Tuesday, January 28, 2020

Crime Risk Management

Crime Risk Management How can the security/risk manager utilise the Crime Risk Management process and how useful is this process? Crime Risk Management (CRM) is an evolutionary and analytical process to assess whether organisational procedures, assets or individuals could become exposed to a potential threat; to identify the measures necessary to reduce any such risk; to mitigate the consequences of any hazard once realised; to evaluate the success or otherwise of the prescribed course of action; and to adapt appropriately. The conventions of risk management take into account that whilst risk is unlikely to be entirely eradicated, adapting organisational security mechanisms to further protect against anticipated or imagined threats can significantly reduce it. The Crime Risk Management process provides those responsible for securing an organisation against risk with various tools. To develop a greater understanding of how CRM is utilised today it is beneficial to consider the practices of a particular industry in isolation. The manner in which the banking industry combats financial crimes such as plastic fraud provides a useful example. Further to this, in order to critically assess the effectiveness of the approaches taken by industry watchdogs in safeguarding against risk, a brief comparison between the Banking sector and the United Nations CRM practices has been included. Ultimately, when best practices are followed, the CRM process can also have the effect of a deterrent against future misconduct when the latent vulnerabilities of an operation are recognised and appropriately reduced to within acceptable boundaries. According to constitutive criminology, crime is defined as the harm resulting from people â€Å"investing energy in harm-producing relations of power,† which â€Å"denies others their ability to make a difference† (McLaughlin and Muncie, 2006:66). The United States (US) Air Force Material Command Pamphlet (AFMCPAM 63-101, 1997:5) describes risk as â€Å"a measure of a projects inability to achieve program objectives†¦(it) has two components: the probability of failing to achieve particular performance, schedule or cost objectives, and the consequences of failing to achieve those objectives†. Subsequently, risk management is the process of ‘controlling’ such risks and â€Å"includes identifying and tracking risk areas, developing risk mitigation plans as part of risk handling, monitoring risks and performing risk assessments to determine how risks have changed† (AFMCPAM 63-101, 1997:5-6). Cox (2005:64) defines risk management as a â€Å"decision process that maps available risk assessment information about the probable consequences of acts of crime, along with value judgments and priority information concerning the choices of which acts to take in response†. This definition however interprets the discipline of risk management as a more passive activity, focusing more on the assimilation of information and the analysis that follows, rather than the active intervention required to avert or alleviate the risk. Conversely, Broder as cited in Nalla Newman (1990: 92), defines CRM as the â€Å"anticipation, recognition and appraisal of a risk and the initiation of some action to remove the risk or reduce the potential loss from it to an acceptable level†. Based on the above contrasting definitions, one focusing on the information gathering and analysis aspect, and the other accentuating the notion of taking action to avert the risk, CRM can be concluded to have a number of objectives: namely to assess risk by proactive means rather than simply reacting to risks as and when they are encountered, to assess potential losses that might result from these eventualities, conduct a cost benefit analysis of taking risk intervention measures such as setting up a CRM process, and finally, to minimise, control or transfer foreseeable risks (Gill, 1998:14). Therefore, a solid â€Å"risk management approach includes three primary elements: a threat assessment, a vulnerability assessment, and a criticality assessment† (Decker, 2001:1). Each of these aspects also takes into consideration the probability of an occurrence and the timeframe in which it is likely to occur during the lifetime of a project (AFMCPAM 63-101, 1997:6). Threat assessments are critical supports for operational decision-making in the security program design phase, identifying areas requiring crucial and concerted efforts. These assessments identify and evaluate risks based on a number of elements including ‘capability’, ‘intentions’, and the ‘potential lethality’ of a breach (Decker, 2001:1). Since there is no way to anticipate every possible risk, or to know everything about each risk, the two other processes involved in this method, vulnerability and criticality assessments, are essential in maximising preparedness against the threat of a violation. A vulnerability assessment determines â€Å"weaknesses that may be exploited† by potential perpetrators and â€Å"suggests options to eliminate or mitigate those weaknesses†. â€Å"A criticality assessment is a process designed to systematically identify and evaluate†: an operation’s key assets based on their consequence to the fulfilment of its mission or basic function, those within the organisation that may prove vulnerable, â€Å"or the significance of a structure† (Decker, 2001:1). This aspect of the CRM approach is imperative since it has the potential to aid preparedness against material threats, and in turn, enhance the allocation of scarce resources to those areas, whether to assets, procedures or structures, subsequently identified as being of the highest priority