Download the Full Version of textbook for Fast Typing at textbookfull.
com
Online Banking Security Measures and Data
Protection Advances in Information Security
Privacy and Ethics 1st Edition Shadi A.
Aljawarneh
https://textbookfull.com/product/online-banking-security-
measures-and-data-protection-advances-in-information-
security-privacy-and-ethics-1st-edition-shadi-a-aljawarneh/
OR CLICK BUTTON
DOWNLOAD NOW
Download More textbook Instantly Today - Get Yours Now at textbookfull.com
Recommended digital products (PDF, EPUB, MOBI) that
you can download immediately if you are interested.
Security Privacy and Forensics Issues in Big Data Advances
in Information Security Privacy and Ethics 1st Edition
Ramesh C. Joshi
https://textbookfull.com/product/security-privacy-and-forensics-
issues-in-big-data-advances-in-information-security-privacy-and-
ethics-1st-edition-ramesh-c-joshi/
textboxfull.com
Beyond the Algorithm AI Security Privacy and Ethics 1st
Edition Santos
https://textbookfull.com/product/beyond-the-algorithm-ai-security-
privacy-and-ethics-1st-edition-santos/
textboxfull.com
Aviation Security Privacy Data Protection and Other Human
Rights Technologies and Legal Principles 1st Edition Olga
Mironenko Enerstvedt (Auth.)
https://textbookfull.com/product/aviation-security-privacy-data-
protection-and-other-human-rights-technologies-and-legal-
principles-1st-edition-olga-mironenko-enerstvedt-auth/
textboxfull.com
Data Security and Privacy in Massachusetts 2nd Edition
Stephen Y. Chow (Editor)
https://textbookfull.com/product/data-security-and-privacy-in-
massachusetts-2nd-edition-stephen-y-chow-editor/
textboxfull.com
Data Protection on the Move Current Developments in ICT
and Privacy Data Protection 1st Edition Serge Gutwirth
https://textbookfull.com/product/data-protection-on-the-move-current-
developments-in-ict-and-privacy-data-protection-1st-edition-serge-
gutwirth/
textboxfull.com
Security And Privacy Joseph Savirimuthu
https://textbookfull.com/product/security-and-privacy-joseph-
savirimuthu/
textboxfull.com
Privacy and Data Protection Seals Rowena Rodrigues
https://textbookfull.com/product/privacy-and-data-protection-seals-
rowena-rodrigues/
textboxfull.com
Data Protection and Privacy In visibilities and
Infrastructures 1st Edition Ronald Leenes
https://textbookfull.com/product/data-protection-and-privacy-in-
visibilities-and-infrastructures-1st-edition-ronald-leenes/
textboxfull.com
Mobile Security and Privacy Advances Challenges and Future
Research Directions 1st Edition Man Ho Au
https://textbookfull.com/product/mobile-security-and-privacy-advances-
challenges-and-future-research-directions-1st-edition-man-ho-au/
textboxfull.com
Online Banking Security
Measures and Data
Protection
Shadi A. Aljawarneh
Jordan University of Science and Technology, Jordan
A volume in the Advances in
Information Security, Privacy,
and Ethics (AISPE) Book Series
Published in the United States of America by
IGI Global
Information Science Reference (an imprint of IGI Global)
701 E. Chocolate Avenue
Hershey PA 17033
Tel: 717-533-8845
Fax: 717-533-8661
E-mail:
[email protected] Web site: http://www.igi-global.com
Copyright © 2017 by IGI Global. All rights reserved. No part of this publication may be
reproduced, stored or distributed in any form or by any means, electronic or mechanical, including
photocopying, without written permission from the publisher.
Product or company names used in this set are for identification purposes only. Inclusion of the
names of the products or companies does not indicate a claim of ownership by IGI Global of the
trademark or registered trademark.
Library of Congress Cataloging-in-Publication Data
Names: Aljawarneh, Shadi, editor.
Title: Online banking security measures and data protection / Shadi A.
Aljawarneh, editor.
Description: Hershey, PA : Information Science Reference, 2017. | Includes
bibliographical references and index.
Identifiers: LCCN 2016028381| ISBN 9781522508649 (hardcover) | ISBN
9781522508656 (ebook)
Subjects: LCSH: Internet banking--Security measures. | Electronic funds
transfers--Security measures. | Data protection. | Computer
networks--Security measures. | Computer security.
Classification: LCC HG1708.7 .O55 2017 | DDC 332.1/7028558--dc23 LC record available at
https://lccn.loc.gov/2016028381
This book is published in the IGI Global book series Advances in Information Security, Privacy,
and Ethics (AISPE) (ISSN: 1948-9730; eISSN: 1948-9749)
British Cataloguing in Publication Data
A Cataloguing in Publication record for this book is available from the British Library.
All work contributed to this book is new, previously-unpublished material. The views expressed in
this book are those of the authors, but not necessarily of the publisher.
Advances in
Information
Security, Privacy,
and Ethics (AISPE)
Book Series
ISSN: 1948-9730
EISSN: 1948-9749
Mission
As digital technologies become more pervasive in everyday life and the Internet is
utilized in ever increasing ways by both private and public entities, concern over
digital threats becomes more prevalent.
The Advances in Information Security, Privacy, & Ethics (AISPE) Book Se-
ries provides cutting-edge research on the protection and misuse of information and
technology across various industries and settings. Comprised of scholarly research
on topics such as identity management, cryptography, system security, authentica-
tion, and data protection, this book series is ideal for reference by IT professionals,
academicians, and upper-level students.
