Thursday, December 26, 2019

A Critical Analysis Of The Yellow Wallpaper By Charlotte...

Patel 1 Aditi Patel 3/14/16 English 102 Esposito, Carmine. A Critical Analysis of The Yellow Wallpaper by Charlotte Perkins Gilman Charlotte Perkins Gilman was a famous social worker and a leading author of women’s issues. Charlotte Perkins Gilman s relating to views of women s rights and her demands for economic and social reform of gender inequities are very famous for the foundations of American society in the late nineteenth and early twentieth centuries. In critics Gilman ignored by people of color in the United States and attitudes towards non-northern European immigrants (Ceplair, non-fiction, 7). â€Å"Gilman developed controversial conception of womanhood†, by Deborah M. De Simone in â€Å"Charlotte Perkins Gilman and the feminization of education†. Gilman’s relation to reading deserves more attention than it has received (â€Å"The reading habit and The yellow wallpaper†). Her work about Women and Economics was considered her highest achievement by critics. With the changes in American society, Gilman s economic theories have appeared increasingly less radical and att racted less notice by critics and public. However, as women s roles continue to evolve, her sociological studies and her suggestions for housekeeping and take care of child arrangements gain in significance. Many modern feminist nonfiction works reflect the influence of Gilman s ideas. Readers are rediscovering in her thought much that is relevant Patel 2 to contemporary problems.Show MoreRelated A Critical Analysis of The Yellow Wallpaper by Charlotte Perkins Gilman1237 Words   |  5 Pages A Critical Analysis of The Yellow Wallpaper by Charlotte Perkins Gilman The Yellow Wallpaper written by Charlotte Perkins Gilman is a riveting story of a dejected woman locked away as if she were insane. Her passion is to write and by doing so we are able to follow her on a journey in which she is victimized by those closest to her. The significance of the story is tremendous as it delves into the underlying issues of a womans place and feminism in the 19th centuryRead MoreCritical Analysis Of The Yellow Wallpaper By Charlotte Perkins Gilman1258 Words   |  6 Pages Critical Essay #1 Yellow Wall Paper This gothic horror tale of nineteenth century fiction, written by Charlotte Perkins Gilman in 1892; during a time that women writers were starting to come out and write about key issues in their treatment. She craftily sets up or spins the story with a setting of isolation and a character who feels trapped, by a husband who chooses not to know her; yet does not listen to her and keeps her trapped on an island, all in her best interest. The tone is filled withRead MoreConcentrated Analysis of the Yellow Wallpaper by Charlotte Perkins Gilman in Light of the Critical Theory Infection in the Sentence: the Woman Writer and the Anxiety of Authorship Written by Gilbert and Gubar.1126 Words   |  5 Pagespaper will involve concentrated analysis of The Yellow Wallpaper by Charlotte Perkins Gilman in light of the critical theory Infection in the Sentence: The Woman Writer and the Anxiety of Authorship written by Gilbert and Gubar. The theory provided in Infection in the Sentence: The Wo man Writer and the Anxiety of Authorship will be briefly discussed in relation to The Yellow Wallpaper’s main heroine character and functionality of a madwoman in the fiction. This critical theory provides a perfect backgroundRead MoreThe Yellow Wallpaper, By Harriet Beecher Stowe1603 Words   |  7 PagesThe Yellow Wallpaper is a feminist piece of literature that analyzed women’s struggle in the 1900s, such as medical diagnosis and women’s roles. Over the years, women struggled to attain independence and freedom. In order to achieve these liberties, they were females who paved the way and spoke out about these issues to secure equal rights for women. In addition, these powerful females used their vulnerability to challenge the male domination through their literary work. The Yellow Wallpaper is aRead More The Movement for Womens Rights Inside The Yellow Wallpaper by Charlotte Perkins Gilman1634 Words   |  7 PagesThe Movement for Womens Rights Inside The Y ellow Wallpaper by Charlotte Perkins Gilman Women have been mistreated, enchained and dominated by men for most part of the human history. Until the second half of the twentieth century, there was great inequality between the social and economic conditions of men and women (Pearson Education). The battle for womens emancipation, however, had started in 1848 by the first womens rights convention, which was led by some remarkable and brave womenRead More Critical Analysis of The Yellow Wallpaper by Charlotte Perkins1179 Words   |  5 PagesCritical Analysis of The Yellow Wallpaper by Charlotte Perkins Charlotte Perkins Gilman’s â€Å"The Yellow Wallpaper† is a detailed account of the author’s battle with depression and mental illness. Gilman’s state of mental illness and delusion is portrayed in this narrative essay. Through her account of this debilitating illness, the reader is able to relate her behavior and thoughts to that of an insane patient in an asylum. She exhibits the same typeRead MoreEffects Of Repressing The Yellow Wallpaper 1520 Words   |  7 PagesThe Yellow Wallpaper In her story, The Yellow Wallpaper, Charlotte Perkins Gilman expresses exasperation towards the separate male and female roles expected of her society, and the evident repressed rights of a woman versus the active duties of a man. The story depicts the methods taken to cure a woman of her psychological state during Gilman’s time, and delineates the dominant cure of the time period, â€Å"the resting cure,† which encouraged the restraint of the imagination (The Yellow Wallpaper: LookingRead MoreCharacter Analysis : Character s Behavior1377 Words   |  6 PagesCharacter analysis is the critical evaluation of a character’s behavior, role in the story and the struggles they experience as the story unfolds (Fleming). The character in a story is normally described in detail, meaning that the reader knows their age, ethnicity, and distinctive physical features important to the story line. Analyzing the character’s behavior, personality, motivation and relations hip with others enables one understand the external and internal qualities (Fleming). The characterRead Moreâ€Å"the Yellow Wallpaper† an Opinion on the Critical Essay â€Å"Haunted House/Haunted Heroine: Female Gothic Closets in â€Å"the Yellow Wallpaper†Ã¢â‚¬  by Carol Margaret Davison1177 Words   |  5 Pagesâ€Å"The Yellow Wallpaper† An opinion on the critical essay â€Å"Haunted House/Haunted Heroine: Female Gothic Closets in â€Å"The Yellow Wallpaper†Ã¢â‚¬  by Carol Margaret Davison Rebecca Olds V00698066 English 125 Y. Levin April 2nd, 2009 â€Å"The Yellow Wallpaper† by Charlotte Perkins Gilman is a short story written in the late 1800’s about a woman with post-partum depression who becomes increasingly mad because of society’s, as well as her husband’s, repression. The critical essay â€Å"Haunted House/HauntedRead MoreThe Yellow Wallpaper2088 Words   |  9 PagesEnglish 124 November 16, 2012 A Critical Analysis of Formal Elements in the Short Story â€Å"The Yellow Wallpaper† by Charlotte Perkins Gilman Charlotte Perkins Gilman’s, â€Å"The Yellow Wallpaper†, published in 1899, is a semi-autobiographical short story depicting a young woman’s struggle with depression that is virtually untreated and her subsequent descent into madness. Although the story is centered on the protagonist’s obsessive description of the yellow wallpaper and her neurosis, the story serves

Wednesday, December 18, 2019

Exposure At Diversity And Time Spent Studying Diversity Essay

(INTRO) In my research I have come across three main points that do their part to answer the question. First main point that comes from this research is, exposure to diversity and time spent studying diversity helps develop empathy in the student. Second, a knowledge of diversity due to exposure to it in secondary schools allow students to develop meaningful relationships with people that are different than themselves as well as prevent anxiety for when they enter the world outside of their secondary school. Finally, my research has shown that exposure to diversity stays with the student well after secondary school and because of this it affects their decisions throughout their lives following school. These decisions, when preceded by an exposure to diversity, lead to integration and thus destroy the â€Å"Perpetuation Theory.† All three of these main ideas hover around the idea of knowledge and understanding of the â€Å"other.† This research shows the importance of e xposure to diversity because of the way it causes students to critically think about themselves and the world around them. (INTRODUCTION TO EMPATHY AND ARTICLE 4) A case study was done by high school literature teachers as a way to help develop and monitor the growth of empathy that their students had for people that were culturally different then them (Louie, 2005). During this study, students were introduced to life for the people that lived through China during the high point of the countries Communism. The teachersShow MoreRelatedEffects of Television on Child Development: Comparing Adverse and Positive Consequences of Watching Television1138 Words   |  5 PagesEffects of Television on Child Development: Comparing Adverse and Positive Consequences of Watching Television Studying the effects of children watching television has been a popular field of research for many years and is becoming increasingly important as more of children’s time is spent on television. There are strong arguments for both the benefits and the detriments of television exposure. One of the most common arguments against television is the suggestion that it increases violence. Other casesRead MoreAn Ideal Candidate For Your Nursing Program868 Words   |  4 Pagescandidate for your nursing program would bring diversity, medical experience, and strong academics. These are qualities that I have, but these qualities alone do not automatically make me the perfect candidate. I understand that becoming a nurse is a lifetime commitment of learning and selfless altruism. Being strong academically will help me do well on a test, being exposed and educated about different cultures comforts me in the company of diversity. The medical knowledge and experience I have willRead MoreA Study on Financing, Liberal Arts, and Equity1572 Words   |  6 Pageswho has had the limited exposure given in high school because it exposes the student to more areas and it helps students understand rather than just learn by rote (Carnevale Strohl, Winter 2001). In high school, Liberal Arts is very limited because students are not learning even the basic skills as it is; consequently, the precious time and resources needed to teach them these basic skills cannot be spent on the broader areas offered by Liberal Arts. At the same time, teachers in secondary publicRead MorePositive and Negative on Worldviews1694 Words   |  7 Pagesof me because it helped to counteract my tendency toward exclusivity. This desire to engage cultures different than my own with the Gospel first spurred my true interaction with a different denominational concept of Christianity. After my initial exposure to the Restoration Movement, I had my worldview further stretched by joining a interdenominational missions organization. Finally Central has played a key role in developing my worldview especially regarding how to exegete the Scriptures. It hasRead MoreTv : Hijacking The Psychosocial And Physical Well Being Of Children1426 Words   |  6 PagesIn fact, highly s exual and violent content that is present in TV programs desensitizes children to violence in the real world and incites them to act aggressively. Beth Greenwood (n.d.) argues that multiple studies have shown a correlation between exposure to violent movies on TV and heightened levels of aggressiveness based on the emulation of actions committed by movie stars. She states that, as a consequence, these children are likely to disobey their parents and teachers, not to mention to turnRead MoreHollywood And The American Entertainment Industry1872 Words   |  8 Pagesportrayals of people of color (PoC) often reduce them to negative stereotypes. How does the lack of exposure to multidimensional non-white characters, along with the continuous exposure to stereotyped characters of color and whitewashed roles impact on the way Americans see race? With the average American consuming approximately 10  ½ hours of media a day (Neilson), it is important to understand how media exposure affect s the ways white people view people of color, and the ways people of color view themselvesRead MoreCase Study- Disney Theme Park1682 Words   |  7 Pagespark in Shanghai China in 2008; The Park will attract different potential visitors in Shanghai. Overview Disney Theme Park - Points of Interest (Michael Sandbergs Data Visualization Blog) Getting people excited about their data one visual at a time * Walt Disney had infinite confidence in his new park and unapologetically included future attractions and â€Å"lands† as if they were just around the corner. Examples of attractions that made it are: the Submarine Voyage, New Orleans Square, andRead More The Effectiveness of a Multicultural and Bilingual Education1198 Words   |  5 Pagesfrom diverse ethnic backgrounds do better in school when they have a better understanding of each other?s cultures (Banks 99). 3 Gena Dagel Caponi associate professor of American Studies at the University of Texas in San Antonio states; Studying any one part of us does not divide us, it educates us. Occasionally, it inspires us (102). Living in peace and harmony should be everyone?s goal. In order to do this, we need to really know our neighbors. Learning and understanding their cultureRead MoreEffects of Video Games on Children and Teenagers Essay1251 Words   |  6 PagesOne way in which video games can be beneficial is by supporting individuals’ intellectual development in the areas of problem solving and logic. Games like Cut the Rope, Angry Birds and The Incredible Machine require players to solve a puzzle under time limited conditions. When people are playing these games, they practice their critical thinking skills and creativity, which are both important components of intelligence. Games can also improve one’s ability to plan and manage resources. In variousRead MoreLife Experience, Education, And Volunteer Experience Essay1984 Words   |  8 Pagessuccess was well documented, I was no longer achieving the meaningful fulfillment I once experienced in my career. The industry had taken a shift in focus that minimized the opportunity to develop employees in favor of reducing costs by utilizing part time staff to increase profitability. Ultimately, the direction was to eliminate, or at a minimum, substantially reduce, the most fulfilling aspect of my position. Interestingly, the company leadership did me a favor in that I felt compelled to identify