and thereby requiring ‘special protection’ from perceived threats (Decker, 2001:1-2). While a number of conventional theories are both accessible and feasibly applicable as CRM processes, the two contemporary methods that are the most popular are the rational choice and routine activity theories. The routine activity approach considers only direct-contact predatory violations, where at least one offender takes or damages the property of at least one other person. It is thus based on three factors, â€Å"a likely offender, a suitable target and the absence of capable guardians against crime† (Cohen and Felson, 1979:588). On the other hand, the rational choice approach focuses on situational crime prevention, predicting the time and place where crimes are likely to occur, reducing opportunities and the motivation to offend, and thereby decreasing the propensity of the criminal to offend at all (Clarke and Cornish, 1985:174-177). Both of these approaches highlight the importance of assimilation and analysis of information. To this end, the Crime Pattern Analysis ( CPA) is a critical informative tool â€Å"which seeks to determine what crimes are likely to impact particular targets†, to identify â€Å"the criminals (most) likely to commit the crimes, and (to forecast) how and when such crimes are likely to occur† (Tyska and Fennelly, 1998:50). An initial consideration of these concepts would appear relatively straightforward, however the prospect of implementing an effective CRM process to adequately safeguard against risk can be a daunting endeavour for the security manager. One area in particular requiring a comprehensive CRM approach is the retail banking industry especially relating to plastic fraud. Plastic fraud includes various types of criminal activity including use of stolen cards, skimming, absent ordering, and identity theft (Newman and Clarke, 2003:145, Refer also to Appendix 1, page 13). Misuse of stolen cards is the most traditional form of plastic fraud, where cards are stolen from customers, enabling the fraudsters to make purchases in the window available to them between their acquisition of the card and the original card holder reporting the loss of the card to their issuing bank who take action to revoke or cancel the account (Slawsky and Zafar, 2005:101). Skimming is another form of plastic crime that takes place when a cardholder uses his card at any commercial establishment or cash machine. The details of the electromagnetic strip at the back of the card are copied onto a secondary storage device, which can later be replicated onto a counterfeit card, illegally cloned to resemble the details of the original, and reused by the fraudster for access to funds or illegal purchases. (Slawsky and Zafar, 2005:104). Another form of card crime growing in incidence is the ‘Card Not Present’ (CNP) variety. This occurs when the perpetrator makes a purchase t hrough mail order or telephone order, usually buying expensive merchandise, for their own personal gain, for either reselling it in the market-place or by tricking the merchant into refunding the value of the goods upon their return (Montague, 2004:12). Leonard and Lamb (2007:91) define identity theft as â€Å"afraud committed using the identifying information of another person†. As such, it comprises the misuse of information that is specific to an individual, usually involving â€Å"a partial and transient adoption (of the details)†¦in order to facilitate criminal activity† (Finch, 2002:86). In extreme cases, this could cause the victim huge financial losses, discomfort and social embarrassment where the protagonist attempts to use these details to derive material benefit at the expense of the victim. When applying the CRM process to this form of crime, the first step the security manager is required to take is the initial assessment phase, which involves evaluating the threats and areas of vulnerability in order to determine the level of risk. A number of tools are required at this stage, some of which are quantitative in nature, and others are qualitative (Fennelly, 2003:494). Quantitative analyses usually employ statistical sampling, based on mathematical calculations to assess the likelihood of a crime, extrapolated from results data (DePersia and Pennella, 1998:304). The aforementioned Rational Choice Theory is a related quantitative approach. Within the context of plastic fraud crime, application of this particular theory is exemplified through the regulated practice of profiling customers. In order to identify extraordinary behaviour financial institutions commonly track the regular transaction histories of their clientele. This is especially true of institutions that issue cards for credit purchases, viewing investment in database profiling of customer transaction histories as crucial. These systems make it possible to characterise potential ‘suspect’ incidents by programming patterns which trigger warnings including: sudden spending sprees, reaching the credit limit or exhausting the account balance, duplicate transactions of unlikely merchandise especially expensive items such as televisions, and an unusual avoidance of delivery services (Slawsky and Zafar, 2005:102). An example of automated programming used to detect uncharacteristic activity on card accounts is the Visa Intelligent Scoring Of Risk (VISOR) facility provided by the Visa network (Grabosky and Smith, 1998:170). The use of this CPA technique has improved the potential to diminish the effec t of fraudulent activity on both customers and institutions alike, by simultaneously preventing further theft and acting as a deterrent against aspiring felons. Qualitative assessments determine the