Coverage
IGI Global is currently accepting
• Network Security Services manuscripts for publication within this
• Cookies series. To submit a proposal for a volume in
• Tracking Cookies this series, please contact our Acquisition
• Security Classifications Editors at [email protected] or
• Electronic Mail Security visit: http://www.igi-global.com/publish/.
• Internet Governance
• Computer ethics
• Access Control
• Global Privacy Concerns
• Information Security Standards
The Advances in Information Security, Privacy, and Ethics (AISPE) Book Series (ISSN 1948-9730) is
published by IGI Global, 701 E. Chocolate Avenue, Hershey, PA 17033-1240, USA, www.igi-global.com. This
series is composed of titles available for purchase individually; each title is edited to be contextually exclusive
from any other title within the series. For pricing and ordering information please visit http://www.igi-global.
com/book-series/advances-information-security-privacy-ethics/37157. Postmaster: Send all address changes to
above address. Copyright © 2017 IGI Global. All rights, including translation in other languages reserved by the
publisher. No part of this series may be reproduced or used in any form or by any means – graphics, electronic,
or mechanical, including photocopying, recording, taping, or information and retrieval systems – without written
permission from the publisher, except for non commercial, educational use, including classroom teaching purposes.
The views expressed in this series are those of the authors, but not necessarily of IGI Global.
Titles in this Series
For a list of additional titles in this series, please visit: www.igi-global.com
Developing Next-Generation Countermeasures for Homeland Security Threat Prevention
Maurice Dawson (University of Missouri-St. Louis, USA) Dakshina Ranjan Kisku (National
Institute of Technology, India) Phalguni Gupta (National Institute of Technical Teachers’
Training & Research, India) Jamuna Kanta Sing (Jadavpur University, India) and Weifeng
Li (Tsinghua University, China)
Information Science Reference • copyright 2017 • 428pp • H/C (ISBN: 9781522507031)
• US $210.00 (our price)
Security Solutions for Hyperconnectivity and the Internet of Things
Maurice Dawson (University of Missouri-St. Louis, USA) Mohamed Eltayeb (Colorado
Technical University, USA) and Marwan Omar (Saint Leo University, USA)
Information Science Reference • copyright 2017 • 347pp • H/C (ISBN: 9781522507413)
• US $215.00 (our price)
Managing Security Issues and the Hidden Dangers of Wearable Technologies
Andrew Marrington (Zayed University, UAE) Don Kerr (University of the Sunshine Coast,
Australia) and John Gammack (Zayed University, UAE)
Information Science Reference • copyright 2017 • 345pp • H/C (ISBN: 9781522510161)
• US $200.00 (our price)
Security Management in Mobile Cloud Computing
Kashif Munir (University of Hafr Al-Batin, Saudi Arabia)
Information Science Reference • copyright 2017 • 248pp • H/C (ISBN: 9781522506027)
• US $150.00 (our price)
Cryptographic Solutions for Secure Online Banking and Commerce
Kannan Balasubramanian (Mepco Schlenk Engineering College, India) K. Mala (Mepco
Schlenk Engineering College, India) and M. Rajakani (Mepco Schlenk Engineering Col-
lege, India)
Information Science Reference • copyright 2016 • 375pp • H/C (ISBN: 9781522502739)
• US $200.00 (our price)
Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber
Security
Brij Gupta (National Institute of Technology Kurukshetra, India) Dharma P. Agrawal (Uni-
versity of Cincinnati, USA) and Shingo Yamaguchi (Yamaguchi University, Japan)
Information Science Reference • copyright 2016 • 589pp • H/C (ISBN: 9781522501053)
• US $305.00 (our price)
701 E. Chocolate Ave., Hershey, PA 17033
Order online at www.igi-global.com or call 717-533-8845 x100
To place a standing order for titles released in this series,
contact:
[email protected] Mon-Fri 8:00 am - 5:00 pm (est) or fax 24 hours a day 717-533-8661
Associate Editors
Rajkumar Buyya, University of Melbourne, Australia
Anna Goy, Universita’ di Torino, Italy
Ryan K. L. Ko, HP Labs Singapore, Singapore
Maik A. Lindner, SAP Research, UK
Shiyong Lu, Wayne State University, USA
Yuzhong Sun, Chinese Academy of Science, China
Ray Walshe, Irish Centre for Cloud Computing and Commerce, Ireland
International Editorial Review Board
Sanjay P. Ahuja, University of North Florida, USA
Junaid Arshad, University of Leeds, UK
Juan Caceres, Telefónica Investigación y Desarrollo, Spain
Jeffrey Chang, London South Bank University, UK
Kamal Dahbur, NYIT, Jordan
Ravindra Dastikop, SDMCET, India
Sam Goundar, Victoria University of Wellington, New Zealand & KYS International
College, Melaka - Malaysia
Sofyan Hayajneh, Isra University, Jordan
Sayed Amir Hoseini, Iran Telecommunication Research Center, Iran
Gregory Katsaros, National Technical University of Athens, Greece
Mariam Kiran, University of Sheffield, UK
Anirban Kundu, Kuang-Chi Institute of Advanced Technology, China
Sarat Maharana, MVJ College of Engineering, Bangalore, India
Manisha Malhorta, Maharishi Markandeshwar University, India
Saurabh Mukherjee, Banasthali University, India
Giovanna Petrone, Università degli Studi di Torino, Italy
Nikolaos P. Preve, National Technical University of Athens, Greece
Vanessa Ratten, Deakin University, Australia
Jin Shao, Peking University, China
Bassam Shargab, Isra University, Jordan
Luis Miguel Vaquero Gonzalez, HP, Spain
Chao Wang, Oak Ridge National Laboratory, USA
Jiaan Zeng, Indiana University Bloomington, USA
Yongqiang Zou, Tencent Corporation, China
Table of Contents
Preface. .............................................................................................................xviii
; ;
Acknowledgment.............................................................................................xxvii
; ;
Chapter 1 ;
Online Banking and Finance. ................................................................................. 1
; ;
Marta Vidal, Complutense University of Madrid, Spain
; ;
Javier Vidal-García, University of Valladolid, Spain ; ;
Chapter 2 ;
Internet Banking Usage Level of Bankers: A Research on Sampling of .