Tuesday, December 10, 2019

Changing Attitudes free essay sample

Throughout this century, each decade has produced at least one change in society that breaks barriers between people. The present decade has brought to the surface more divisions including the one between heterosexuals and homosexuals. People I know have said that they were homosexuals, however they were not ridiculed as they would have been up to the late 1980s. Of course there are still many people who oppose this lifestyle, but many others have come a long way toward accepting it in the last ten years. Attitudes bare changing, and not just toward homosexuals. Some people are learning to accept people of different religions and races.On a personal level, I have seen differences in the attitudes within my own family. My grandparents clearly illustrate these changes. My maternal grandparents grew up during a time when people were taught that Caucasians and African-Americans were not equal. Since then, they have become open to differences. We will write a custom essay sample on Changing Attitudes or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page However, my paternal grandmother is an example of one who has not learned to change. She remains very prejudiced against African-Americans and people of the Jewish faith. A few summers ago when I was visiting her, we were watching a beauty pageant on television. A young African-American won after she articulately answered her interview question. My grandmother immediately said, They [the pageant committee] must be required to have a black win every few years. She is not nearly as good as the other girls. The other girls were all white. I know others share my grandmothers opinions, but I do not fear that their attitudes will become dominate. Todays youth show hope in their openness to diversity.My generation is growing up in a time when many of these barriers have been, or are being, broken. I am taught to be open to differences and treat all people as equals. Even though my church is open to differences, we still have diversity workshops. I attended a high school fellowship retreat to participate in a series of workshops on human diversity and our attitudes toward it. Attending a Catholic high school, one would think that religious division would be reinforced. But I have found the opposite to be true. There are students from many religions in my school, including Congregationalism which I practice. The fact that I am not Catholic was never considered in my new friendships. My religion is just one aspect of my life that makes me a unique person. The students are open to, if not eager to learn about, the different religions that people practice. Our mandatory religion class this year is Religions of the World where we discuss many beliefs, including the fact that people have a right to believe in no god or superior force.I have a positive outlook on the future. People have begun to realize that the differences between humans are to be marveled at, not used to divide the human race. These changes in attitude hold great hope for a future in which humans are united in the belief that we all belong to one category: human beings.

Monday, December 2, 2019

The Similarities Between Creon And Antigone Essays - Antigone

The Similarities Between Creon and Antigone "Ah Creon! Is there no man left in the world-" Teirsesias Greek theatre played a large role in Greece. The citizens were supposed to learn from the mistakes made in tragedies. The citizens should have learned what not to be like as a citizen or person. In a Greek trilogy written by Sophocles there are two ma in characters, Antigone and Creon. They are both strong willed and stubborn people. Both being unwilling to change, they both seal each others fate. Creon is passionate. . Antigone is full of rage. They are both so similar they can not see eye to eye . Although they may seem quite different, Creon and Antigone share many similarities throughout the story. They are both very independent people. Antigone is extremely independent.. She doesn't mind doing anything on her own. For example, in the beginning of the story when Antigone is talking with Ismene, she asks for her help . When Ismene refuses she is furious with her. Then Ismene decides to act independently. Creon is also very independent. He refuses to accept anyone's opinions except his own. When his son Haimon comes to talk with him he refuses to listen , claiming that Haimon is "girlst ruck!" and corrupted . Teirsesais comes and tells him a morbid prophecy. Creon will not listen to this either. He claims that Teirsesais has been corrupted by money, like many prophets at that time. He finally listens to the Charagous when reminded th at Teiresias has never been wrong. Antigone has no problem working by her self either. She demonstrates this when she slipped by all the guards that were protecting the dead body of Polyneices. Creon and Antigone are both independent, and they are both very loyal. They are loyal to their views. Creon is especially loyal to his laws. Antigone is loyal to her beliefs. Creon will not change his laws. An example of this occurs when he and An tigone argue. He calls her "A traitor" For giving a burial for her dead brother Polyneices. He is so loyal to his own laws that he fails to see that he is disobeying the law of the gods. Antigone puts the laws of the gods ahead of the laws of the state s. She goes ahead and buries her brother. Which was strictly prohibited by Creon. This shows her short-sightedness is because she only does what she thinks the gods want. Instead of abiding by the law that Creon decreed. Creon is also short-sighted because he refuses to believe any other opinions or laws than his own. Creon and Antigone are both so loyal which can also make them very extreme. Creon is an extremist in reason. He thinks his law is the most important. Antigone is an extremist of passion. Creon is unwilling to put the god's law above his law. He is u nwilling to listen to the passionate pleas of his son to let Antigone live. He instead puts his laws first, and states that if he lets Antigone live after she has broken his law, "How shall I earn the worlds obedience?" His extreme will, later leads to his son's death because he thinks his son has been corrupted by Antigone. Antigone is equally as extreme and she will not listen to the reasoning of her sister Ismene. Ismene reminds her of the problems and dangers she is undertaking when she goes ou t to bury Polyneices. Antigone will not listen though, and this ends up killing her as well. Because Creon and Antigone are very extreme in their ways this can also make them cruel and foolish people. Creon is quite cruel to everyone around him. He never once listens to anyone, but instead he acts foolishly and hurts everyone. When he is talk ing to his son Haimon, he retorts that Haimon is "a fool" and that he is, "Taken in by a woman!" These words and his fathers attitude hurts Haimon and he becomes filled with rage towards his foolish father. Antigone is also cruel and foolish. Especial ly to her sister Ismene. Ismene tries to help Antigone in the start of the

Wednesday, November 27, 2019

Likelihood Ratio Positive And Positive Predictive Value Health Essay Essays

Likelihood Ratio Positive And Positive Predictive Value Health Essay Essays Likelihood Ratio Positive And Positive Predictive Value Health Essay Essay Likelihood Ratio Positive And Positive Predictive Value Health Essay Essay and allows the doctor to find the importance of a positive trial consequence. An alternate method of finding the post-test chance uses likelihood ratios. The likeliness ratio ( LR ) communicates the chance that a given trial consequence would happen in a patient with the mark disease compared to a patient without the disease. Unlike PPV, LR is non reliant on pre-test chance. A positive LR is calculated by sensitivity/ ( 1 specificity ) , whereas a negative LR is calculated by ( 1 sensitiveness ) /specificity. Using a likeliness ratio nomograph, the post-test chance can be rapidly determined utilizing the deliberate LR and pre-test chance. B ) Define and contrast analytic and descriptive experimental surveies ( 2 Markss ) Descriptive surveies are used to supply information on the forms of happening of a peculiar disease within the population, such as prevalence or incidence. They describe the distribution of exposure and result variables, and are of import in exciting hypotheses such as possible hazard factors for disease. Study types include cross-sectional surveies and clinical observations described in instance studies and case-series. Analytic surveies provided critical analysis of the relationship between two factors, the consequence of an intercession or exposure on an result. Within such surveies hypotheses can be tested utilizing observation or experimentation, comparing rate of results in control group to intercession or exposed group. Such surveies include randomised controlled tests, cohort surveies and case-control surveies. Q2. An research worker would wish to measure the association of goiter and decreased I consumption in a community-based instance control survey in Nigeria. Persons with goiter will be compared with controls. The survey was located in a low income country in Nigeria and those with goiters were largely low-income persons. The research workers were surprised to happen those with a low BMI were more likely to hold goitre. They conclude that a low BMI causes goiter. a ) Do you hold or differ with the research worker? Explain your reply in a few sentences ( 2 Markss ) I disagree. The survey investigated the association of goiter with decreased iodine consumption, yet concluded that a low BMI causes goiter. Bing an experimental survey missing any intercessions, it is hard to definitively set up causality. There is no suggestion that the survey adjusted for any confounding variables related to both BMI and the development of goiter, such as income degrees or age. Failure to set for normally associated factors hinders the disclosure of true associations. For illustration, it is wholly executable that low BMI and goiter are both results of exposure to nutritionally-deficient repasts afforded by those with low income. Further survey is required to measure if low BMI meets the Bradford Hill standards for causality of goiter, using the right analytical survey type, commanding confounding and extinguishing prejudice. B ) Explain in a few words what type of bias/error may be present ( 1 grade ) Recall prejudice. Reliance on callback may take to measurement prejudice, due to inaccurate remembrance or measuring of anterior iodine consumption by both topics and controls. Further to this, choice prejudice may be if the control population was non similar plenty to the instance population. Potentially high variableness, together with measuring prejudice, threatens the internal cogency of the survey. Q3. A survey to measure the association of diabetes and smoke compared a group of hospitalised persons with diabetes ( instances ) with a group of voluntary persons without diabetes ( controls ) who were full-time employees of the same infirmary where the instances were identified. The consequences from this survey reported, for the first clip in the literature, a strong association between diabetes and smoke. a ) What type of prejudice may be present? Why do you surmise the presence of the prejudice you have identified? ( 2 Markss ) Choice prejudice. The diabetics and non-diabetics are sourced from different population samples via differing choice methods. Volunteer prejudice and built-in fluctuation between the two groups may hold unwittingly influenced the strength of association reported. B ) The magnitude of this association is likely to be either over- or underestimated. Which do you believe is the instance, and what makes you believe so? ( 1 grade ) Over-estimated. Volunteers in a survey are frequently more motivated and wellness witting than selected participants, particularly those enduring wellness complications that require hospital admittance. Furthermore, the voluntaries have regular workplace exposure to patients enduring the inauspicious effects of smoke. Therefore there is an increased likeliness of less tobacco users amongst the control group. degree Celsius ) What is the best, executable survey type you would look for to reply this type of research inquiry? ( 1 grade ) An origin cohort. This is best for analyzing the consequence of prognostic hazard factors ( such as smoking ) on an result ( diabetes ) , to clarify alterations in disease incidence, without prejudice. It is non executable to use a randomized controlled test, as it is non ethical to intentionally expose people to the wellness hazards of smoke. Q4. You have a patient who asks you if diminishing meat consumption and increasing the sum of dietetic fresh fruit and veggies will diminish their hereafter hazard of intestine malignant neoplastic disease. You search for and happen the undermentioned article a ) Write the chief survey inquiry addressed by this research paper, in your ain words. ( 1 grade ) Does ingestion of differing nutrient groups or dietetic forms alter the hazard for rectal malignant neoplastic disease in non-Hispanic White persons and African americans? B ) Convert this into the PICO format. ( 2 Markss ) Patient/Population Non-Hispanic Whites and African americans Intervention/Indicator ingestion of specific nutrient groups Comparison ingestion of specific dietetic forms Outcome altered hazard for rectal malignant neoplastic disease degree Celsius ) What is the clinical inquiry type? ( 1 grade ) Aetiology To place hazard factors in incidence of rectal malignant neoplastic disease vitamin D ) What is the survey design? ( 1 grade ) Case-control survey. vitamin E ) Identify and briefly discuss the specific characteristics of the 3 chief causes of prejudice in this survey. 100 words maximal ( 6 Markss ) The research workers acknowledge 3 chief causes of prejudice. First, utilizing the questionnaire format, they risk measurement mistake by sorting ingested nutrients into specific groups for choice, restricting weighting of peculiar nutrients in dietetic forms. Inadequate diverseness in nutrients listed contributes to this measuring prejudice. Second, trust on capable callback of nutrient ingested over the old 12 months poses a important concern for the truth of the survey, due to remember prejudice. Finally, the high Numberss of non-respondents rises inquiries about the being of differences in rectal malignant neoplastic disease hazard between participants and non-participants, implying choice prejudice. degree Fahrenheit ) The paper concludes that higher consumption of fruit, veggies and dairy were associated with reduced rectal malignant neoplastic disease in Caucasians. Discuss these consequences ( Table 2 ) in visible radiation of the 5 major points of the Bradford Hill standards for set uping causal relationships. 200 words maximal ( 10 Markss ) 1. Temporality To demo a clip relationship of alteration in rectal malignant neoplastic disease incidence over clip, the research workers requested callback of diet over the last 12 months. However, this failed to once and for all turn out that ingestion of the nutrient groups ever preceded the decrease in rectal malignant neoplastic disease incidence. 2. Consistency The survey decisions claimed to be by and large associated with similar consequences by different surveies or research workers, and referenced a few surveies back uping their decisions ( mentions 13 to 15 ) . However, this contrasted with the survey by Michels et Al, and without a far greater figure of surveies with comparable findings, consistence can non be established. 3. Strength of association Measurements for fruit, some veggies and dairy showed important decreases in the hazard of rectal malignant neoplastic disease, with odds ratios lt ; 1 back uping strong association ( statistical significance of P lt ; 0.05 ) . 4. Dose-response relationship Increasing degrees of consumption resulted in diminishing incidence for rectal malignant neoplastic disease, evidenced by diminishing odds ratios between groups Q1 to Q4. Evidence for causality requires increasing incidence of disease with increasing exposure but here an opposite relationship applies. 5. Biological plausibleness -It is plausible that nutrients rich in vitamins and fibre lessening the happening of rectal malignant neoplastic disease, as suggested by the research workers.