chances of risk on a sliding scale from negligible to prohibitive based on the opinions, experience and knowledge of leading security management experts (Kovacich and Boni, 1999:192). Considering most plastic fraud takes place at the ‘Point of Sale’ (POS), and since highly skilled security managers cannot monitor everything at once, one of the most effective means of incorporating qualitative assessment into the CRM process is by implementing a thorough training regimen for employees, alongside a widespread awareness raising campaign aimed at educating customers and installation of permanent surveillance equipment such as CCTV (Horan, 1996:68-76). This dual approach instructs on the nefarious methods employed to misuse either cards or card information in order to create a front-line defence mechanism and enhance the fraud detection capacity of the operation. Any fraudulent activities intercepted by staff are rapidly communicated thro ughout the organisation, for instructive and investigative purposes, to further foster this self-regulative method (Horan, 1996:68). The assimilation of quantitative and qualitative analysis into banking industry best-practice CRM has resulted in the introduction of a number of effective controls designed specifically to curtail plastic fraud. One solution has been the introduction of embedded ‘microchip’ protection and PIN cards in the United Kingdom (Hoare, 2007:274). This security enhancement prevents the misuse of credit cards by requesting the card PIN for every transaction regardless of whether the customer is making a simple purchase or a cash withdrawal, thereby further reducing the risk of fraudulent transactions. This approach is then combined with customer advisories such as the need to keep cards and PIN information separate (Grabosky and Smith, 1991:170). When implementing crime risk management systems of this nature, however, there are two imperative considerations security managers must remain mindful of in advocating a particular method: probability and the associated cost-benefit outc omes. Proponents within crime management recommend that risk should always be viewed in a probabilistic context (Fischer and Green, 2004:139). For example, the recent collapse of the sub-prime mortgage market, beginning in the United States, has had a tremendous impact on global financial markets, however those organisations that viewed the probability of this event occurring as remote presumably installed fewer measures to insure against such a risk, thereby suffering the greatest losses. This example vindicates those weary observers who viewed this practice as dubious, although not criminal in the strictest sense, and who have continued to advocate for more rigorously stringent regulation of credit lending (Munro, Ford, Leishman, and Kofi Karley, 2005:1-3 26-30). The second, and arguably more important factor, is that the cost of CRM implementation should not exceed the benefits received to the institution in seeking to avoid the risk in the first instance (Culp, 2001:226). The indomitable pervasiveness of plastic fraud, although costly, does not quite warrant the installation of sophisticated risk management systems at all POS sites. One of the more dramatic recent proposals to counteract crimes of an identity fraud nature involves biometrically tagging individuals to a corresponding identification card in order to develop a log of all activities, which is then compiled into an ominous central database (Ahlefeld and Gaston, 2005:79). Although some view these measures as the only way possible of comprehensively monitoring and controlling such crimes, there are certainly many criticisms against this suggested method including the prohibitive cost of implementing and maintaining a system capable of delivering this service, the potential for sec urity breaches in the data system storing private records of citizens, and the associated infringements upon civil liberties and human rights likely to be raised in opposition to the proposal (Grant, 2008). Industry driven cost-benefit analysis is therefore a vital component of appropriate CRM design. There are innumerous benefits to implementing a CRM process within an organisation, regardless of the environment in which it is applied, in either the public or private sphere, which is why this approach has steadily grown in practice (McLaughlin and Muncie, 2006: 363-364). It is the essentially proactive nature of the approach taken in CRM, allowing for the mitigation and prevention of potentially disastrous outcomes, that explains why it is so well favoured. The banking industry is not alone in its vulnerability to losses through fraudulent practices; indeed according to calculations published by the United Kingdom (UK) Home Office Identity Fraud Steering Committee (IFSC), it is estimated that identity fraud represents an annual cost of  £1.7 billion to the UK economy (Home Office, 2006). The significance of this threat is a partial motivating factor behind the financial services sector adopting an industry-wide approach to CRM shared regulatory practices. The Credit Industry Fraud Avoidance System (CIFAS) is representative of this trend, working in conjunction with institutions across the entire financial sector and in the general interest of the banking fraternity. These cooperative systems are then linked to the broader national security management infrastructure, and though ongoing consultations and data sharing, a complex relationship has been established to combat pervasive and costly crimes, including plastic fraud (CIFAS, 2007). This level of cooperation was recently formalised in the UK through Royal Assent to the Serious Crimes Act 2007 