Turkey................................................................................................................... 27
; ;
Ahu Coşkun Özer, Marmara University, Turkey ; ;
Hayrünisa Gürel, Marmara University, Turkey ; ;
Chapter 3 ;
Internet Banking and Financial Customer Preferences in Turkey........................ 40 ; ;
İsmail Yıldırım, Hitit University, Turkey
; ;
Chapter 4 ;
Expectation and Perception of Internet Banking Service Quality of Select
Indian Private and Public Sector Banks: A Comparative Case Study.................. 58 ; ;
Nilanjan Ray, Netaji Mahavidyalaya, India
; ;
Chapter 5 ;
Towards Fully De-Materialized Check Management........................................... 69
; ;
Fulvio Frati, Università degli Studi di Milano, Italy
; ;
Ernesto Damiani, Information Security Research Center, Khalifa
;
University, UAE ;
Claudio Santacesaria, Research & Development Department, Rototype;
S.p.A., Italy ;
Chapter 6 ;
Emerging Challenges, Security Issues, and Technologies in Online Banking
Systems................................................................................................................. 90
; ;
Shadi A Aljawarneh, Jordan University of Science and Technology,
;
Jordan ;
Chapter 7 ;
The Influences of Privacy, Security, and Legal Concerns on Online Banking
Adoption: A Conceptual Framework.................................................................. 113
; ;
Khalid Alkhatib, Jordan University of Science and Technology, Jordan
; ;
Ahmad Alaiad, Jordan University of Science and Technology, Jordan
; ;
Chapter 8 ;
Analysis of Data Validation Techniques for Online Banking Services.............. 127 ; ;
Shadi A Aljawarneh, Jordan University of Science and Technology,
;
Jordan ;
Chapter 9 ;
Anytime Anywhere Any-Amount Anybody to Anybody Real-Time Payment
(5A-RTP): With High Level Banking Security.................................................. 140
; ;
Ranjit Biswas, Jamia Hamdard University, India
; ;
Chapter 10 ;
An Algorithm for Securing Hybrid Cloud Outsourced Data in the Banking
Sector.................................................................................................................. 157
; ;
Abdullah Alhaj, The University of Jordan, Jordan
; ;
Shadi A Aljawarneh, Jordan University of Science and Technology,
;
Jordan ;
Chapter 11 ;
Prevention, Detection, and Recovery of CSRF Attack in Online Banking
System. ............................................................................................................... 172
; ;
Nitin Nagar, DAVV, India ; ;
Ugrasen Suman, SCSIT, India ; ;
Chapter 12 ;
Ransomware: A Rising Threat of new age Digital Extortion............................. 189 ; ;
Akashdeep Bhardwaj, UPES Dehradun, India ; ;
Chapter 13 ;
Insider Threat in Banking Systems..................................................................... 222
; ;
Qussai Yaseen, Jordan University of Science and Technology, Jordan
; ;
Chapter 14 ;
Achieving Security to Overcome Attacks and Vulnerabilities in Mobile
Banking Security................................................................................................ 237
; ;
Balamurugan Balusamy, VIT University, India ; ;
Malathi Velu, VIT University, India
; ;
Saranya Nandagopal, VIT University, India ; ;
Shirley Jothi Mano, VIT University, India ; ;
Chapter 15 ;
Credit Card Fraud: Behind the Scenes. .............................................................. 263
; ;
Dan DeFilippi, Independent Researcher, USA
; ;
Katina Michael, University of Wollongong, Australia
; ;
Compilation of References............................................................................... 283
; ;
About the Contributors.................................................................................... 303
; ;
Index. ................................................................................................................. 309
; ;
Detailed Table of Contents
Preface. .............................................................................................................xviii
; ;
Acknowledgment.............................................................................................xxvii
; ;
Chapter 1 ;
Online Banking and Finance. ................................................................................. 1
; ;
Marta Vidal, Complutense University of Madrid, Spain
; ;
Javier Vidal-García, University of Valladolid, Spain
; ;
In recent years, online banking has become an alternative channel for most traditional
entities. The increase in the number of users and rapid expansion has resulted in a
successful strategy among financial institutions. This chapter discusses the use of
technology in the finance industry and the various factors associated with it, as well
as introducing the reader to the basic characteristics of online financial services.
We review the current literature identifying the relevant research questions for our
purpose. ;
Chapter 2 ;
Internet Banking Usage Level of Bankers: A Research on Sampling of .