Saturday, November 23, 2019

Fascinating Black-Footed Ferret Facts

Fascinating Black-Footed Ferret Facts Black-footed ferrets are easily recognized by their distinctive masked faces and resemblance to pet ferrets. Native to North America, the black-footed ferret is a rare example of an animal that went extinct in the wild, but survived in captivity and was ultimately released again. Fast Facts: Black-Footed Ferret Scientific Name: Mustela nigripesCommon Names: Black-footed ferret, American polecat, prairie dog hunterBasic Animal Group: MammalSize: 20 inch body; 4-5 inch tailWeight: 1.4-3.1 poundsLifespan: 1 yearDiet: CarnivoreHabitat: Central North AmericaPopulation: 200Conservation Status: Endangered (formerly extinct in the wild) Description Black-footed ferrets resemble domestic ferrets as well as wild polecats and weasels. The slender animal has buff or tan fur, with black feet, tail tip, nose, and face mask. It has triangular ears, few whiskers, a short muzzle, and sharp claws. Its body ranges from 50 to 53 cm (19 to 21 in), with a 11 to 13 cm (4.5 to 5.0 in) tail, and its weight ranges from 650 to 1,400 g (1.4 to 3.1 lb). Males are about 10 percent larger than females. Habitat and Distribution Historically, the black-footed ferret roamed across the prairies and steppes of central North America, from Texas to Alberta and Saskatchewan. Their range correlated with that of prairie dogs, since ferrets eat the rodents and use their burrows. After their extinction in the wild, captive-bred black-footed ferrets were reintroduced across the range. As of 2007, the only surviving wild population is in the Big Horn Basin near Meeteetse, Wyoming. Diet Around 90 percent of the black-footed ferrets diet consists of prairie dogs (genus  Cynomys), but in regions where prairie dogs hibernate for winter, ferrets will eat mice, voles, ground squirrels, rabbits, and birds. Black-footed ferrets get water by consuming their prey. Ferrets are preyed upon by eagles, owls, hawks, rattlesnakes, coyotes, badgers, and bobcats. Black-footed ferrets eat prairie dogs. USFWS Mountain-Prairie Behavior Except when mating or raising young, black-footed ferrets are solitary, nocturnal hunters. Ferrets use prairie dog burrows to sleep, catch their food, and raise their young. Black-footed ferrets are vocal animals. A loud chatter indicates alarm, a hiss shows fear, a females whimper calls her young, and a males chortle signals courtship. Like domestic ferrets, they perform the weasel war dance, consisting of a series of hops, often accompanied by a clucking sound (dooking), arched back, and frizzed tail. In the wild, the ferrets may perform the dance to disorient prey as well as to indicate enjoyment. The weasel war dance or dooking may be associated with hunting or with play. Tara Gregg / EyeEm / Getty Images Reproduction and Offspring Black-footed ferrets mate in February and March. Gestation lasts 42 to 45 days, resulting in the birth of one to five kits in May and June. The kits are born in prairie dog burrows and dont emerge until they are six weeks old. Initially, the kits are blind and have sparse white fur. Their eyes open at 35 days of age and dark markings appear at three weeks of age. When they are a few months old, the kits move to new burrows. Ferrets are sexually mature at one year of age, but reach peak reproductive maturity at age 3 or 4. Unfortunately, wild black-footed ferrets typically only live one year, although they can reach 5 years of age in the wild and 8 years of age in captivity. Conservation Status The black-footed ferret is an endangered species. It was extinct in the wild in 1996, but downgraded to endangered in 2008 thanks to a captive breeding and release program. Initially, the species was threatened by the fur trade, but it went extinct when prairie dog populations declined due to pest control measures and conversion of habitat to cropland. Sylvatic plague, canine distemper, and inbreeding finished off the last of the wild ferrets. The U.S. Fish and Wildlife Service artificially inseminated captive females, bred ferrets in zoos, and released them in the wild. The black-footed ferret is considered a conservation success story, but the animal faces an uncertain future. Scientists estimate only about 1,200 wild black-footed ferrets (200 mature adults) remained in 2013. Most reintroduced ferrets died from ongoing prairie dog poisoning programs or from disease. While not hunted today, ferrets still die from traps set for coyotes and mink. Humans pose a risk by killing prairie dogs directly or by collapsing burrows from petroleum industry activities. Power lines lead to prairie dog and ferret deaths, as raptors perch on them for easy hunting. At present, the average lifespan of a wild ferret is about the same as its breeding age, plus juvenile mortality is very high for those animals that do manage to reproduce. Black-Footed Ferret vs. Pet Ferret Although some domestic ferrets resemble black-footed ferrets, the two belong to separate species. Pet ferrets are descendants of the European ferret, Mustela putorius. While black-footed ferrets are always tan, with black masks, feet, tail tips, and noses, domestic ferrets come in a wide variety of colors and usually have a pink nose. Domestication has produced other changes in pet ferrets. While black-footed ferrets are solitary, nocturnal animals, domestic ferrets will socialize with each other and adjust to human schedules. Domestic ferrets have lost the instincts needed to hunt and build colonies in the wild, so they can only live in captivity. Sources Feldhamer, George A.; Thompson, Bruce Carlyle; Chapman, Joseph A. Wild mammals of North America: biology, management, and conservation. JHU Press, 2003. ISBN 0-8018-7416-5.Hillman, Conrad N. and Tim W. Clark. Mustela nigripes. Mammalian Species. 126 (126): 1–3, 1980. doi:10.2307/3503892McLendon, Russell. Rare U.S. ferret marks 30-year comeback. Mother Nature Network, September 30, 2011.Owen, Pamela R. and Christopher J. Bell. Fossils, diet, and conservation of black-footed ferrets Mustela nigripes.  Journal of Mammalogy.  81  (2): 422, 2000.Stromberg, Mark R.; Rayburn, R. Lee; Clark, Tim W.. Black-footed ferret prey requirements: an energy balance estimate. Journal of Wildlife Management. 47 (1): 67–73, 1983. doi:10.2307/3808053

Thursday, November 21, 2019

Produce a 1,500 word account, in report format, of an observed Assignment

Produce a 1,500 word account, in report format, of an observed positive behavioural change - Assignment Example There can be many factors and aspects in humans’ life which can reduce the contentment and happiness. To overcome such factors and regain therapeutic life is the basic aim of positive psychology. (wisegeek, 2011) MY BEHAVIOR CHANGE TARGET: After my self-assessment, the change I chose for my positive wellbeing is to get rid of caffeine addiction. At first the caffeine addiction didn't look like to have a link with mood and behavior in general to most of people; but being a caffeine addict I have faced many mood swings which eventually affect my wellbeing and efficient functioning in daily routine. The reason to get rid of caffeine and taking it as a positive behavior change is that in recent past I have realized that this addition is not only effecting my daily routine but is also effecting my health. Caffeine addiction has made me completely dependent over it due to which If I don’t get caffeine intake I experience many unpleasant challenges. The main reasons for gettin g rid of addiction are that I already have hectic and stressful life routine, I don’t get average amount of sleep which had become worse with the regular intake of caffeine. And whenever I tried to quit caffeine intake I felt extreme headache n nausea which led me to grab caffeine again. Adrenal gland main function is to regulate our hormones controlling the body reaction towards stress which help human to cope the stress physically and mentally. When people take caffeine it produces hormones artificially which led to unnatural alertness. After prolonged use of caffeine the adrenal gland functions depletes which affects human normal body functioning leading to psychological and physical problems. (ehow, 2011) The other researches which I came across about caffeine addiction are also related to its effect on human gland and mood swings. According to Stephen Cherniske research â€Å"caffeine blues† the intake of caffeine immediately stimulates the central nervous system of human, which triggers stress hormones in the body and leads to fight or flight response; causing stress. The fight or flight response is useful when u have to deal immediate with a dangerous situation but when this feeling of alertness and agitation come up very with every intake of caffeine, then when the effect of caffeine will go the person will feel more tired and low in energy because his body is used to of excessive alertness. And this is why caffeine is also considered an addiction. Because when the effect of caffeine fades away the person starts to feel tired and again look for caffeine intake and the circle goes on. And this not only makes u addict but also makes the body and mind tired as it becomes drained by constant ups and downs in body energy level. (Natural News Network , 2011) GOAL SETTING: I have aimed to get rid of my caffeine addiction. If I will succeed I will be able to sleep more and peacefully which is very important to work properly when you are awake. I will be able to have a sound sleep which was previously very disturbed and short because of excessive caffeine intake. My behavior will become more constant which will lead me to do my work efficiently and calmly. Plus I will be able to enjoy life more as now I most of time feel agitated and anxious. So the outcome of my goal setting includes these points: 1. Would be able to do my work properly and calmly

Wednesday, November 20, 2019

Health and safety Essay Example | Topics and Well Written Essays - 2500 words

Health and safety - Essay Example In this situation, the building is an educational institution with students, teachers and administrative staff. While constructing the new building, the aspect of health and safety of the people present in the old building and future health and safety concerns for the new building and its users should not be neglected. There are many chances of accidents and hazardous situations for which, there should be preventive measures and safety precautions that can be adopted by the people. There should be safe escape passages for the people, suitable equipment to control the situation and a professional security force to handle any hazardous situation (Managing health and safety in construction 2007). The major concern in constructing a new eight-storey is the closing of escape route that is opposite to the Leighton building. During construction, there can be a fire outbreak that cannot be handled if the fire escape route is closed. This report contains a detailed overview of the risks and hazards involved in constructing the new building, statutory requirements, safe systems of work for daily operations, control measures that should be adopted to reduce the risks and hazards involved. In case of a good structure, the building will offer lesser chances of damage to people present in it while in the opposite case, people’s lives will be endangered because of their presence in that building (Derek 1986). In this situation, the old building that is already there contains an escape route that is closed for the construction of new building. Huge machinery that is luffing tower crane will be operative outside an educational institution and the escape passage in case of any hazardous situation will be closed. This can create a problem and it should be considered in legal terms. Building regulations demand the inclusion of a safe passage in case of some disastrous situation (HSE 2006). The administration of School of Forensic and

