to the consumer, it has not been as widespread as originally planned. Today this technology is mostly used for standalone applications, such as guarding vaults, high security areas and employee authentication. Customer oriented solutions are still in early development stages and are not fully implemented due to the fear of alienating customers and pushing them away from what they are used to. Another reason for the lack of implementation is the difficulty in standardizing this technology on the international scale. The fear of investing in technology that will not be supported by others is what is slowing the adaptation process down. However due to the rise in identity theft and phishing cases there has been a new movement towards the development of this technology to prevent loss of information and financial resources. Protecting the payment system depends on the adoption of industry standards for data security and implementation of the new digitally aware way to personally identify an individual. Currently the identification process depends on the Social Security Number as we discussed previously, which is one of the main reasons that identity theft still occurs. To be affective in protecting the payment system there needs to be a way to properly monitor the compliance of the system and enforce proper penalties in the case of its absence. Payment system participants can also hold each other accountable for the damage in the incompliance of contractual agreements in place. Due to high litigation costs in the event of identity theft, merchants are now implementing new policies that allow them to discard transactional information much faster in order to prevent its exposure to theft. Another fairly recent step taken by the private sector is the development of insurance products to cover losses from identity theft. Coverage for consumers is available from several sources, at a cost of approximately $120 per year, and appears to provide minimal coverage against lost wages, legal fees for defending against lawsuits brought by creditors or collection agencies, and select out-of-pocket expenses (Schreft, S. 2007)â⬠. The down fall of this type of coverage is its limitations. Neither type of uch insurances or proposed coverage will really protect against identity theft risk because the financial sector cannot ensure against systematic risk. This results in the loss of confidence in the system all together therefore creating the possibility of users accessing such services less frequently. Imperfections in the ability to protect the consumer against crime, results in having the government oversee the failures and driving it towards protecting the integrity and efficiency of the financial system. Shortcomings of the System To combat identity theft is an enormous task that even the government is struggling to achieve. The reason for this is time, money and consistency between financial providers and government levels. Several different attempts have been made to provide tools for consumers to identify theft and report it to the institutions. However even though such systems are in place, many consumers complain that even when such theft occurs and notices are placed on accounts, thieves are still able to steal money under fraudulent identities. They are even able to successfully apply for loans when there are errors in the information provided. In addition to that the Credit Bureaus have made it close to impossible for an everyday consumer to reach an actual human customer support representative due to the automated telephone systems that have been implemented. Another reason why the system just does not work the way it was proposed, is the cost that the credit bureaus are enduring with the escalation of identity theft cases. The actual costs of thefts are not reflected on the bureaus since they only provide credit reports and credit monitoring services which consumers buy in most cases even if they have been a victim of theft. The bureaus have no real incentive in helping consumers prevent identity fraud, which is in this case is a conflict of interest for one of the parties involved. This conflict of interests entails in the amount of early revenues that are generates from products such as credit reports and credit monitoring services. The latest offering from the bureaus is an email notification service that notifies the consumers if any changes in the credit records occur and charges a fee for it. One observer has estimated that credit bureaus received $600 million in 2003 from sales of credit reports, credit scores, and credit monitoring services (Hendricks 2003). In such a case the credit bureaus are profiting from the sales of preventive service that prevent the client from the theft that the bureau makes possible. Overestimation of losses is also a shortcoming of the system that is geared toward protecting the consumer in the business of financial transaction and identity information. A claim that i dentity theft is the fastest growing crime in U. S. is what the consumers are being told on the continuous basis. Lately the press coverage of this topic has grown significantly and provided a number of related events that claims an affected population of 4. 6% and losses of more than $60 billion dollars a year. What consumers need to take into account is the $50 maximum liability that is provided by the financial institutions, as well as the fact the media is taking into account information theft that did not result in financial losses to the institutions. Such overestimation are leading many consumers away from doing business on the internet and providing erroneous information, while forcing them to implement monitoring services that cost them money. As was covered before, smart cards is viable solution to the new identifiable information problem, however its shortcoming is the same problem as it exists with current financial tools. The exchange of personal information between the consumer and merchant can still result in letting an impersonator utilize the information to initiate a payment therefore making the smart card inefficient at securing the customer. Conclusion Identity theft is one of the fastest growing crimes in United States, and the real reason behind that is the fact technology innovated at a much greater speed than businesses and consumers have been able to adapt to it. Because of that the tools that we use to identify ourselves are no longer safe and need to be updated. On the consumer side a variety of tools are available to protect oneself from identity theft. However the cost of such tools can be a draw back in their implementation. On the business sides tools such as high level encryption, RFID chips and transition standards are in development stages and are planned to be implemented in the near future. Identity cards and centralized databases can be the key to solving security epidemic but are not versatile enough and carry overhead cost during the implementation process. There are many viable solutions to protect both the consumer and the business; the path really depends on cost and time available to either one. Awareness is the best approach to keeping you data safe and secure. How to cite Survey of Research Literature ââ¬â Identity Theft, Essays
Subscribe to:
Posts (Atom)