Turkey................................................................................................................... 27
; ;
Ahu Coşkun Özer, Marmara University, Turkey
; ;
Hayrünisa Gürel, Marmara University, Turkey
; ;
Banks provide service not only through branches in the countries but also offers
banking services to customers over the internet. However, customers concern using
internet banking because of the various troubles and adversities that may occur on
the web and because of their habits. The using of internet banking is still not reached
the desired level due to various reasons such as security, troubles on web and habits
of customers. In this research, bankers using rate of internet banking and bankers
approach on internet banking are determined. According to the survey results in
Turkey, almost all of the bankers use internet banking but using of mobile applications
does not appear to fully spread. Even though the using of internet banking is very
common among the bankers, some of the participants said that they encountered
some problems while using internet banking. Solutions of systemic deficiencies,
password security problems and other security problems will increase the using of
internet banking. ;
Chapter 3 ;
Internet Banking and Financial Customer Preferences in Turkey........................ 40
; ;
İsmail Yıldırım, Hitit University, Turkey
; ;
The first online banking service was introduced in Turkey by İş Bank in 1998. However,
the number of internet users has been increasing rapidly in Turkey, the number of
online banking users did not increase with a similar pace. Although banks are taking
measures for the security of online banking transactions, many financial consumers
are still concerned about the security of these transactions therefore preferring not
to use online banking. This study reveals the development of internet banking in
Turkey and consumer percentages. Previous research on the factors affecting the
usage of e-banking are also addressed in this study. It was found that the majority
of these studies focus on the correlation between the security concerns which result
in avoiding to use internet banking. ;
Chapter 4 ;
Expectation and Perception of Internet Banking Service Quality of Select
Indian Private and Public Sector Banks: A Comparative Case Study.................. 58
; ;
Nilanjan Ray, Netaji Mahavidyalaya, India
; ;
This research paper mainly deals with expectation and perception of service quality
of select Indian Banks i.e. SBI and HDFC on the customer satisfaction. The research
survey was based on IS-QUAL dimensions (Ray & Ghosh,2014) a diagnostic model
developed in 2014, which measures service quality and internet service quality in
terms of customer expectations and perceptions of banking services. This present
research tends to evaluate the overall idea of expected and perceived services of
the two banks. This study is a cross-sectional survey that employed the use of pre-
structured questionnaire to collect primary data from a sample of 120 respondents
through personal contact, field survey and email. Collected data have been analyzed
through SPSS 21 software by different statistical tools like Reliability test for judgment
of internal consistency of collected data and paired t- test. ;
Chapter 5 ;
Towards Fully De-Materialized Check Management........................................... 69
; ;
Fulvio Frati, Università degli Studi di Milano, Italy
; ;
Ernesto Damiani, Information Security Research Center, Khalifa
;
University, UAE ;
Claudio Santacesaria, Research & Development Department, Rototype
;
S.p.A., Italy ;
Banks worldwide are putting a big effort into de-materializing their processes, in
order to streamline the processes and thus reducing overall costs. In this chapter,
the authors describe how the de-materialization can be a big opportunity for banks,
describing the European context. Furthermore, the de-materialization of check
handling is taken as example, proposing a review of existing technologies and
describing the advantages that a real framework can give to the users and to the
bank systems. ;
Chapter 6 ;
Emerging Challenges, Security Issues, and Technologies in Online Banking
Systems................................................................................................................. 90
; ;
Shadi A Aljawarneh, Jordan University of Science and Technology,
;
Jordan ;
Online banking security is a critical issue over request-response model. But the
traditional protection mechanisms are not sufficient to secure the online banking
systems that hold information about clients, and banks. The infrastructure of networks,
routers, domain name servers, and switches that glue these online banking systems
together could be fail, and as a result, online banking systems will no longer be able
to communicate accurately or reliably. A number of critical questions arise, such
as what exactly the infrastructure is, what threats it must be secured against, and
how protection can be provided on a cost-effective basis. But underlying all these
questions is how to define secure online banking systems. In this chapter, emerging
challenges, security issues and technologies in Online Banking Systems will be
analyzed and discussed systematically. ;
Chapter 7 ;
The Influences of Privacy, Security, and Legal Concerns on Online Banking
Adoption: A Conceptual Framework.................................................................. 113
; ;
Khalid Alkhatib, Jordan University of Science and Technology, Jordan
; ;
Ahmad Alaiad, Jordan University of Science and Technology, Jordan
; ;
Business globalization and the rising new technology enforced traditional banking to
head towards online banking services, which facilitates customers to obtain access
to their accounts from their business sites and personal computers to online banking
services. The objective of this chapter is to construct a framework of adoption of
online banking and represent the major influences of privacy, security, and legal
concerns on online banking adoption. Furthermore, the chapter reveals the main
challenges in the development of online banking system. The adoption of online
banking can decrease the operating expenses and offer good and rapid services
to their customers. The framework factors have been classified as facilitators and
barriers of adoption of online banking. Performance expectancy, effort expectancy
and social influence have been classified as facilitators whereas security concerns,
privacy concerns and legal concerns have been classified as barriers. The results
revealed various significant suggestions for online banking service providers,
designers and developers. ;
Chapter 8 ;
Analysis of Data Validation Techniques for Online Banking Services.............. 127
; ;
Shadi A Aljawarneh, Jordan University of Science and Technology,
;
Jordan ;
The insufficient preparation for the information and communication technologies
revolution led to few offering online transaction platforms, information security
features, and credit facilities. One of the security concerns is a lack of data validation.