Sunday, November 17, 2019

Inquiries and serious case Essay Example for Free

Inquiries and serious case Essay Serious case reviews are summoned when a child or a vulnerable adult is seriously injured and there is a suspicion that abuse or neglect has played a role in the outcome. When an incident occurs, a number of investigations are triggered to establish what has happened and who is to blame. In these situations serious case review and inquiries are undertaken in addition to the other investigations. According to Williams (Sarah, 2012), the purpose of serious case reviews is as follows To identify what the lessons are and how they will be acted on to improve practise. Improve local interagency working Review procedures and make recommendations for improvements Of all the procedures and stages of appointment of staff the most crucial factor is safety. It might sound weird but an error in this aspect might have wild consequences. Safer recruitment practice should include those persons who may not have direct contact with children, but because of their presence and familiarity in certain settings will still be seen as safe and trustworthy. The principles of safer recruitment should be included in the terms of any contract drawn up between the organisation and contractors or agencies that provide services for children and young people for whom the organisation is responsible. The organisation should monitor compliance with the contract, which should also include a requirement that the provider will not sub-contract to any personnel who have not been part of a safer recruitment process. Staff has to be kept informed about child protection responsibilities and procedures through induction, briefings and awareness training. There may be other adults in the school who rarely work unsupervised, more usually working alongside members of the school staff. However the supervisor will ensure they are aware of the school’s policy and the identity of the Child Protection Officer. Any member of staff, volunteer or visitor to the school who receives a disclosure of abuse, an allegation or suspects that abuse may have occurred must report it immediately. In Dubai and the United Arab Emirates there is currently no infrastructure of Educational Safeguarding and/or Social Care Services. Following cases which caused concern in the Emirati community, Sheikh Mohammed, the Ruler of Dubai, supported the drafting of a Federal law on child protection â€Å"to ensure a secure and stable future for children in the  U.A.E.† In April 2012, it was reported that Dubai had  "embraced a new policy to protect children against all forms of violence, abuse, exploitation and neglect and offer support and care for those in need.† The policy â€Å"aims to provide protection to Emirati and expatriate children under the age 18 who live permanently or temporarily in Dubai. In November 2012, the UAE Cabinet approved â€Å"Wadeema’s Law† to â€Å"protect children in the UAE.The law includes creating special units that intervene when children are at risk and stresses that all children have rights regardless of religion and nationality.† In conclusion, serious case reviews make an important contribution to understanding what happens in circumstances of significant harm. Their effectiveness can be improved and there are examples of promising approaches using the findings of serious case reviews to bring about improvements in safeguarding practice. However, achieving such improvements requires Local Safeguarding Children Boards to develop a much stronger learning culture within which serious case reviews are but one important source of knowledge for improving safeguarding practice. References Dubaicollege. (2012). Child protection policy. Available: http://www.dubaicollege.org/media/policies/Child%20Protection%20Policy.pdf. Last accessed 03rd May 2014. Willams, rutter, gary (2012). Promoting Individual and Organisational Learning in Social Work. london: SAGE publications. p99-102.

Friday, November 15, 2019

How To Communicate In A Relationship Essay -- essays research papers

How to Communicate in a Relatioship   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  1 Henry Roose Marion Fekete Writing 151 6 December, 1996   Ã‚  Ã‚  Ã‚  Ã‚  The hardest skill to master in order to maintain a successful, loving relationship is communication. Being unable to express one's thoughts clearly and accurately is a heavy burden to bear when trying to hold a conversation. It often causes misunderstandings and unnessary arguments. Plainly expressing one's thoughts is a lesson that many do not learn. The staggering number divorces in recent years may be the effect of ill-communication. Even with all the conveyances of modern day (cellar phones, modems, pagers), important ideas, somehow are not being expressed. In a relationship one can easily misinterpret a statement and become upset. Openly expressing full thoughts, and carefully listening to what your mate is saying are two worthy and helpful tips on holding up the communication bridge.   Ã‚  Ã‚  Ã‚  Ã‚  Many times, people become frustrated at their partner's lack of understanding. Unfortunately, no one can read minds. That fact makes it of the utmost importance to be able to let your mate in on what you are thinking. How can he or she possib...

Tuesday, November 12, 2019

Digital Millennium Copyright Act

I would consider the sharing and downloading of songs from the Internet to be wrong when a purchase isn’t made to obtain the download. When ecommerce is circumvented and a song is downloaded from the Internet the effects are felt beyond the large music record companies. The fans of that artist, the employees that manufacture the digital media, even you as the person downloading the content will have consequences. If the demand for a product is high the price for such product does not have to be high. Thus, if I along with many others download my favorite artist’s song the consequences ripple far past the wealthy record companies.The fans willing to pay will have a higher cost because demand is not reflected accurately. The companies that develop products to create this digital media will have fewer jobs to offer/may require terminating employees. I will feel the effects because my favorite artiest may not put out music due the demand not being accurate. This is a very i nteresting topic to discuss because here there are laws that protect copyrighted material, as well as technology that solely are used to uphold these laws. In fact, it seems that the technology are the laws regarding digital media and when avoided they are broken. Once constrains on behavior are built into the technical standards governing a technology, the technical standards effectively become a new method for governing used of the technology- in essence, the technical standards become a type of law. †(Textbook) Lending a CD to a friend is ok. There isn’t infringement to copyrights, and the rights management system is not undermined when doing so. For instance manufactures decide the rules of with the digital media can be used. â€Å"In the Case of rights management systems, copyright owners determine the rules that are embedded into the technological controls.By implementing technical constraints on access to and use of digital information, a copyright owner can eff ectively supersede the rules of the intellectual property law. †(Textbook) When allowing a friend to borrow a CD the RMS is not damaged in the process. Letting a friend download, copy to an external drive, or rip to CD music is definitely wrong. It infringes on various copyright statues, as well as undermines any rights management systems that are used with my digital media. To bypass the RMS of digital media would violate the Digital Millennium Copyright Act and is without a doubt wrong. No person shall circumvent a technological measure that effectively controls access to a work protected under this title. †(Textbook) To work around the RMS of a CD and rip songs to a library and then make a copy of these songs to a blank CD violates the DMCA. Using other technology to obtain this media is also wrong. In the case Real Networks, Inc. v. Streambox, Inc. we see that to use software to copy media is another instance of DMCA violation. In this case Real Networks offered a wa y to stream music for sampling, but if a user wanted to own the copy they must purchase the song.RealServers hosted this music and would only play content on RealPlayers. This relationship between player and server was authenticated by means of â€Å"secret handshake†. Users who have met content owners preference to download media (i. e. purchased the music) could do so by a â€Å"copy switch† authentication method. Streambox VCR allow users to bypass the copy switch mechanism, which allow users to download media without the consent or preference of the copyright holder. We see with this case that if we use software to circumvent the ecommerce process we have violated the DMCA. The DMCA prohibits the manufacture, import, offer to the public, or trafficking in any technology, product, service, device, component, or part thereof that: (3) is marketed for use in circumventing such technological protection measures. †(Textbook) Allowing this friend to download from a site is wrong as well. It violates the same DMCA standards forbidding working around RMS. Peer to peer sharing we have seen in the case A & M Records Inc, v. Napster, Inc. violates the DMCA if the holder does not grant permission to the content.To enable the act of infringing even though you yourself are not infringing does not remove liability. â€Å"Napster may be vicariously liable when it fails to affirmatively use its ability to patrol its system and preclude access to potentially infringing files listed in its search index. Napster has both the ability to use its search function to identify infringing musical recordings and the right to bar participation of users who engage in the transmission of infringing files. †(Textbook) I think that the digital copyright laws of today are reasonable.They protect the copyright holders, but there are still â€Å"free use† statues are in place that makes sampling music realistic. Today we have youtube, Pandora, and spotify ju st to name a few. If I want to sample music or even listen to my favorite genre of music I am free to. I can subscribe to a new artist on youtube and sample their music before I ever have to pay for a CD. Today technology has made it more convenient to be a consumer of media, and harder to protect your copyright for media creators. With every streaming site there is a file-sharing site.I think that it’s unfortunate that someone who worked hard to create a work of music has to deal with it being stolen, but I think there is a solution in the near future. With everything being hosted in the cloud now a days we see media outlets like itunes and spotify have huge cloud library with the ability to take a physical copy when placing it on an external device. We are seeing less and less local copies of media with the emergence of the cloud, which will make it very hard to circumvent RMS in place. So what should be the law? The laws should evolve with technology, and as of now should remain as they are.

Sunday, November 10, 2019

Real-Time Fraud Detection: How Stream Computing Can Help the Retail Banking Industry