for the prevention of fraud through shared information with anti-fraud organisations (Office of PSI, 2007: Part 3, Chapter 1, section 68). Thereby the CRM approach of individual institutions informs industry standards to nati onal policing activities, all working cooperatively in a sophisticated network dedicated to crime management. This cooperative approach by the banking industry to CRM processes has a cascading effect. The shared CRM network enables participants to access a continuous risk assessment feedback mechanism, allowing the entire industry to maintain a collective pool of knowledge easily referenced to assess the potential risks associated with a specific action, either not previously anticipated or as part of a new initiative by an individual institution, creating unprecedented levels of cost-benefit sharing and exemplifying the potential of widespread best-practice implementation (CIFAS, 2007 and FSA, 2008). Regulative bodies such as the Financial Services Authority (FSA), constituted with statutory powers through the Financial Services and Markets Act 2000 (Office of PSI, 2000: Part 1, section 1), provide a form of protection for the industry against both internal and external fraud, by monitoring, evaluating and reporting practices across the sector. The authority is an industry funded, non-gover nmental organisation, empowered to enforce its recommendations (FSA, 2008). Alongside the membership requirement to voluntarily commit to full disclosure regulative authorities such as this further enable the industry to self-regulate, mitigate against threats and further spread the cost of CRM across the sector. The systemic level of commitment exemplified by the banking industry’s approach to CRM of threats such as plastic fraud, and the broader commitment to combating identity related fraud in the United Kingdom, demonstrate the high level of cooperative action required to effectively combat specific crimes and realise the full potential of CRM processes at large. Both Gill, through his three foci for risk management decision-making (1998:15), and Young’s 1992 theory of the ‘square of crime’ (Department of Criminology, 2003:1-15) call for multi-sectoral simultaneous high-level intervention for effective crime prevention outcomes. The combinations of: institutions and their customers, advocating for changes in public and private policy to mitigate specific threats, activated by administrators and legislators alike, must be in alignment with factors such as Gill’s means to ‘change offenders’ (1998:16), where appropriate punishment is meted again st identified perpetrators to increase the risk of offending, in concert with a palpable level of public opprobrium (Department of Criminology, 2003:1-21). Whilst a consideration of the plastic fraud approach has illustrated the high level of cooperation required between all impacted by crime, in order to more effectively prevent losses, a brief reflection of the United Nations system further reveals the evolution of CRM at work. CRM processes are performed in two simultaneous approaches within the UN system. CRM practices are now more closely assimilated into the Security Risk Assessment (SRA) processes of the organisation to more effectively combat risk from both internal and external threats (Australian Capital Territory Insurance Authority, 2004: 4-10). CRM and SRA processes are continually reviewed, evaluated, reassessed and adapted as necessary; especially in light of recent attacks such as those on UN staff members in Iraq and Algeria. Updated recommendations are communicated broadly to mainstream their approach across all activities and in order to achieve the aims of comprehensive security management across their global operati ons. The mission of the UN Security Management System (UNSMS) overall is â€Å"to ‘enable’ the effective and efficient conduct of UN activities while ensuring the security, safety and well being of staff as a high priority† (United Nations, 2002:2, Part II, para 3). To achieve this mandate the UNSM system requires maximum coordination and cooperation at all levels to facilitate workable ‘funds and programmes’ so they are enabled to perform their primary objective of delivering aid as appropriate. The ‘management techniques’ discussed by Gill (1998: 14-15) are increasingly being incorporated to general UN practices; for example in the manner of staff and management recruitment practices which emphasise security as the responsibility of all staff employed under the auspices of the UN (United Nations, 2006:4-2). In order to fully integrate this approach, from the ground up and across country programs, a Security Management Team is allocated to meet regularly at the ‘head of mission’ level. These senior level fora are guided by the senior country representative of the UN Department of Safety and Security (DSS), who are â€Å"responsible for providing leadership, operational support and oversight of the security management system to enable the safest and most efficient conduct of the programmes and activities of the United Nations† (United Nations, 2006:2-1, para 2.5). The UNSMS framework exemplifies Gill’s risk management recommendations whereby the mandate of security managers is to be a stakeholder in program operational objectives, enabling their effective fulfilment, and conversely, the managers and staff of each program are a stakeholder in the security of their own operations (1998:14-15). This cultural shift from the traditional perception of security as ‘working in isolation’ allows for an increased level of protection to permeate the organisation and for all staff to enjoy the successful achievement of operational objectives