Data that is not validated or not properly validated is the main issue for serious security
vulnerabilities affecting online banking applications. In this chapter, the influences
of security issues on world banks will be discussed. A number of data validation
methods will be also reviewed to date to provide a systematic summary to banking
environment. Based on the advantages and disadvantages of each method, the IT
developer will decide which is best suited to develop the systematic online banking
application. From this analysis, a global view of the current and future tendencies of
data validation will be obtained and therefore provision of possible recommendations
for solving the security and privacy issues for the online banking services. ;
Chapter 9 ;
Anytime Anywhere Any-Amount Anybody to Anybody Real-Time Payment
(5A-RTP): With High Level Banking Security.................................................. 140
; ;
Ranjit Biswas, Jamia Hamdard University, India
; ;
This chapter introduces about a Proposal to any bank of any country for fast but
secured transfer of money anytime anywhere any-amount by anybody to anybody
on the spot with confirmation from the payee on the spot. The work here is on a new
method of real time payment system, which is highly secured and fast, and 100%
technology-based without any paper format or paper work of the bank. This breaking
scheme is entitled as “5A-RTP scheme” where ‘5A’ stands for Anytime Anywhere
Any-amount Anybody to Anybody and ‘RTP’ stands for Real-Time Payment. There is
no paper-work at all. It is completely secured, realization of payment (debit + credit)
happens immediately very fast, without any man-hour or manpower of the bank. It
is claimed that 5A-RTP scheme, if incorporated in all the banks in any country, will
give the country a huge momentum of customers’ satisfaction, huge momentum in
country’s growth and economic progress. The revolutionary breakthrough in 5A-RTP
scheme is that it dominates each of the existing banking instruments and facilities
like Cheque, Pay-order, Draft, ATM machine, Credit Card, Debit Card, Internet
Banking, Mobile Banking, Traveller’s Cheque, etc. The 5A-RTP scheme may even
slowly cause a natural death of the existing Cheque and Draft facilities from the
country because of its huge application potential, in particular in vast countries like
China, India, Brazil, USA, UK, etc. ;
Chapter 10 ;
An Algorithm for Securing Hybrid Cloud Outsourced Data in the Banking
Sector.................................................................................................................. 157
; ;
Abdullah Alhaj, The University of Jordan, Jordan
; ;
Shadi A Aljawarneh, Jordan University of Science and Technology,
;
Jordan ;
The Cloud has become a significant topic in the banking computing; however,
the trend has established a new range of security issues that need to be addressed.
In Cloud, the banking data and associated software are not under their control.
In addition, with the growing demands for Cloud networks communication, it
becomes increasingly important to secure the data flow path. The existing research
related to security mechanisms only focuses on securing the flow of information
in the communication banking networks. There is a lack of work on improving the
performance of networks to meet quality of service (QoS) constrains for various
services. The security mechanisms work by encryption and decryption of the
information, but do not consider the optimised use of the network resources. In
this chapter the authors propose a Secure Data Transmission Mechanism (SDTM)
with Preemption Algorithm that combines between security and quality of service
for the banking sector. Their developed SDTM enhanced with Malicious Packets
Detection System (MPDS) which is a set of technologies and solutions. ;
Chapter 11 ;
Prevention, Detection, and Recovery of CSRF Attack in Online Banking
System. ............................................................................................................... 172
; ;
Nitin Nagar, DAVV, India
; ;
Ugrasen Suman, SCSIT, India ; ;
Online banking system has created an enormous impact on IT, Individuals, and
networking worlds. Online banking systems and its exclusive architecture have
numerous features and advantages over traditional banking system. However, these
new uniqueness create new vulnerabilities and attacks on an online banking system.
Cross-site scripting request forgery or XSS attack is among the top vulnerabilities,
according to recent studies. This exposure occurs, when a user uses the input from
an online banking application without properly looking into them which allows an
attacker to execute malicious scripts into the application. Current approaches use
to mitigate this problem, especially on effective detection of XSS vulnerabilities
in the application or prevention of real-time XSS attacks. To address this problem,
the survey of different vulnerability attacks on online banking system performed
and also presents a concept for the prevention, detection, removal and recovery of
XSS vulnerabilities to secure the banking application. ;
Chapter 12 ;
Ransomware: A Rising Threat of new age Digital Extortion............................. 189
; ;
Akashdeep Bhardwaj, UPES Dehradun, India
; ;
Compared to the last five to six years, the massive scale by which innocent users
are being subjected to a new age threat in form of digital extortion has never been
seen before. With the rise of Internet, use of personal computers and devices has
mushroomed to immense scale, with cyber criminals subjecting innocent users to
extortion using malware. The primary victim to be hit the most has been online
banking, impacting the security and reputation of banking and financial transactions
along with social interactions. Online security revolves around three critical aspects
– starting with the use of digital data and files, next with the use of computer systems
and finally the internet as an unsecure medium. This is where Ransomware has
become one of the most malicious form of malware for digital extortion threats to
home and corporate user alike. ;
Chapter 13 ;
Insider Threat in Banking Systems..................................................................... 222
; ;
Qussai Yaseen, Jordan University of Science and Technology, Jordan
; ;
Insider threat poses huge loss to organizations since malicious insiders have enough
knowledge to attack high sensitive information. Moreover, preventing and detecting
insider attacks is a hard job because malicious insiders follow legal paths to launch
attacks. This threat leads all kinds of attacks in banking systems in the amount of
loss it causes. Insider threat in banking systems poses huge harm to banks due to
the importance and attractiveness of assets that banks have. This chapter discusses
insider threat problem in banking sector, and introduces important surveys and case
studies that show the severeness of this threat in this sector. Moreover, the chapter
demonstrates some policies, technologies and tools that may prevent and detect
insider threat in banking systems. ;
Chapter 14 ;
Achieving Security to Overcome Attacks and Vulnerabilities in Mobile
Banking Security................................................................................................ 237
; ;
Balamurugan Balusamy, VIT University, India ; ;
Malathi Velu, VIT University, India
; ;
Saranya Nandagopal, VIT University, India
; ;
Shirley Jothi Mano, VIT University, India
; ;
Mobile Banking is a means of connectivity between bank and its customers. It
would be impractical to expect customers to regularly visit banks or connect to a
web site for regular upgrade of their mobile banking application. Mobile Banking is
a provision and availability of both banking and financial services with the help of
mobile telecommunication devices as an Application. It would be expected that the
mobile application itself check the upgrades and updates and download necessary
patches. Mobile banking has brought the advantage to have an alternate to debit and
credit card usage. Mobile banking has the below three inter-related concepts: Mobile
accounting, Mobile brokerage, Mobile financial information services. Mobile banking
services are Account information provision, Monetary Transaction, Investment
facilitation, Support and Content services. The threats involved in Mobile Banking
are categorized as, Threats against end user and end user device, Threats against
communication network, Threats against remote banking service. The impact of
various threats is discussed below. ;
Chapter 15 ;
Credit Card Fraud: Behind the Scenes. .............................................................. 263
; ;
Dan DeFilippi, Independent Researcher, USA
; ;
Katina Michael, University of Wollongong, Australia
; ;
This chapter provides a single person case study of Mr. Dan DeFilippi who was arrested
for credit card fraud by the US Secret Service in December 2004. The chapter delves
into the psychology of a cybercriminal and the inner workings of credit card fraud. A
background context of credit card fraud is presented to frame the primary interview.