Para os meus pais, porque â€Å"o valor das coisas nao esta no tempo que elas duram, mas na intensidade com que acontecem. Por isso existem momentos inesqueciveis, coisas inexplicaveis e pessoas incomparaveis† como voces! Obrigado por tudo, Filipe Abstract The Retail Banking Industry has been severely affected by fraud over the past few years. Indeed, despite all the research and systems available, fraudsters have been able to outsmart and deceive the banks and their customers. With this in mind, we intend to introduce a novel and multi-purpose technology known as Stream Computing, as the basis for a Fraud Detection solution.Indeed, we believe that this architecture will stimulate research, and more importantly organizations, to invest in Analytics and Statistical Fraud-Scoring to be used in conjunction with the already in-place preventive techniques. Therefore, in this research we explore different strategies to build a Streambased Fraud Detection solution, using advanced Dat a Mining Algorithms and Statistical Analysis, and show how they lead to increased accuracy in the detection of fraud by at least 78% in our reference dataset. We also discuss how a combination of these strategies can be embedded in a Stream-based application to detect fraud in real-time.From this perspective, our experiments lead to an average processing time of 111,702ms per transaction, while strategies to further improve the performance are discussed. Keywords: Fraud Detection, Stream Computing, Real-Time Analysis, Fraud, Data Mining, Retail Banking Industry, Data Preprocessing, Data Classi? cation, Behavior-based Models, Supervised Analysis, Semi-supervised Analysis Sammanfattning Privatbankerna har drabbats hart av bedragerier de senaste aren. Bedragare har lyckats kringga forskning och tillgangliga system och lura bankerna och deras kunder.Darfor vill vi infora en ny, polyvalent strommande datorteknik (Stream Computing) for att upptacka bedragerier. Vi tror att denna struktur kommer att stimulera forskningen, och framfor allt fa organisationerna att investera i analytisk och statistisk bedragerisparning som kan anvandas tillsammans med be? ntlig forebyggande teknik. Vi undersoker i var forskning olika strategier for att skapa en strommande losning som utnyttjar avancerade algoritmer for datautvinning och statistisk analys for att upptacka bedragerier, och visar att dessa okar traffsakerheten for att upptacka bedragerier med minst 78% i var referensbas.Vi diskuterar aven hur en kombination av dessa strategier kan baddas in i en strommande applikation for att upptacka bedragerier i realtid. Vara forsok ger en genomsnittlig bearbetningstid pa 111,702ms per transaktion, samtidigt som olika strategier for att fortsatta forbattra resultaten diskuteras. Acknowledgments â€Å"Silent gratitude isn’t much use to anyone† Gladys Bronwyn Stern When I wrote the ? rst words in this report I think I had no idea what a Master Thesis is about!I can’t blame myself though since I never wrote one before, but if you ask me now to describe this experience I would say that it’s like a road trip: you set yourself a destination, you have a loyal crew that is always there for you, a roadmap, supporters on the side and then the journey begins. Within the latter, you face setbacks with the help of others, you share knowledge, you meet new people and most importantly you get to know them†¦ This journey would not have been possible without the support, camaraderie and guidance of many friends, colleagues and my family.For all these reasons, I couldn’t let the journey end without expressing my gratitude to each and everyone of them. First and foremost, I would like to express my sincere gratitude to my supervisor, Philippe Spaas, who made it possible for me to work in this project under his supervision and in collaboration with IBM. It was a privilege to work alongside with him and a unique learning opportunity for me! I am indebted for his precious guidance and for the time dedicated not only in helping me understand how a research paper should be formulated, but also in reviewing the latter.Thank you! I am very thankful as well to Tybra Arthur, who graciously accepted me in her team and supported my internship, Jean de Canniere who accepted to be my Manager and without whom I wouldn’t have had this opportunity. In this line of thought, I am also grateful to Hans Van Mingroot who helped me secure this project in its negotiation phase. All three were key elements, and their support and guidance throughout the research were important to me and very much appreciated.I would also like to express my gratitude to Professor Mihhail Matskin at KTH – the Royal Institute of Technology – for having accepted this Master Thesis and for being my examiner. His insights and help were invaluable to achieve more sound end results and put together this ? nal report! In addition, I would like to ext end my personal thanks to my Erasmus Coordinator, Anna Hellberg Gustafsson, for her support, kindness and dedication for the duration of the research which was key to the organization of the latter.She is, for me, the best coordinator I have met and heard about! I would probably not have taken the appropriate steps to have this opportunity within IBM if it weren’t for the initial support and guidance of Karl De Backer, Anika Hallier, Anton Wilsens and last but not least Parmjeet Kaur Gurmeet. I truly value their follow-up both on the research and on my experience! On a special note I would like to thank Parmjeet for having been always a good mentor to me and for her support and trust ever since the Extreme Blue internship.I want to thank each IBMer with whom I came in contact with in the Financial Services Sector Department for welcoming me into their working environment and for making my stay very enjoyable. In addition to the aforementioned IBMers, among many others and in no speci? c order I would like to thank Daniel Pauwels, Patrick Taymans, Hedwige Meunier, Gauthier de Villenfagne, Michel Van Der Poorten, Kjell Fastre, Annie Magnus, Wouter Denayer, Patrick Antonis, Sara Ramakers, Marc Ledeganck, Joel Van Rossem and Stephane Massonet. It was a real pleasure to share the open space and, more importantly, to meet them!Dan Gutfreund at IBM Haifa was a key element in the development of this thesis. I am very thankful for the discussions we had about Fraud Detection and for his advice in the different phases that compose this research. In addition, I would like to extend my thanks to Jean-Luc Collet at IBM La Gaude for his valuable help in obtaining a stable virtual machine with InfoSphere Streams. I am thankful to Professor Gianluca Bontempi and Liran Lerman at Universite Libre de Bruxelles for ? nding the time to discuss about Fraud Detection and Data Mining techniques.Their insights were vital for the development of the prototype and the overall rese arch. On the same vein, I would like to thank Chris Howard at IBM Dublin for his help in understanding Stream Computing and InfoSphere Streams. His guidance was crucial for a timely comprehension of the ? eld without which I wouldn’t have been able to develop the prototype. I want to thank Mike Koranda and John Thorson at IBM Rochester for their help in understanding the integration of Data Mining and Stream Computing and how to achieve the latter in a more ef? cient manner.I really appreciated their help with the prototype, especially when atypical errors occurred to more quickly detect the source of the problem. I am also thankful to IBM, as a company, for providing me the opportunity and necessary facilities to conduct my thesis project, as well as to KTH, as university, for having allowed me to take on this experience. I want to take this opportunity to thank my friend, Thomas Heselmans, for having been there ever since the beginning of the research despite my busy agenda . His support and concern were vital in times of great stress and trouble, thank you for your friendship!The same applies to Stephane Fernandes Medeiros, a great friend of mine who was always there for me and followed my work very closely. In addition, I am thankful to two of my greatest friends, Nicola Martins and Alberto Cecilio, for their friendship, for always supporting me and always having my back. Margarida Cesar is a very important person in my life, and I would like to express my gratitude for all the discussions and advice we shared, as well as for the support demonstrated ever since we met. I always take her advice very seriously and she has helped me cope with dif? ulties in more than one occasion, namely during the thesis, and for that I’m very thankful! I am also very grateful to my friend, Arminda Barata, for all the help she provided me in moving and adapting myself to Stockholm. Without her help and concern I wouldn’t have felt at home so easily, and I wouldn’t have liked Stockholm from the very ? rst day. I would like to take advantage of this opportunity to thank all my colleagues and friends in Stockholm for making these two years of study unforgettable, and for shaping the person I am today.Among so many others, I would like to thank in particular Sanja Jankolovska, Boshko Zerajik, Pedram Mobedi, Adrien Dulac, Filipe Rebello De Andrade, Pavel Podkopajev, Cuneyt Caliskan, Sina Molazem, Arezoo Ghannadian and Hooman Peiro. I couldn’t have made it through without all of them! Last but de? nitely not least, because I didn’t have the chance to formally thank my friends in my previous studies, I would like to take this opportunity to extend my thanks to them for all the good moments we spent together throughout our bachelor degree as well as today.In particular I would like to thank Miruna Valcu, Rukiye Akgun, Vladimir Svoboda, Antonio Paolillo, Tony Dusenge, Olivier Sputael, Aurelien Gillet, Mathieu Duchene, Br uno Cats, Nicolas Degroot and Juraj Grivna. I reserve a special thank you note to Mathieu Stennier, for both his friendship and support throughout my academic life, and for having shared with me what were the best moments I had in Brussels while at University!I would very much like to express myself in Portuguese to my family so that they can all more easily understand what I have to say, thank you for your understanding: Nao podia deixar de agradecer a toda a minha familia o apoio que demonstraram ao longo deste percurso academico que conhece hoje um novo capitulo. Gostaria de agradecer a todos sem excepcao por acreditarem em mim e nunca duvidarem das minhas capacidades. Obrigado por estarem sempre presentes apesar da distancia, obrigado por se preocuparem comigo e por fazerem com que eu saiba que poderei sempre contar com voces!Sou verdadeiramente um ser afortunado por poder escrever estas palavras†¦ Um obrigado especial a minha grande avo Olga por estar sempre disposta a sac ri? car-se por nos e por telefonar quase diariamente a perguntar se estou bem e se preciso de alguma coisa. Agradeco-lhe do fundo do coracao esse amor que tem pelos netos e que tanta forca transmite! Queria agradecer tambem aos meus primos Rui e Hugo, que sao para mim como os irmaos que eu nunca tive, a forca que me transmitem para seguir em frente face as adversidades da vida. Ambos ensinaram-me imenso durante toda a vida e sao uma fonte de inspiracao constante para mim!A admiracao que tenho por eles foi como um guia que me levou onde estou hoje†¦ Obrigado por acreditarem em mim para levar a bom porto este projecto e por terem estado sempre presentes a apoiar-me! Gostaria de deixar uma mensagem de apreco ao David, que e mais do que um primo para mim, e um melhor amigo, que sempre esteve presente e sempre se preocupou comigo durante a tese. Foram momentos, frases e situacoes da vida que ? zeram com que o David se tornasse na pessoa importante que e para mim e ao longo da tese a s suas mensagens de apoio foram sempre bem recebidas porque deram-me um alento enorme.Aproveito tambem para agradecer a minha querida tia Aida e ao meu estimado primo Xico pela preocupacao que tem sempre comigo e por serem uma fonte de inspiracao para mim. Desejo tambem aproveitar esta oportunidade para agradecer a Nandinha e Jorginho todo o apoio que me deram nao so durante estes 6 longos meses mas desde os meus primeiros passos. Sao como uns segundos pais para mim cujo apoio ao longo deste curso e capitulo da minha vida foi primordial. Agradeco, do fundo do coracao, o facto de me tratarem como se fosse um ? lho, por me guiarem e sempre ajudarem! Tenho ainda um lugar especial reservado para o meu tio Antonio.Um tio que admiro muito, que sempre me quis bem e cujo dom da palavra move montanhas! O seu conselho e para mim uma maisvalia, e agradeco todo o seu apoio e ajuda durante esta investigacao e sobretudo por me guiar quando nao ha estrelas no ceu. Aproveito para vos deixar a todos um pedido de desculpa por nao estar presente como gostaria, e agradeco o facto de que apesar de tudo voces estejam todos de pe ? rme atras de mim! Sem o vosso apoio nunca teria feito metade do que ? z! Costuma-se guardar o melhor para o ? m, e por isso nao podia deixar de agradecer aos meus pais tudo o que ? eram e fazem por mim! A lingua de Camoes e escassa para que eu consiga descrever o quao grato estou†¦ Dedico-vos esta tese, por sempre me terem dado todo o amor, carinho, e ajuda necessaria para ter uma vida feliz e de sucesso. Deixo aqui um grande e sentido obrigado por terem estado sempre presentes quando mais precisava, por me terem sempre apoiado a alcancar os meus objectivos, por me terem ensinado a viver, a amar, a partilhar e a ser a pessoa que sou hoje. Obrigado! Em particular gostaria de agradecer ao meu pai a compreensao que teve comigo durante este periodo mais ocupado.Agradecer-lhe a ajuda em conseguir por um meio termo as coisas e a olhar para elas de outro pr isma. Agradeco tambem a calma que me transmitiu e transmite, e o apaziguamento que me ensinou a ter face as adversidades da vida. Sem estas licoes de vida, que guardarei sempre comigo, sinto que a tese nao teria sido bem sucedida e eu nunca teria alcancado tudo o que alcancei! A minha mae, agradeco†¦ por onde hei-de comecar? Pela ajuda diaria durante a tese para que os meus esforcos se concentrassem no trabalho? Pela inspiracao diaria de um espirito lutador que nao desmorona face as di? culdades e injusticas da vida?Agradeco por tudo isto e muito mais pois sem a sua ajuda diaria nao teria conseguido acabar a tese. A admiracao que tenho pela sua forca e coragem ? zeram com que eu tentasse seguir os mesmos passos e levaram-me a alcancar patamares que considerava inalcancaveis! A paciencia que teve durante todo o projecto, mas sobretudo no ? m, e de louvar, e sem o seu ombro amigo teria sido tudo muito mais complicado. Obrigado a todos por tudo! Thank you all for everything! Filip e Miguel Goncalves de Almeida Table of Contents 1 Introduction Part I: Setting the Scene 2 Retail Banking and The State of the Art in Detection and Prevention of Fraud 2. The Retail Banking Industry . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2. 1. 1 A Short Walk Down Memory Lane . . . . . . . . . . . . . . . . . . . . 2. 1. 2 The Retail Banking IT Systems’ Architecture . . . . . . . . . . . . . . 2. 2 Fraud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2. 2. 1 Internet and E-Commerce Fraud . . . . . . . . . . . . . . . . . . . . . 2. 2. 2 Other Consumer Fraud . . . . . . . . . . . . . . . . . . . . . . . . . . 2. 3 Current Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2. 3. 1 Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2. 3. 2 Analytics and Statistical Fraud-Scoring . . . . . . . . . . . . . . . . . 3 Problem De? nition 3. 1 Weak Links in Currently Available Solutio ns . 3. 1. 1 Bank Card and Pin Code . . . . . . . . . 3. 1. 2 One-Time-Password or Card Reader . . 3. 1. 3 Biometrics . . . . . . . . . . . . . . . . . 3. 1. 4 Analytics and Statistical Fraud-Scoring 3. 2 Facts and Figures . . . . . . . . . . . . . . . . . 3. 2. 1 France . . . . . . . . . . . . . . . . . . . 3. 2. 2 United Kingdom . . . . . . . . . . . . . 3. 3 E-Commerce and Internet Banking . . . . . . . 3. 4 Mobile Banking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 2 3 3 3 4 6 6 12 12 13 14 15 15 16 17 18 18 19 19 19 20 21 22 22 23 23 23 24 24 25 25 28 28 29 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 31 31 31 32 32 33 34 Research Methodology 4. 1 Objective of the Research . . . . . . . . . . . . . . . 4. 2 Data Collection . . . . . . . . . . . . . . . . . . . . 4. 2. 1 FICO’s E-Commerce Transactions Dataset . 4. 2. 2 Personal Retail Bank Transacti ons . . . . . 4. 3 Data Analysis Plan . . . . . . . . . . . . . . . . . . 4. 3. 1 Partitioning of the Data . . . . . . . . . . . 4. 4 Instruments and Implementation Strategy . . . . . 4. 4. 1 InfoSphere Streams . . . . . . . . . . . . . . 4. 4. 2 SPSS Modeler . . . . . . . . . . . . . . . . . 4. 4. 3 MySQL Database . . . . . . . . . . . . . . . Part II: Behind the Curtains 5 Phase 0: Data Preprocessing 5. Getting to Know the Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5. 1. 1 Attributes and their Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5. 1. 2 Attributes in the Retail Banking Industry and in FICO’s Dataset . . . . . . 5. 1. 3 Statistical Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5. 2 Data Reduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5. 2. 1 Dimensionality Reduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5. 2. 2 Supervised Merge and Transformat ion of Nominal and Categorical Data . 5. 3 5. 4 5. 5 5. 6 . 7 5. 8 Cleaning Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5. 3. 1 Missing Values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5. 3. 2 Noisy Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Data Transformation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5. 4. 1 Transformation of Times and Dates . . . . . . . . . . . . . . . . . 5. 4. 2 Transformation by Normalization . . . . . . . . . . . . . . . . . . Sampling Strategies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5. 5. 1 Clustering using K-Means Algorithm . . . . . . . . . . . . . . . 5. 5. 2 Under-Sampling Based on Clustering . . . . . . . . . . . . . . . . Preprocessing Data with Stream Computing . . . . . . . . . . . . . . . . 5. 6. 1 Receiving and Sending Streams of Transactions . . . . . . . . . . 5. 6. 2 Retrieving and Storing Data to a Database . . . . . . . . . . . . . 5. 6. 3 Data Preprocessing using SPSS Solution Publisher . . . . . . . . . 5. 6. 4 Data Preprocessing using a Non-Generic C++ Primitive Operator Rule-Based Engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5. 7. 1 Streams with a Business Rules Management System . . . . . . . . Final Thoughts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 36 36 37 37 37 39 40 41 42 42 43 45 45 46 48 49 50 51 51 52 53 53 54 55 56 57 57 58 60 60 61 62 62 63 63 66 71 71 73 76 77 6 Phase I: Data Classi? cation 6. 1 Supervised Learning . . . . . . . . . . . . . . . . . . . 6. 1. 1 Ensemble-Based Classi? er . . . . . . . . . . . . 6. 2 Classi? cation Algorithms . . . . . . . . . . . . . . . . 6. 2. 1 Support V ector Machines . . . . . . . . . . . . 6. 2. 2 Bayesian Networks . . . . . . . . . . . . . . . . 6. 2. 3 K-Nearest Neighbors (KNN) . . . . . . . . . . 6. 2. 4 C5. 0 Decision Tree . . . . . . . . . . . . . . . . 6. 3 Classi? cation using the Data Mining Toolkit . . . . 6. 3. 1 Weaknesses of the Approach . . . . . . . . . . 6. 4 Classi? cation using SPSS Modeler Solution Publisher 6. 4. 1 Implementation Details . . . . . . . . . . . . . 6. 5 Model Retraining Architecture: High Level Overview 6. 6 Final Thoughts . . . . . . . . . . . . . . . . . . . . . . 7 Phase II: Anomaly Detection and Stream Analysis 7. 1 Data Aggregation . . . . . . . . . . . . . . . . . . . . 7. 2 Bank Customers Aggregation Strategy . . . . . . . . 7. 3 Anomaly Detection . . . . . . . . . . . . . . . . . . . 7. 3. 1 Techniques for Anomaly Detection . . . . . . 7. 3. 2 Mahalanobis Distance . . . . . . . . . . . . 7. 4 Stream Analysis . . . . . . . . . . . . . . . . . . . . . 7. 4. 1 Window-Based Operators . . . . . . . . . . . 7. 4. 2 Window-Based Anomaly Detection Strategy 7. 5 Final Thoughts . . . . . . . . . . . . . . . . . . . . . Part III: Critical Review 8 Overall Evaluation 8. 1 Performance Measurement Techniques . . . . . . . . . 8. 1. 1 Performance Metrics . . . . . . . . . . . . . . . 8. 1. 2 Accuracy Levels . . . . . . . . . . . . . . . . . 8. 2 Data Preprocessing and Business Rules Analysis . . . 8. 3 Data Classi? cation . . . . . . . . . . . . . . . . . . . . 8. 3. 1 Un-preprocessed Classi? er Analysis . . . . . . 8. . 2 Preprocessed Un-Sampled Classi? er Analysis 8. 3. 3 Preprocessed Sampled Classi? er Analysis . . . 8. 3. 4 Ensemble-Based Classi? er Analysis . . . . . . 8. 4 Anomaly Detection . . . . . . . . . . . . . . . . . . . . 8. 5 Overall Concept . . . . . . . . . . . . . . . . . . . . . . 8. 6 Future Work . . . . . . . . . . . . . . . . . . . . . . . . 8. 6. 1 Extend Services . . . . . . . . . . . . . . . . . . 8. 6. 2 eXtreme Scale . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 78 78 79 80 80 81 83 84 87 88 89 90 91 92 i 8. 7 8. 6. 3 Architecture and Data Mining Algorithms . . . . . . . . . . . . . . . . . . . . . . . Final Thoughts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 94 95 i vi 9 Conclusion Appendix A Supporing Figures Glossary List of Figures Figure 1. 1 Figure 2. 1 Figure 2. 2 Figure 2. 3 Figure 2. 4 Figure 2. 5 Figure 2. 6 Figure 2. 7 Figure 2. 8 Figure 2. 9 Figure 3. 1 Figure 3. 2 Figure 3. 3 Figure 3. 4 Figure 3. 5 Figure 3. 6 Figure 3. 7 Figure 3. 8 Figure 4. 1 Figure 4. 2 Figure 4. 3 Figure 4. 4 Figure 4. 5 Figure 4. 6 Figure 4. 7 Figure 5. 1 Figure 5. 2 Figure 5. 3 Figure 5. 4 Figure 5. 5 Figure 5. 6 Figure 5. 7 Figure 5. 8 Figure 5. 9 Figure 5. 10 Figure 5. 11 Figure 5. 12 Figure 5. 13 Figure 5. 14 Figure 5. 15 Figure 6. Figure 6. 2 Figure 6. 3 Figure 6. 4 Figure 6. 5 Lost in Translation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . As-Is Banking IT Architecture . . . . . . . . . . Hype Cycle for Application Architecture, 2009 To-Be Banking IT Reference Architecture . . . . MitB Operation . . . . . . . . . . . . . . . . . . Possible Paypal website (1) . . . . . . . . . . . Possible Paypal website (2) . . . . . . . . . . . Keyboard State Table method . . . . . . . . . . Windows Keyboard Hook method . . . . . . . Kernel-Based Keyboard Filter Driver met hod . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 5 5 5 8 10 10 11 11 11 16 16 17 20 20 20 21 21 24 25 26 26 27 28 29 30 32 32 33 34 35 35 36 37 40 40 42 45 46 48 50 51 52 53 54 Components of the Chip and Pin Attack . . . . . . . . . . . . Attack to Card Illustrated . . . . . . . . . . . . . . . . . . . . One-Time-Password Hacking Material and Architecture . Number of European Internet Users and Online Purchasers Forecast: US Online Retail Forecast, 2010 to 2015 . . . . . . . Web Growth has Outpaced Non-Web Growth for Years . . . US Mobile Bankers, 2008-2015 . . . . . . . . . . . . . . . . . US Mobile Banking Adoption . . . . . . . . . . . . . . . . . . CRoss-Industry Standard Process for Data Mining . . . . . . . . . Streams Programming Model . . . . . . . . . . . . . . . . . . . . . â€Å"Straight-through† processing of messages with optional storage. Backup and Fail-Over System for Streams . . . . . . . . . . . . . . Multiple-Machines Architecture . . . . . . . . . . . . . . . . . . Analytical and Business In telligent Platforms Compared . . . . . Global Flow of Events: Stream-Based Fraud Detection Solution . Overall SPSS Modeler Stream for the Of? ine Data Preprocessing Phase Frequency of Transactions per Hour . . . . . . . . . . . . . . . . . . . . Amount Transferred per Transaction . . . . . . . . . . . . . . . . . . . . Data Feature Selection in SPSS . . . . . . . . . . . . . . . . . . . . . . . Data Preparation Preprocessing Phase in SPSS . . . . . . . . . . . . . . SPSS Stream CHAID Tree Model . . . . . . . . . . . . . . . . . . . . . . CHAID Tree for Data Reduction . . . . . . . . . . . . . . . . . . . . . Filtering Null Values with SPSS . . . . . . . . . . . . . . . . . . . . . . . Cyclic Values of Attribute hour1 . . . . . . . . . . . . . . . . . . . . . . K-Means Modeling in SPSS . . . . . . . . . . . . . . . . . . . . . . . . . Clustering with K-Means in SPSS Modeler . . . . . . . . . . . . . . . . Stream-based Application: Data Preprocessing and Rule-Based Engine Stream-based Application: Data Preprocessing . . . . . . . . . . . . . . Stream-based Application: Rule-Based Engine . . . . . . . . . . . . . . Interaction Between a BRMS and a Stream-based Application . . . . . Classi? cation in Stream-Based Application .Ensemble-Based Classi? er . . . . . . . . . . . Classi? cation in SPSS . . . . . . . . . . . . . . Support Vector Machines (SVMs) Illustrated Example of a Bayesian Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . i Figure 6. 6 Figure 6. 7 Figure 6. 8 Figure 7. 1 Figure 7. 2 Figure 7. 3 Figure 7. 4 Figure 7. 5 Figure 7. 6 Figure 7. 7 Figure 7. 8 Figure 7. 9 Figure 7. 10 Figure 7. 11 Figure 7. 12 Figure 7. 13 Figure 8. 1 Figure 8. 2 Figure 8. 3 Figure 8. 4 Figure 8. 5 Figure 8. 6 Figure 8. 7 Figure 8. 8 Figure 8. Figure A. 1 Figure A. 2 Figure A. 3 Figure A. 4 Figure A. 5 Figure A. 6 K-Nearest Neighbors Illustrated . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Section of C5. 0 Decision Tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . SPSS C&DS: Classi? er Retraining . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Anomaly Detection Stream-based Application . . . . . . . . . . . . Aggregate Bank Customers . . . . . . . . . . . . . . . . . . . . . . . Learning a classi? er model for the normal class of transactions . . Transaction not belonging to a cluster . . . . . . . . . . . . . . . . .Transactions far from the clusters’ center . . . . . . . . . . . . . . . Mahalanobis Distance Illustrated . . . . . . . . . . . . . . . . . . . . Mahalanobis Distance: Stream-based Application . . . . . . . . . . Window Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Tumbling Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . Sliding Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Partitioned Keyword . . . . . . . . . . . . . . . . . . . . . . . . . . . Account average expenses and frequency of transactions in 3 days Window-Based Analysis: Stream-based Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 55 60 61 63 64 65 65 66 67 71 71 72 73 73 74 78 79 84 86 88 89 92 92 94 ii iii iii iv iv v Benchmarking Stream-based Application: Concept for Each Processing Step . . Confusion Matrix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Comparison between Un-Preprocessed and Preprocessed Data: Accuracy Levels Comparison between Sampled Datasets: Accuracy Levels (TP/FP) . . . . . . . Stream Analysis: Debited Account . . . . . . . . . . . . . . . . . . . . . . . . . . . Overall View of the Solution: Accuracy Levels (TP/FP/FN) . . . . . . . . . . . . Overall St ructure of the Financial Services Toolkit . . . . . . . . . . . . . . . . . . In-Memory Database with InfoSphere Streams . . . . . . . . . . . . . . . . . . . . Stream-Based Application: a Flexible and Multifaceted Architecture . . . . . . . Stream-based Application: Overview . . . . . . . . . . . . . . . . . . . . . . . . . . Time per Transaction for each of the Data Preprocessing Approaches . . . . . . . Time per Transaction for Preprocessing the Data and Examine the Business Rules . Metrics Data Classi? cation Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . Anomaly Detection Time per Transaction . . . . . . . . . . . . . . . . . . . . . . . . Fraud Detection: Time per Transaction . . . . . . . . . . . . . . . . . . . . . . . . . List of Tables Table 3. 1 Table 5. 1 Table 5. 2 Table 6. 1 Table 7. 1 Table 8. 1 Table 8. 2 Table 8. 3 Table 8. 4 Table 8. 5 Table 8. 6 Table 8. 7 Table 8. 8 National fraud in France categorized by transaction type . . . . . . . . . . . . . . . Communalities PCA/Factor Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . Steps for Under-Sampling Based on Clustering (SBC) . . . . . . . . . . . . . . . . . . Supported Mining Algorithms: Data Mining Toolkit . . . . . . . . . . . . . . . . . . Hardware Speci? cation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Individual Classi? er Accuracy Levels – Un-Preprocessed Training Set . . . . . Individual Classi? er Accuracy Levels – Un-Sampled Preprocessed Training Set Multiple Sampling Ratios Analyzed . . . . . . . . . . . . . . . . . . . . . . . . . Multiple Sampling Ratios Analyzed . . . . . . . . . . . . . . . . . . . . . . . . . Ensemble-Based Classi? r: Balanced . . . . . . . . . . . . . . . . . . . . . . . . Ensemble-Based Classi? er: Maximum Fraud Detection . . . . . . . . . . . . . Ensemble-Based Classi? er with Mahalanobis: Balanced Model Combination . Ensemble-Based Classi? er with Mahalanobis: Maximizing Fraud Detectio n . . . . . . . . . . . . . . . . . . . . . . . . . 