in a safe and secure environment. Although the UNSM system provides one positive example, the reality is that changing internal traditional operational cultures, to incorporate risk prevention as a perceived responsibility for all managers, remains a significant challenge (Handy, 1993: 209). Closer inspection of the plastic fraud approach to the CRM process also exposes a number other difficulties faced by the security manager when implementing procedures to prevent exposure to risk. The crime risk manager may be criticised for displaying a disposition to crime displacement, which results in a transfer of risk rather than absolute dissolution. â€Å"Crime displacement occurs when security measures are effective in preventing crime†, where they are in place, â€Å"and forces the criminal to go elsewhere†¦to commit their crimes†, where there may be less security infrastructure. Displacement could be represented by a shift in time (temporal), shift in target venue (spatial), tactics, or perpetrator (V ellani, 2006:169). As intimated above, the high level of cross-sectoral cooperation required to truly spotlight and diminish specific crimes is often beyond the means of small-scale security managers to influence. Even in the case of confederated cooperation illustrated by the banking industry to mitigate plastic fraud, the crime still exists. Where the perpetrator commits isolated instances of plastic fraud there may be a low risk of detection, incidents may not be recorded or reported and therefore there is a perceived lack of punishment associated with the offence, which can contribute to the overall seriousness of the problem (Department of Criminology, 2003: 1-21). Indeed the CIFAS prevention service lists the three documents most frequently utilised to commit identity related fraud offences as â€Å"non-UK passports, utility bills and then UK passports† (CIFAS, 2008). As CRM policy shifts its attention toward the greater risk area a gap is left behind for small-scale, undetected perpetrato rs that nonetheless contribute to an area of fraudulent activity that still represents major losses for credit providers. The major challenge in taking the CRM process approach is in designing the system based on ‘real’ threats and with enough flexibility to adapt to a constantly changing environment. CRM processes require constant review, evaluation, reassessment and adaptation, and even then there is no guarantee that risk will always be averted (Gill, 1998: 17). There may be those whose commitment to the process waivers, governments and their policies may change, societal reactions to certain risk may be attenuated, criminals evolve to increasingly sophisticated methods as their use of technology improves and victim organisations may change their directions, reforming appropriately as they go (Department of Criminology, 2003: 1-22). Therefore, implementation of a CRM process requires a scrupulous cost-benefit examination, credible and quality information from which the risk assessment is drawn, and a wholesale commitment by the organisation in order to derive maximum worth (Gill, 1998: 1 6-17). If the approach is too conservative the risk may be that tangible business opportunities are unnecessarily overlooked whilst simultaneously failing to address the risks involved. Finally, the security manager must also control the level of expectation associated with their anticipated levels of success, since it is unlikely for even the most reliable system to remain unscathed. In conclusion, almost every act in business involves an element of risk: customer habits change, new competitors appear, and factors outside the sphere of control could delay a project. However thorough risk analysis and management can help to inform decision making and minimize potential disruptions, especially where there is a sufficient balance between mitigating the risk and the cost associated in doing so. Evolving CRM processes that utilise decentralised risk management techniques in combination with a centralised coordination approach are becoming accepted best practice, with the result that individual firms are able to adapt the framework to best suit their preferences and internal conditions. It would therefore appear that the discipline is ‘coming of age’ which is evidenced through the prevalence of its practice in the mainstream. However the combination of the ever-present elements of change and the unforeseen represent the greatest challenges to the security manager in mitigating risk. The reality is that they can only apply their experience, offer their informed advice to key stakeholders, and manage the outcomes, whatever they may be. References Ahlefeld, H. von. and Gaston, J. (2005) Lessons in Danger, OECD Online Bookshop. Air Force Material Command Pamphlet (1997) ‘Acquisition: Risk Management’, AFMC Pamphlet 63-101, http://www.e-publishing.af.mil/shared/media/epubs/AFMCPAM63-101.pdf, (accessed 1 March 2008). Australian Capital Territory (ACT) Insurance Authority (2004) ‘Guide to Risk Management’, Risk Management Guide Toolkit, ACT Insurance Authority, http://www.treasury.act.gov.au/actia/Guide.doc (Accessed 1 March 2008). Bridgeman, C. (1996) ‘Crime Risk Management: Making it work’, Crime Detection and Prevention Series Paper 70, Police Research Group, London: Home Office. Clarke, R.V. and Cornish, D.B. (1985) ‘Modelling Offenders’ Decisions: A framework for Research and Policy’, Crime and Justice, 6: 147-185. Cohen, L.E. and Felson, M. (1979) ‘Social Change and Crime rate trends’, American Sociological Review, 44: 588-608. Cox, L. A. (2005) Quantitative Health Risk Analysis Methods, Springer. Credit Industry Fraud Avoidance System (CIFAS). (2007) ‘New