A section on the identification of issues and controversies with respect to carding
is then given. Finally, recommendations are made by the convicted cybercriminal
turned key informant on how to decrease the rising incidence of cybercrime. A
major finding is that credit card fraud is all too easy to enact and merchants need to
conduct better staff training to catch fraudsters early. With increases in global online
purchasing, international carding networks are proliferating, making it difficult for
law enforcement agencies to be “policing” unauthorized transactions. Big data may
well have a role to play in analyzing behaviors that expose cybercrime. ;
Compilation of References............................................................................... 283
; ;
About the Contributors.................................................................................... 303
; ;
Index. ................................................................................................................. 309
; ;
xviii
Preface
Do not worry about your difficulties in Mathematics. I can assure you mine are still
greater. – Albert Einstein
The corresponding book publication summarizes the recent research papers on
online banking security techniques, approaches and technologies and Case studies
entitled, “Online Banking Security Measures and Data Protection.” This compre-
hensive and timely publication aims to be an essential reference source, building on
the available literature in the field of e-banking security while providing for further
research opportunities in this dynamic field. It is hoped that this text will provide
the resources necessary for policy makers, technology developers and managers
to adopt and implement security techniques and technologies in developing banks
across the globe.
This book summarizes some current trends in the online banking security such
as online banking security services, data protection techniques, applications and
technologies, and explores one key area of growth: Online Banking. To illustrate
the role of Applications and Services in the growth of online banking industries, a
number of examples focusing on the learning, government, industry and security
are used. Recommendations for future areas are presented.
This book is intended for researchers and practitioners who are interested in is-
sues that arise from using technologies of online banking security advancements.
In addition, this book is also targeted to anyone who wants to learn more about the
online banking security measures and data protection research advancements in
design and applications. For example, policy makers, academicians, researchers,
advanced-level students, technology developers, bank officers and government
officials will find this text useful in furthering their research exposure to pertinent
topics in e-banking security and assisting in furthering their own research efforts
in this field. Online banking security has become a hot topic in recent years and
people at different levels in any organization need to understand online banking in
different ways and different perspectives.
xix
BOOK DESCRIPTION, MISSION, AND OBJECTIVES
Although the e-banking field has been found Information Systems literature since the
mid-1990s, there is still a lack of advanced research into banking security adoption
and associated organizational issues. In addition, there is a shortage in case studies
surveying the real experience of firms and organizations in deploying e-banking
security. As e-banking is an IT product for development and evolution, this sort of
gap in the advanced research makes some sensitive issues and challenges for bank-
ing sector, particularly these that currently develop e-banking security because the
weaknesses and actual limitations in subject to this field normally mean difficulties
in planning and developing e-banking security measures and controls.
The use of the Internet as a main distribution channel raises the necessity of se-
curing e-banking since it becomes a vital issue to the environment and could make
organizations more vulnerable to system attacks and threats. Although there are
several techniques and methods to security as a whole whose value is evident – there
is an expectation that security can be more efficiently managed if the concentration
goes beyond technical-oriented solutions.
E-banking can not only offer various benefits to customers in terms of ease and
cost of transactions, but it also poses new challenges for banks in supervising their
financial systems and in designing and implementing necessary security measures
and controls. Therefore, understanding security communication in e-banking issues
is important for senior management because it would assist them enhance their
approach to e-banking security. This edited book addresses this issue by reporting
exploratory case studies about developing and implementing security in e-banking.
Particularly, this edited book of advanced research aims to explore how e-banking
security measures and controls takes place within the bank, what are the standards
and procedures that play an important role to the success of e-banking security and
what key lessons come out of their experience which could be generalized.
This book also looks to discuss and address the difficulties and challenges that
banks have faced in implementing security techniques, technologies and applications.
The editor will seek chapters that address different aspects of e-banking adoption,
ranging from Phishing of Banking Information, Pharming of Banking Websites,
Adaptive Authentication in Banking, “Watering Hole” Attacks, Malware-Based
Attacks, Zeus Trojan, Mobile Banking Security, Identity Theft, and Related Topics.
This book focuses on advanced research in the practical applications and the
theoretical foundations of online banking security, through presentation of the
most up-to-date advances and new directions of research in the field from various
scholarly, professional, and practitioner perspectives. An interdisciplinary look at
online banking, including engineering and business aspects, such book covers and
xx
encourages high-quality research exposition on such topics as virtualization tech-
nologies for online banking, online banking security utilities, real case studies on
online banking security vulnerabilities as well as data protection techniques, and
business perspectives for online banking security.
The main mission of this book is to be the premier and authoritative source for
the most innovative scholarly and professional research and information pertain-
ing to aspects of online banking security measures and data protection. Such book
presents advancements in the state-of-the-art, standards, and practices of online
banking security, in an effort to identify emerging trends that will ultimately define
the future of “the Cloud of Online Banking” and “the Gog of Online Banking”.