19 34 41 56 77 81 83 85 85 87 87 89 89 List of Algorithms Algorithm 1 Algorithm 2 Algorithm 3 Algorithm 4 Algorithm 5 Algorithm 6 Algorithm 7 Algorithm 8 Algorithm 9 Algorithm 10 Algorithm 11 Algorithm 12 Algorithm 13 Algorithm 14 InputSource: Receive Incomming Transactions . . . . . . . . . . . . . . . . ODBCEnrich: Enrich an Incomming Transaction . . . . . . . . . . . . . . . . Non-Generic C++ Primitive Operator: Manual Preprocessing . . . . . . . . . Preprocessing: Manual Preprocessing of Incoming Transactions . . . . . . . Functor: Split Stream for Preprocessing and Rule-Based Engine . . . . . . . . Join: Append Business Rules to Preprocessed Transaction . . . . . . . . . . . Join: Append Business Rules to Preprocessed Transaction . . . . . . . . . . . Data Mining Toolkit Operator: Decision Tree C5. 0 Classi? er . . . . . . . . . . Non-Generic C++ Primitive Operator: Supervised Analysis . . . . . . . . . . Classi? cationEnsembl e: Constructor() . . . . . . . . . . . . . . . . . . . . . . Classi? cation Ensemble: process(Tuple & tp, uint32_t port) . . . . . . . . . . Variance-Covariance Inverse Matrix used in the Mahalanobis Distance . . . Individual Account Anomaly Detection Approach . . . . . . . . . . . . . . . Voting Protocol: Mahalanobis Distance, Window-Based and Classi? er Score . . . . . . . . . . . . . . 43 44 45 46 47 47 47 56 58 58 59 68 75 75 Chapter 1 Introduction â€Å"A journey of a thousand miles must begin with a single step† Lao Tzu â€Å"If you work on fraud detection, you have a job for life†. These were the words used by Professor David J.Hand1 in one of his talks to synthesize the vast research ? eld that is Fraud Detection. Indeed, this ? eld consists of multiple domains, and is continually evolving through time with new strategies and algorithms to counter the constantly changing tactics employed by fraudsters2 . In this line of thought, currently available solutions ha ve been unable to control or mitigate the everincreasing fraud-related losses. Although thorough research has been done, only a small number of studies have led to actual Fraud Detection systems [27], and the focus is typically on novel algorithms aiming at increasing the accuracy levels.To this end, we want to look at the problem from a different angle, and focus on the foundations for a real-time and multi-purpose solution, based on a technology known as Stream Computing, able to encompass these algorithms while creating the possibilities for further research. We subdivide our study in three main parts. We begin with an overall understanding of the topic being discussed by de? ning the research environment, its problems and presenting the solutions currently available. In addition, we conclude this ? rst part by both specifying the structure, and outlining the objective of the research.The second part explores the overall course of action to bring about a Stream-based Fraud Detect ion solution. From this perspective, we discuss different strategies previously researched in Data Preprocessing, Data Classi? cation and Behavior-based Analysis, and tackle their combination and integration in a Stream-based application. Last but not least, we review the overall solution proposed, and examine the possibilities offered by the latter for further research in the ? eld of Fraud Detection in the Retail Banking Industry. Senior Research Investigator and Emeritus Professor of Mathematics at the Imperial College of London, and one of the leading researchers in the ? eld of Fraud Detection – http://www3. imperial. ac. uk/people/d. j. hand – link to the presentation: http://videolectures. net/mmdss07_hand_stf/ 2 a person intended to deceive others (i. e. one who commits fraud) [de? ned in the Glossary] 1 Part I: Setting the Scene â€Å"Great things are not done by impulse, but by a series of small things brought together† Vincent van Gogh Fraud Detection in itself is interlinked with numerous ? lds of study, and before the play’s main action, we want to set the stage. In order to avoid getting off track and allowing you to better understand the scope, contents, choices made, and requirements of the research, we divided this act in three scenes. In the ? rst, we introduce the main actors – namely banks, bank customers and fraudsters. In addition, we also present the current situation in the Detection and Prevention of Fraud in banks, describing the techniques being used both to counter and to commit fraudulent transactions. The second scene introduces the overall problem of fraud in the Banking Sector.It identi? es the weaknesses of the latest solutions, and quanti? es fraud losses as accurately as possible in some European countries and this based on the most recent data. We then take a step further and comment on new trends, and predict possible risks banks might incur from them. Before the end of the act, we introdu ce the two main parts of the play, as well as how we intend to approach the problem. More precisely, we provide some speci? cs regarding the research conducted, the tools used and the plan followed to reach our conclusions. Figure 1. : Lost in Translation 2 Chapter 2 Retail Banking and The State of the Art in Detection and Prevention of Fraud â€Å"There are things known and there are things unknown, and in between are the doors of perception† Aldous Huxley Businessmen and politicians, before sealing deals or taking political decisions, are known to go through a phase of reconnaissance – the military term for exploring enemy or unknown territory. Just as it is important to them, so it is for you when you are about to dive into the speci? cs of a real-time fraud detection solution.In this line of thought, it is important to grasp the context of the research to better understand the concepts discussed. To do so, we start this chapter with an overall view of the Retail Ba nking Industry, to understand both its services and IT architecture (Section 2. 1); we continue with a de? nition of fraud together with a description of the different fraud types that affect banks and how they operate (Section 2. 2); lastly, we give an overview of some of the current solutions available (Section 2. 3). 2. 1 The Retail Banking Industry To describe the banking industry’s evolution that started earlier than 2000 B.C. [91], deserves almost a research paper on its own. For this reason, and because we don’t want to divert from the topic, we start by solely providing a simple and brief resume about the origins of the banking industry (Section 2. 1. 1). The latter is an interesting talking point that not only allows you to understand how it all started, but also to perceive the challenge of keeping a bank pro? table. Additionally, it is a good introduction to understand a more technical description of the IT architecture behind the banking services (Section 2 . 1. 2). 2. 1. 1 A Short Walk Down Memory LaneIt all started with barter back in the time of Dravidian India, passing through Doric Greece to preRoman Italy, when a cow or an ox was the standard medium of exchange. [91] However, given the dif? culty of trading fairly, evaluating different goods with the same standards, and ? nding suitable goods for both parties involved, the invention of â€Å"money† inevitably developed. Indeed, the origin of the word money is pecunia in Latin, which comes from pecus, meaning cattle. Through time, money evolved in the different civilizations and became not only a symbol but also a key factor in trading.Together with the development of the art of casting, the different mediums of exchange evolved gradually from random precious metals to what we now know as currency. This developments made our forefathers the proponents of the ? rst banks for reasons that are still of applicability in today’s banking system. The code of Hammurabi in th e early 2000 B. C. stated â€Å"If a man gives to another silver, gold or anything else to safeguard, whatsoever he gives he shall show to witnesses, and he shall arrange the contracts before he makes the deposits. [91] It is therefore clear that the Babylonians already placed back in their time their valuable possessions in a safe place, guarded by a trusted man. 3 Nevertheless, the real inspiration for the banking system as we know it today came from the Greeks. Unlike the Babylonians, the Greeks didn’t have a government and therefore the country was divided into independent states that were constantly either at war or in a state of unrest. [91] In these turbulent times, they found Temples to be the only safe place able to survive the test of wartime.They were seen as safe deposit vaults, marking the beginning of the functions of our current banks. Indeed, records show that the Temples not only kept money safe but also lent the funds at a certain interest rate. In addition , even though safeguarding the money started as a service free of charge, it soon turned into a business where small commissions were applied. The banking industry continued to evolve through time, from the commercial development of the Jews; passing by the establishment of the Bank of St.George, the Bank of the Medici and the Bank of England, to the rise of the Rothschilds, and the development of banking in the land of the Vikings. [91] At this moment in time, a major bank is a combination of a dozen of businesses, such as corporate, investment and small business banking, wealth management, capital markets. One among these is the retail banking industry. [46] The retail banking industry is characterized by a particularly large number of customers and bank accounts in comparison to any other banking business, which results in a much higher number of transactions, services and products.In addition, it relies more and more on technology due to the levels of cooperation between banks, retailers, businesses, customers leading to an ever-increasing amount of information processing requirements. In a nutshell, today’s banks follow the same principle described earlier by borrowing from clients in surplus and lending to those in de? cit. This triangulation is a win-win situation for the bank and its customers: the bank makes revenue from the net interest income, which is the difference between what it pays to the lending customer and what it receives from the borrower.Nevertheless, the bank can’t lend all the deposits and needs to guarantee that a certain percentage is kept aside to satisfy customer withdraws and requirements. [92] Even though the situation varies from bank to bank, it is noteworthy to mention that â€Å"more than half of a retail bank’s revenue, perhaps three-quarters, comes from this intermediation role in the form of net interest income†. [46] To conclude, in today’s world, and after years of evolution, retail ban ks provide you with a multitude of services for which they charge fees, mainly to cover the maintenance of the infrastructure and the bank’s structure.These added up together account between 15% to 35% of the net interest income. [46] Among the services you can ? nd payment services, phone banking, money transfer, ATMs1 , online banking, advisory services, investment and taxation services, mobile banking and many more. How does a bank ef? ciently govern, offer and maintain all these services? 2. 1. 2 The Retail Banking IT Systems’ Architecture Just as banking services evolved through time so did the overall back-end architecture allowing a bank to provide all the aforementioned services. This evolution was especially prominent after the unveiling by Barclays Bank f the ? rst ATM machine in 19672 : from that moment on, banks started investing heavily in computerized systems with the goal of automating manual processes in an effort to improve its services, overall status in the market and cut costs. From this perspective, the IT systems of banks matured from the creation of payment systems together with the launch of the international SWIFT network3 in the 70s, to today’s core banking system: a general architecture that supports all the channels and services of a bank and where each one of them is digitalized.An overview of such general architecture is illustrated in Figure 2. 1 [77]. 1 acronym for Automated Teller Machine, a machine that automatically provides cash and performs other banking services on insertion of a special card by the account holder [de? ned in the Glossary] 2 http://www. personal. barclays. co. uk/PFS/A/Content/Files/barclays_events. pdf 3 Society for Worldwide Interbank Financial Telecommunication (SWIFT) is a member-owned cooperative that operates a worldwide standardised ? nancial messaging network through which the ? nancial world conducts its business operations http://www. wift. com 4 This architecture was in plac e in many banks some years ago, and still is in some cases, but even though it provides the clients with all the necessary banking tools, it had certain drawbacks that became visible through the modernization and improvement of services. As it is described by both Microsoft [82] and IBM [77]: the as-is architecture has no true enterprise view of a customer because information is duplicated, which leads to inconsistent customer services and promotions across channels; when adding new or changing current products, it takes time to bring Figure 2. : As-Is Banking IT Architecture (source [77]) them to the market and a signi? cant amount of changes to the core system code. This leads to a dif? culty in responding quickly to new challenges and evolving regulatory pressures. Faced with the aforementioned problems, banks had the need to change towards a more ? exible and ef? cient architecture that would allow them to comply with the ever-changing needs of the clients and of the technology. With this n mind, the major players in core banking have switched to a Service-Oriented Architecture (SOA) with the intended goal of improving growth, reducing costs, reducing operational risks, and improving customer experience. [69] [94] [83] [77] [82] As reported by Forrester in a survey in 2007 [82], out of 50 European banks, 53 percent declared they were already replacing their core system while 27 percent were planning to do so and 9 percent had already completed a major transition. The same survey assessed that 56 percent of the banks already used SOA and 31 percent were planning to.Additionally, in Gartner’s 2009 report (Figure 2. 2 [28]), supports this strategy and believed that SOA-based architectures was increasingly being adopted and would be widely accepted in a time frame of 2 to 5 years. In the latest update (2011th Edition [29]), SOA is entering the Plateau of Productivity, which indiFigure 2. 2: Hype Cycle for Application Architecture, 2009 cates that the ma instream adoption is starting to take off. (source [28]) With this transition to an agile banking platform with a more ? exible product de? ition built on SOA principles, banks expect to gradually simplify their business and become more ef? cient in the long term. Indeed, the aforementioned platform which is illustrated in Figure 2. 