Fraud Prevention Power Will Save  £Millions’, Press Centre, 30 October 2007, http://www.cifas.org.uk/default.asp?edit_id=786-57, (accessed 1 March 2008). Credit Industry Fraud Avoidance System (CIFAS). (2008) ‘2007 Fraud Trends’, Press Centre, 28 January 2008, http://www.cifas.org.uk/default.asp?edit_id=790-57, (accessed 1 March 2008). Culp, C. L. (2001) The Risk Management Process, John Wiley and Sons. DePersia, A.T. and Pennella, J.J. (1998) Enforcement and Security Technologies, SPIE. Decker, R.J. (2001) ‘Homeland Security: Key Elements of a Risk Management Approach’, Testimony: Before the Subcommittee on National Security, Veteran Affairs and International Relations; House Committee on Government Reform, GAO-02-150T, United States: General Accounting Office. Department of Criminology (2003) ‘Unit 1: Crime Risk Management’, Module 2: Applied Crime Management, Department of Criminology, 1-5 to 1-23. Fennelly, L.J. (2003) Handbook of Loss Prevention and Crime Prevention, Butterworth-Heinemann. Financial Services Authority (FSA). (2008) ‘Who are we’, http://www.fsa.gov.uk/Pages/About/Who/index.shtml, (accessed 1 March 2008). Finch, E. (2002) ‘What a tangled web we weave: identity theft and the Internet’, in Yvonne Jewkes (ed.) Dot.cons: Crime, deviance and identity on the Internet, Willan Publishing, 86-104. Fischer, R. J. and Green, G. (2004) Introduction to Security (7th Edn), Butterworth-Heinemann. Gill, M. (1998) ‘Chapter 1: Introduction’, in Martin Gill (ed.) Crime at Work Volume II: Increasing the Risk to Offenders, Leicester: Perpetuity Press Ltd, 11-23. Grabosky, P.N. and Smith, R.G. (1998) Crime in the Digital Age: Controlling Telecommunications and Cyberspace Illegalities, Transaction Publishers. Grant. I. (2008) ‘Wave of criticism hits government ID card relaunch’ in ComputerWeekly.com, http://www.computerweekly.com/Articles/2008/03/07/229773/wave-of-criticism-hits-government-id-card-relaunch.htm, (accessed 9 March 2008). Handy, C. (1993) Understanding Organizations (4th edn), Harmondsworth: Penguin. Home Office (2006) ‘Identity Fraud puts  £1.7bn Hole in Britains Pocket’, Press Releases, 2 February 2006, http://press.homeoffice.gov.uk/press-releases/identity-fraud-puts-1.7bn-hole?version=1, accessed 1 March 2008). Horan, D.J. (1996) The Retailer’s Guide to Loss Prevention and Security, CRC Press. Hoare, J. (2007) ‘Deceptive Evidence: Challenges in Measuring Fraud’ in J.M. Hough, and M.G. Maxfield (eds) Surveying Crime in the 21st Century, Criminal Justice Press. Kovacich, G. L. and Boni, W. C. (1999) High Technology Crime Investigator’s Handbook, Elsevier. Leonard, R. and Lamb J. (2007) Credit Repair (8th Edn),Nolo. McLaughlin, E. and Muncie, J. (2006) The Sage Dictionary of Criminology, Sage Publications. Montague, D.A. (2004) Fraud Prevention Techniques for Credit Card Fraud, Trafford Publishing. Munro, M., Ford, J., Leishman, C. and Kofi Karley, N. (2005) Lending to higher risk borrowers: Sub-prime credit and sustainable home ownership, Joseph Rowntree Foundation, http://www.jrf.org.uk/bookshop/eBooks/1859353355.pdf, (accessed 1 March 2008). Nalla, M. and Newman, G

Monday, January 20, 2020

Living With Endometriosis Essay -- Diseases, Disorders

Endometriosis is one of the most common gynecological disorders which affect 5.5 million women in the U.S. and 176 million women worldwide. It is a chronic disorder found within the pelvic area of women. This disease is found to affect women of all ethnic and social backgrounds. While it has not yet been determines exactly what causes endometriosis there seems to be certain trends that may contribute to this disease. There also seems to be a link this being a hereditary disease. Symptoms can vary widely from case to case which can sometimes make it hard to diagnose endometriosis in the beginning. Endometriosis has 4 stages or classifications which are minimal, mild, moderate and severe which are used to describe the anatomic location and the severity of the disorder. Symptoms can be as minimal as mild cramping and be as devastating as infertility. There is no known cure for endometriosis but women do have treatment options to relieve the pain and to help with fertility problems tha t may be a result of endometriosis. The only true way to diagnose endometriosis is by performing a pelvic laparoscopy. But ultrasound is a way to pick up on signs of endometriosis. Endometriosis is a chronic, progressive disorder in which tissue resembling the inner lining of the uterus known as endometrium grows and appears at unusual locations in the lower abdominal cavity. It is a condition that occurs when the endometrium, tissue that lines the inside of the uterus, grows outside of the uterus. During your menstrual cycle the endometrium thickens to get ready for the egg. If the egg is fertilized, it will attach to the endometrium and begin to grow. If the egg is not fertilized, the endometrium breaks down and is flushed from your body as blood ... ...unction. St. Louis: Saunders, 2004. Depot, Lupron. Endometriosis Treatment. Abbott Park: Abbott, 2010. Kowalczyk, Nina, and James Mace. Radiographic Pathology for Technologists. St. Louis: Mosby Elsevier, 2009. Kurjak, Asim, and Frank Chervenak. Ultrasound in Obstetrics and Gynecology. Panama City: Jaypee, 2004. Metzger, Deborah, and Howard Reisman, and Stuart Schultz. Managing Endometriosis. San Bruno: StayWell, 2000. Mosbys Dictionary of Medicine, Nursing & Health Professions. St. Louis: Mosby Elsevier, 2009. S, Kennedy . Endometriosis Global Forum for News and Information. 23 Jan. 2011. 11 Feb. 2012. . Storck, Susan. "Endometriosis." PubMed Health. 25 Jul. 2011. . Trivedi, Dr. Ravi K. Personal interview. 11 Feb. 2012.