The main topics are discussed through original papers, review papers, technical
reports, case studies, and conference reports for reference use by academics and
practitioners alike.
This book is intended to reflect new directions of research and report latest
advances. It is a platform for rapid dissemination of high quality research / applica-
tion / work-in-progress articles on Online Banking Security solutions for managing
challenges and problems within the highlighted scope.
The objectives of this book are multi-folds, including:
1. Establish a significant channel of communication among Online Banking
Security researchers, engineers, practitioners and IT policy makers;
2. Provide a space to publish and share the latest high quality research results in
the area of Online Banking Security;
3. Promote and coordinate international collaboration in the standards of Cloud
and Fog Computing of Online Banking to meet the need to broaden the ap-
plicability and scope of the current and future research of Online Banking
Security.
Topics to be discussed in this book include the following:
• Techniques, technologies, and services
• Applications
• Architecture
• Standards
• Management
• Cloud and Fog engineering
• Business
• Security Vulnerabilities and threats
xxi
WHAT THIS BOOK COVERS
In this book, we will present the current state of online banking security research
advancements on design, and applications. So that we will summarize each advanced
research, its influence in the science of online banking security measures and data
protections as follows:
Chapter 1: Online Banking and Finance
In recent years, online banking has become an alternative channel for most traditional
entities. The increase in the number of users and rapid expansion has resulted in a
successful strategy among financial institutions. This chapter discusses the use of
technology in the finance industry and the various factors associated with it, as well
as introducing the reader to the basic characteristics of online financial services.
We review the current literature identifying the relevant research questions for our
purpose.
Chapter 2: Internet Banking Usage Level of
Bankers: A Research on Sampling of Turkey
Banks provide service not only through branches in the countries but also offer
banking services to customers over the internet. However, customers concern us-
ing internet banking because of the various troubles and adversities that may occur
on the web and because of their habits. The using of internet banking is still not
reached the desired level due to various reasons such as security, troubles on web
and habits of customers. In this research, bankers using rate of internet banking
and bankers approach on internet banking are determined. According to the survey
results in Turkey, almost all of the bankers use internet banking but using of mo-
bile applications does not appear to fully spread. Even though the using of internet
banking is very common among the bankers, some of the participants said that they
encountered some problems while using internet banking. Solutions of systemic
deficiencies, password security problems and other security problems will increase
the using of internet banking.
Chapter 3: Internet Banking and Financial
Customer Preferences in Turkey
The first online banking service was introduced in Turkey by İş Bank in 1998.
However, the number of internet users has been increasing rapidly in Turkey, the
number of online banking users did not increase with a similar pace. Although banks
xxii
are taking measures for the security of online banking transactions, many financial
consumers are still concerned about the security of these transactions therefore
preferring not to use online banking. This study reveals the development of inter-
net banking in Turkey and consumer percentages. Previous research on the factors
affecting the usage of e-banking are also addressed in this study. It was found that
the majority of these studies focus on the correlation between the security concerns
which result in avoiding using internet banking.
Chapter 4: Expectation and Perception of Internet
Banking Service Quality of Select Indian Private and
Public Sector Banks: Comparative Case Study
This research paper mainly deals with expectation and perception of service quality
of select Indian Banks i.e. SBI and HDFC on the customer satisfaction. The research
survey was based on IS-QUAL dimensions a diagnostic model developed in 2014,
which measures service quality and internet service quality in terms of customer
expectations and perceptions of banking services. This present research tends to
evaluate the overall idea of expected and perceived services of the two banks. This
study is a cross-sectional survey that employed the use of pre-structured question-
naire to collect primary data from a sample of 120 respondents through personal
contact, field survey and email. Collected data have been analyzed through SPSS
21 software by different statistical tools like Reliability test for judgment of internal
consistency of collected data and paired t-test.
Chapter 5: Towards Fully De-Materialized Check Management
Banks worldwide are putting a big effort into de-materializing their processes, in
order to streamline the processes and thus reducing overall costs. In this chapter,
the authors describe how the de-materialization can be a big opportunity for banks,
describing the European context. Furthermore, the de-materialization of check han-
dling is taken as example, proposing a review of existing technologies and describing
the advantages that a real framework can give to the users and to the bank systems.
Chapter 6: Emerging Challenges, Security Issues,
and Technologies in Online Banking Systems
Online banking security is a critical issue over request-response model. But the
traditional protection mechanisms are not sufficient to secure the online banking
systems that hold information about clients, and banks. The infrastructure of net-
works, routers, domain name servers, and switches that glue these online banking
xxiii
systems together could be fail, and as a result, online banking systems will no longer
be able to communicate accurately or reliably. A number of critical questions arise,
such as what exactly the infrastructure is, what threats it must be secured against,
and how protection can be provided on a cost-effective basis. But underlying all
these questions is how to define secure online banking systems. In this chapter,
emerging challenges, security issues and technologies in Online Banking Systems
will be analyzed and discussed systematically.
Chapter 7: The Influences of Privacy, Security,
and Legal Concerns on Online Banking
Adoption: A Conceptual Framework
Business globalization and the rising new technology enforced traditional banking to
head towards online banking services, which facilitates customers to obtain access
to their accounts from their business sites and personal computers to online bank-
ing services. The objective of this chapter is to construct a framework of adoption
of online banking and represent the major influences of privacy, security, and legal
concerns on online banking adoption. Furthermore, the chapter reveals the main
challenges in the development of online banking system. The adoption of online
banking can decrease the operating expenses and offer good and rapid services
to their customers. The framework factors have been classified as facilitators and
barriers of adoption of online banking. Performance expectancy, effort expectancy
and social influence have been classified as facilitators whereas security concerns,
privacy concerns and legal concerns have been classified as barriers. The results
revealed various significant suggestions for online banking service providers, de-
signers and developers.