3, is meant to provide the banks with faster and easier ways to update the system and comply with changing industry regulations and conditions. Additionally, by having a holistic view of the customer-relevant data across systems, a bank is able to better focus and analyze it with the goal to improve its customers experience by investing in more ef? cient and ? xible customer-centric offerings. Lastly, the architecture allows for integrated customer analytics and insight capabilities. In this line of thought, a stream-based real-time fraud detection solution would be easy to integrate in such an architecture, allowing the bank, as we will see later on, to broaden its services, data analysis capabilities and detect fraud in realtime. Figure 2. 3: To-Be Banking IT Reference Architecture (source [77]) 5 2. 2 Fraud When one wants to get something from others illegally he can do it in two ways: force or trick them into doing so. The ? st is better known as robbery and is usually more violent and noticeable; the second is known as fraud, which is more discrete and therefore preferred by fraudsters. [76] From this we can understand that fraud includes a wide variety of acts characterized by the intent to deceive or to obtain an unearned bene? t. [30] Many audit-related agencies provide distinct insights into the de? nition of fraud that can be brie? y summarized in this way: De? nition 1. Fraud consists of an illegal act (the intentional wrongdoing), the concealment of this act (often only hidden via simple means), and the deriving of a bene? (converting the gains to cash or other valuable commodity) [30] Given this de? nition, we can furt her classify the known types of fraud by victim, perpetrator and scheme [76]: †¢ Employee Embezzlement – Employees deceive their employers by taking company assets either directly or indirectly. The ? rst occurs without the participation of a third party and is characterized by an employee who steals company assets directly (e. g. cash, inventory, tools, etc. ). In the second, the stolen assets ? ow from the company to the perpetrator through a third party.Indeed, indirect fraud happens usually when an employee accepts bribes to allow for lower sales or higher purchases prices, or any other dishonest action towards the company. †¢ Vendor Fraud – This type of fraud usually happens when a seller overcharges its products; ships lower quality goods; or doesn’t ship any products to the buyer even though it received the corresponding payment. Vendor fraud happens more frequently with government contracts and usually becomes public when discovered, being one of the most common in the United States. Customer Fraud – Customer fraud takes place when a customer doesn’t pay for the products he purchased, pays too little, gets something for nothing or gets too much for the price. All these situations occur through deception. †¢ Management Fraud – Management fraud, also known as ? nancial statement fraud, is committed by top management who deceptively manipulate ? nancial statements. The interest behind these actions is usually to hide the real economic situation of a company by making it look healthier than it actually is.However, for the purpose of this research, and given the fact that we are focusing on fraud perpetrated in the retail banking industry, we will mainly focus on every possible bank transaction that a customer can perform. The research will be based in debit, online banking – namely electronic bill payment and giro transfers – and debit plastic card transactions. Fraud that can be perpet rated against these transactions falls within the category known as consumer fraud. Additionally, the latter can be sub-categorized in Internet and e-commerce fraud and other (non-)internet related fraud that we will now describe in more detail. . 2. 1 Internet and E-Commerce Fraud The Internet†¦ a technology that was unknown to many of us 25 years ago and is used now by billions of people either at home, work or on-the-go. We can ? nd webpages from business home pages, to informational wikis, passing through social networking sites; ? les that take the form of text, audio or video; and a multitude of services and web applications. It took just 3 years for the Internet to reach over 90 million people while the television and the radio took respectively 15 and 35 years to reach 60 million people! 76] This is how fast the medium through which e-commerce fraud takes place has evolved. This informational and technological revolution led to new ways for fraud to be perpetrated while techniques to avoid it have dif? culties to keep up with the pace. Today, businesses depend on the Internet to perform paperless transactions and exchange information between them: they mostly use e-business connections, virtual private networks (VPNs1 ), and other specialized connections. 76] This type of commerce is known as e-commerce, or electronic commerce, because it takes place over electronic systems. Therefore, even if you think you are not using the Internet, any operation you make at a local branch, any withdraw you do from an ATM or any purchase you make at a local store with your bank card, a Network transaction takes place. 1 it’s a method employing encryption to provide secure access to a remote computer over the Internet [de? ned in the Glossary] 6Since most businesses rely on Network-based transactions and, as we will describe later on, Internet users use the network more and more frequently to buy products or services, the North American Securities Administ rators Association (NASAA) considers that Internet fraud has become a booming business. [76] With this in mind, there are three standpoints that need to be taken into consideration when describing in more details the risks involved in this category that undermine banks and more importantly their customers: risks lying inside and/or outside the organization.Risks Inside Banks and Other Organizations The main risks come from within the bank. [76] Indeed, a perpetrator with inside access has knowledge regarding the environment, the security mechanisms and how to bypass them. Additionally, any employee with access to the organization’s network has automatically bypassed ? rewalls and security checks making it easier to in? ltrate systems, steal information or data and cause damage to the bank. From this perspective, the most common example is the superuser access that most IT-related employees (e. g. rogrammers, technical support, network administrators or project managers) have within the company’s infrastructure and database systems. [76] In one survey, â€Å"more than a third of network administrators admitted to snooping into human resource records, layoff lists, and customer databases†. [76] A related survey found that â€Å"88 percent of administrators would take sensitive data if they were ? red, and 33 percent said they would take company password lists†. [76] Even if a perpetrator does not have personal access to the targeted system and information, there are techniques that he can use to get at them indirectly, i. . via a person of interest: – Snif? ng, also known as Eavesdropping: Snif? ng is the logging, ? ltering, and viewing of information that passes along a network connection. Applications are easily and available for free on the Internet, Wireshark1 and tcpdump2 that allow network administrators to troubleshoot any possible problem in the network. Nevertheless, these applications can as easily be used by hackers to gather information from unencrypted communications. 76] A good example is the usage of unencrypted e-mail access protocols like Post Of? ce Protocol 3 (POP3) or the Internet Message Access Protocol (IMAP) instead of other more secured ones. Since e-mail clients check messages every couple of minutes, hackers have numerous opportunities to intercept personal information. [76] A user could in addition encrypt the body of the email by using Secure/Multipurpose Internet Mail Extensions (S/MIME) or OpenPGP in order to avoid that sensitive information passes through the network in plain text.Even though security experts have successfully managed to encrypt emails, the reason behind this lack of security is that they have failed to take into consideration the needs of the end-user – namely, â€Å"the ability to occasionally encrypt an email without much trouble at all†. [113] – Wartrapping: Wartrapping happens when hackers set up free access points to the Internet t hrough their laptops in speci? c locations like airports or inside a company’s headquarters. Users, unaware that the wi? passes through a hacker’s computer, connect to the latter and navigate the Internet as if they had a secured connection.When logging their internet banking services and performing transactions, or simply access their emails, the hacker can see the bits and bytes of every communication passing through any laptop in the clear. In this line of thought, hackers can get caught in their own web as companies are also using what they call honeypot traps. The latter is an information system resource, like a computer, data, or a network site (e. g. wireless entry), whose purpose is not only to divert attackers and hackers away from critical resources, but also to serve as a tool to study their methods. 1] These systems are placed strategically so to look like part of the company’s internal infrastructure even though they are actually isolated and monito red by administrators of the organization. One of the most widely used tools is honeyd3 . [89] 1 2 3 http://www. wireshark. org/ http://www. tcpdump. org/ http://www. honeyd. org/ 7 Passwords are the Achille’s heel of many systems since its creation is left to the end user who keeps them simple and within his or her preferences and life experiences (e. g. birthdays, family names, favorite locations or brands).In addition, users tend to re-use the same password for different purposes in order to avoid having to remember different ones, which leads perpetrators to gain access to different services and accounts with a single password from the person. In addition, another source of threats are the laptops and mobile devices that many employees take with them outside the company’s protected environment. While in these unsecured contexts, the devices are exposed to viruses, spyware, and other threats that might compromise again the integrity of other organization’s sy stem once these computers are plugged in the network.Viruses, trojans and worms are able to enter the protected environment without having to go through ? rewalls and security checks, making it easier to in? ltrate key information systems and bypass defense mechanism. Risks Outside Banks and Other Organizations The Internet not only became a source of services to users and companies but also a rich medium for hackers to gain access to personal systems. Indeed, when performing attacks, hackers are relatively protected because they cross international boundaries – which puts them under a different jurisdiction than the victim of the attack – and are mostly anonymous – making tracking dif? ult. Therefore, the Internet became the defacto technological medium to perform attacks and there are numerous ways of doing so: – Trojan Horses: A trojan horse is a program designed to breach the security of a computer system and that has both a desirable and a hidden, us ually malicious, outcome. [86] These programs can be embedded in a bank user’s computer when he views or opens an infected email, visits or downloads a ? le from an unsecured website or even when visiting a legitimate website that has been infected by a trojan. [85] From this perspective, a good example is the man-in-the-browser (MitB) attack, represented in Figure 2. , which uses trojan horses to install extensions or plugins in the browser that are used to deceive a bank customer: Whenever a speci? c webpage is loaded, the Trojan will ? lter it based on a target list (usually online banking pages). The trojan extension waits until the user logs into his bank and starts to transfer money. When a transaction is performed, the plug-in extracts data from all the ? elds and modi? es the amount and recipient according to the hacker’s preferences through the document object model (DOM1 ) interface, and resubmits the form to the server.The latter will not be able to identify whether the values were written by the customer or not and performs the Figure 2. 4: MitB Operation (source2 ) transaction as requested. [85] – ATM Attack Techniques: An Automated Teller Machine (ATM), is a computerized device that allows customers of a ? nancial institution to perform most banking transactions and check their account status without the help of a clerk. The device identi? es the customers with the help of a plastic bank card, which contains a magnetic stripe with the customer’s information, together with a personal identi? ation number (PIN) code. [2] ATMs are attractive to fraudsters because they are a direct link to customers information and money, and there are security pitfalls with their current architecture [2]: the way data is encoded in the magnetic media makes it easily accessible if a hacker invests some money to buy the easyto-be-found equipment, and time to decode and duplicate the contents; in addition, with a four 1 An interface that let s software programs access and update the content, structure, and style of documents, including webpages [de? ed in the Glossary] 2 www. cronto. com, blog. cronto. com/index. php? title=2fa_is_dead 8 digit PIN, not only will one in every 10. 000 users have the same number but it also allows brute force attacks to discover the combination. Not to mention the possible physical attacks on ATMs which cannot be considered as fraud (see De? nition 1), there are a couple of ways fraudsters steal money from bank customers [2]: 1. Skimming Attack: skimming is the most popular approach in ATMs and consists in using devices named skimmers that capture the data from the magnetic strip.These devices can be plugged in an ATM’s factory-installed card reader and allows for download of all personal information stored on the card. In addition, to obtain the PIN code fraudsters use either shoulder-sur? ng and hidden video cameras, or distraction techniques while the customer uses the ATM. [2] S ometimes fraudsters take a step further and create their own fake teller machines to deceive bank customers; this is considered to be a spoo? ng attack that we will describe in more details below. [39] 2.Card Trapping: this tech