Saturday, January 11, 2020

The Challenging of Institutions Within the Art World

TERM 1 WEEK 5 The challenging of institutions within the art world â€Å"Artworks are designed to challenge institutions and test the limits of tolerance,† (John A Walker) as they challenge the historical context of traditional institutions, such as conventions, government and religious views, by viewing works. Through the post-modern frame (examining how artists and artworks challenge traditional bounds and rules, and conventions in art including concepts of originality and authenticity), artists in contemporary societies have started to use non-conventional, appropriated techniques to create new meaning within their works- shocking audiences and challenging institutional tolerance, ‘limits of tolerance’ (John A Walker) often being assessed through audiences reaction, censorship and the banning of exhibitions. The Sensation Exhibition is a collection by Charles Saatchi opened in 1997 to attempt to define a generation of artists, shocking the world with their controversial themes and medias. Three works within this exhibition that challenge the institution and tested the boundaries of their tolerance were The Holy Virgin Mary (1996) by Chris Ofili which explores the hypocrisy of Catholicism, The Physical Impossibility of Death in the Mind of Something Living (1991) by Damien Hirst which deals with the cycle of life and death and My Bed (1999) by Tracey Emin which explores the most brutal times in Emin’s life. Each of these works tests the boundaries of tolerance for institutional galleries, religion, society and morality, challenging and confronting the way they are viewed within each institution. The Sensation Exhibition, lead to an up roar by members of society, including aspects of the art world Chris Ofili’s, The Holy Virgin Mary was a leading cause of controversy in the Sensation Exhibition due to the potent mixture of themes such as purity, pornography and excrement. On two lumps of dried, varnished elephant dung, sits Ofili’s work of an African American Madonna, covered in Renaissance styled drapery. The Holy Virgin Mary appropriates and recontextulizes the traditional Virgin Mary, not only by this but, by juxtaposing the pure, innocence of cherubs and substituting not only their physicality on the canvas but also their meaning with photographs of female genitalia. Ofili’s work plays with the idea that women should bear full chastity but also embarrass her sexuality within, highlighting the hypocrisy of Catholicism. The Holy Virgin Mary challenges the Catholic Church as an institution through the recontextulization of the Virgin Mary- a pure and sacred symbol in Catholicism. How individual views each work within each gallery institution is different. â€Å"You don’t have the right to a government subsidy for desecrating someone’s religion. † (Rudolph Giuliani- Mayor of New York) The Holy Virgin Mary provoked the anger of Giuliani, not only outraged because of the pornographic elements of the artwork but also its painting surface and support on elephant dung. For Guliani, this work was interpreted as an insulting and blasphemous attack on the holy status of the Virgin Mary. While Giuliani sees the work as disrespect to religion, Ofili himself sees the piece as a work of beauty, the elephant dung highlighting the natural phenomenon of life, another entity of purity within itself. Through Ofili’s work, religion has become a reoccurring subject of art, not because of any religious beliefs held by the artist himself, but to show the result of change in society, including religions place therein. Society has been conditioned by institutions to behave in a contemplative, reflective manner when viewing museum works. Every individual views a work differently, thus challenging the limits of not only an individual’s tolerance but also an institution as a whole through the general publics expression and reflection on a work. Damien Hirst’s The Physical Impossibility in the Mind of Something Living explores the confronting idea of death in a hypocritical light. Hirst’s use of the physical form of a dead shark, which is known as a symbol of death and fear is very confronting. The public viewing this work may question these stereotypical ideas associated with this animal whilst being able to stare it directly in the face, in all its silence and serenity. The use of formaldehyde to preserve the external remains of the dead shark makes the audience think about the internal happenings of not only the shark but also themselves, as an individual and what happens in your mind when you are physically dead. Damien Hirst’s quest to be edgy is as boring as it is callous. It does not matter whether Hirst killed the animals himself or sat by while thousands of them were massacred for his own unjustifiable amusement. Sharks are a part of nature and should be aloud to live in the wild instead of destroyed for something predictable and unimaginative. † (Same Glover, PETA) The reaction of PETA (People for the Ethical Treatment of Animals) towards Hirst’s was that he was barbaric and cruel, not recognising Hirst’s works as art. Presented in a gallery space, with the subject matter and materials used, suspended within a glass tank is an unconventional art form in itself- also contributing to the tolerance and challenging of the gallery institution and the public as an institution. This reaction, â€Å"In keeping with the piece's title, the shark is simultaneously life and death incarnate in a way you don't quite grasp until you see it, suspended and silent, in its tank. It gives the innately demonic urge to live a demonic, deathlike form. (New York Times 2007) This extract emphasises the effect this piece has on the audience when seen up close and personal in the actual gallery space, thus testing the limits of audience and gallery tolerance and challenging the space it exhibits in. Art within an institution is used to influence the public’s attitude and beliefs or, in some cases, relate to a smaller group who have gone through the similar experiences in life. â€Å"It was as if it was no longer the task to produce masterpieces, but to use the making and showing of art in the service of some more socially urgent endeavour†. Arthur Danto) Tracey Emin’s, My Bed does exactly this. My Bed explores an individual’s issue of identity, sexuality and morality in a brutally honest way through the contemplation of suicide. Emin’s work confronts an audience by letting you into her world to explore the toughest yet greatest times in her life. This subject is much more fragile than Hirst’s and Ofili’s work as it makes the connection between a personal hardship in Emin’s life rather than the fear of death felt in Hirst’s work or the traditional vs. modern exploration created by Ofili. By putting something, so personal such as a bed on display in a gallery setting- the traditional design of the institution as a place for a ‘masterpiece’ has been challenged through the raw and honestly confrontation of Emin’s work. â€Å"Emin brings life in things taken from the real world — into the art gallery and leaves it there, more or less unchanged† (The Telegraph) This statement supports Emin’s connection to individuals who go through depression and contemplation of suicide through the raw, untouched entities of her bedroom, exaggerating the self-absorption and self-pity felt in an isolated room full of negative, undermining houghts. Through placing such an intimate entity in a gallery space and making it her own room, Emin challenges the gallery as an institution by making it a more personalized experience for not only the people who have gone through this hardship, but everyone by placing something so uncanny in a public gallery, bl urring the line between private and public externalisation. â€Å"Artworks are designed to challenge institutions and test the limits of tolerance,† by attempting to define a generation of artists and their diverse and controversial artistic visions. Through different medias, attributing to their post modernistic conventions, The Holy Virgin Mary by Chris Ofili, The Physical Impossibility of Death in the Mind of Something Living by Damien Hirst and My Bed by Tracey Emin all challenge and test the boundaries of tolerance for institutional galleries, religion, society and mortality. Each work explores the recontextulization of gallery spaces through the historical context by redefining an institution as a place that challenges history rather than upholds the traditional design of conventional, ‘classical’ art. Institutions such as PETA, religion, governments and the public, have all been challenged by artworks, thus redefining institutions and being designed to test their limitations. Bibliography: 27/2/13, retrieved from the world wide web, Sensation Saatchi Collection, Records of the Department of Public Information, https://www. brooklynmuseum.

Friday, January 3, 2020

Extra Credit Assignment PBS Documentary about Andrew...

Extra Credit Assignment PBS Documentary about Andrew Jackson This documentary was about the life of Andrew Jackson who was the founder of the Democratic Party and was a Democratic Aristocrat and viewed by some people like Henry Clay as an American Napoleon. The documentary begins with James Parton who was one of Andrew Jackson’s biographers in 1859 and was escorted through the mansion of Andrew Jackson by one of his slaves name Hannah Jackson who had been his slave since the age ten. Parton wrote that during the last 30 years of Andrew Jackson’s life he was the idol of the people, and considered as one of the greatest men that lived because of his experiences he faced at an early age. It was stated in the documentary that Andrew†¦show more content†¦It was the first divorce in history in 1793. Andrew and Rachel were married which would later become a problem for him in his presidency. In 1812 the United States declared war on Great Britain; this was the opportunity that Jackson had been waiting for. He was voted as the commander of the Militia of Tennessee which gave him the chance to fight against Britain the troops were poorly trained but that did not stop Jackson. On March 1814 Jackson and his men defeated the Creek Indians at Horseshoe Bend, it was stated that more Native Americans were killed in the nation’s history, and called the worst disgrace in American History. It was considered a disaster for the United States because the British had moved in on the United States and burned the White House and took over New Orleans. Andrew Jackson who was known as Old Hickory because it was stated that he walked while the wounded road from the frontier of Mississippi. His soldiers gave him that name because they said he was tough as a hickory stick. Andrew Jackson became General of the Army who led the men to victory against the British who lost 100 men in battle and Jackson had only lost 9 men and 13 injured. It was stated that the character of the American people had changed after the war of 1812 they became more proud to be an American citizen. During the Jacksonian Era Andrew Jackson was born in poverty and he laterShow MoreRelatedContemporary Issues in Management Accounting211377 Words   |  846 Pages Contemporary Issues in Management Accounting This page intentionally left blank Contemporary Issues in Management Accounting Edited by ALNOOR BHIMANI 1 Great Clarendon Street, Oxford ox2 6dp Oxford University Press is a department of the University of Oxford. It furthers the University’s objective of excellence in research, scholarship, and education by publishing worldwide in Oxford New York Auckland Cape Town Dar es Salaam Hong Kong Karachi Kuala Lumpur Madrid Melbourne Mexico