Chapter 8: Analysis of Data Validation
Techniques for Online Banking Services
The insufficient preparation for the information and communication technologies
revolution led to few offering online transaction platforms, information security
features, and credit facilities. One of the security concerns is a lack of data valida-
tion. Data that is not validated or not properly validated is the main issue for serious
security vulnerabilities affecting online banking applications. In this chapter, the
influences of security issues on world banks will be discussed. A number of data
validation methods will be also reviewed to date to provide a systematic summary to
banking environment. Based on the advantages and disadvantages of each method,
the IT developer will decide which is best suited to develop the systematic online
banking application. From this analysis, a global view of the current and future
xxiv
tendencies of data validation will be obtained and therefore provision of possible
recommendations for solving the security and privacy issues for the online banking
services.
Chapter 9: Anytime Anywhere Any-Amount
Anybody to Anybody Real-Time Payment
(5A-RTP) with High Level Banking Security
This chapter introduces about a Proposal to any bank of any country for fast but
secured transfer of money anytime anywhere any-amount by anybody to anybody
on the spot with confirmation from the payee on the spot. This breaking scheme is
entitled as “5A-RTP scheme” where ‘5A’ stands for Anytime Anywhere Any-amount
Anybody to Anybody and ‘RTP’ stands for Real-Time Payment. There is no paper-
work at all. It is highly secured, fast and 100% technology-based. It is completely
secured, realization of payment happens immediately very fast, without any man-
hour or manpower of the bank. It is claimed that 5A-RTP scheme, if incorporated
in all the banks in any country, will give the country a huge momentum of custom-
ers’ satisfaction, huge momentum in country’s growth and economic progress. The
revolutionary breakthrough in 5A-RTP scheme is that it dominates all of the existing
banking instruments. The 5A-RTP scheme may even slowly cause a natural death
of the existing instruments.
Chapter 10: An Algorithm for Securing Hybrid
Cloud Outsourced Data in the Banking Sector
The Cloud has become a significant topic in the banking computing; however, the
trend has established a new range of security issues that need to be addressed. In
Cloud, the banking data and associated software are not under their control. In ad-
dition, with the growing demands for Cloud networks communication, it becomes
increasingly important to secure the data flow path. The existing research related
to security mechanisms only focuses on securing the flow of information in the
communication banking networks. There is a lack of work on improving the perfor-
mance of networks to meet quality of service (QoS) constrains for various services.
The security mechanisms work by encryption and decryption of the information,
but do not consider the optimized use of the network resources. In this chapter the
authors propose a Secure Data Transmission Mechanism (SDTM) with Preemption
Algorithm that combines between security and quality of service for the banking
sector. Their developed SDTM enhanced with Malicious Packets Detection System
(MPDS) which is a set of technologies and solutions.
xxv
Chapter 11: Prevention, Detection, and Recovery
of CSRF Attack in Online Banking System
Online banking system has created an enormous impact on IT, Individuals, and
networking worlds. Online banking systems and its exclusive architecture have
numerous features and advantages over traditional banking system. However, these
new uniqueness create new vulnerabilities and attacks on an online banking system.
Cross-site scripting request forgery or XSS attack is among the top vulnerabilities,
according to recent studies. This exposure occurs, when a user uses the input from
an online banking application without properly looking into them which allows an
attacker to execute malicious scripts into the application. Current approaches use
to mitigate this problem, especially on effective detection of XSS vulnerabilities
in the application or prevention of real-time XSS attacks. To address this problem,
the survey of different vulnerability attacks on online banking system performed
and also presents a concept for the prevention, detection, removal and recovery of
XSS vulnerabilities to secure the banking application.
Chapter 12: Ransomware: A Rising Threat
of New Age Digital Extortion
Compared to the last five to six years, the massive scale by which innocent users
are being subjected to a new age threat in form of digital extortion has never been
seen before. With the rise of Internet, use of personal computers and devices has
mushroomed to immense scale, with cyber criminals subjecting innocent users to
extortion using malware. The primary victim to be hit the most has been online
banking, impacting the security and reputation of banking and financial transac-
tions along with social interactions. Online security revolves around three critical
aspects – starting with the use of digital data and files, next with the use of computer
systems and finally the internet as an unsecure medium. This is where Ransomware
has become one of the most malicious forms of malware for digital extortion threats
to home and corporate user alike.
Chapter 13: Insider Threat in Banking Systems
Complete Recognition Capability
Insider threat poses huge loss to organizations since malicious insiders have enough
knowledge to attack high sensitive information. Moreover, preventing and detecting
insider attacks is a hard job because malicious insiders follow legal paths to launch
attacks. This threat leads all kinds of attacks in banking systems in the amount of
loss it causes. Insider threat in banking systems poses huge harm to banks due to
xxvi
the importance and attractiveness of assets that banks have. This chapter discusses
insider threat problem in banking sector, and introduces important surveys and case
studies that show the severeness of this threat in this sector. Moreover, the chapter
demonstrates some policies, technologies and tools that may prevent and detect
insider threat in banking systems.
Chapter 14: Achieving Security to Overcome Attacks
and Vulnerabilities in Mobile Banking Security
Mobile Banking is a means of connectivity between bank and its customers. It
would be impractical to expect customers to regularly visit banks or connect to a
web site for regular upgrade of their mobile banking application. Mobile Banking is
a provision and availability of both banking and financial services with the help of
mobile telecommunication devices as an Application. It would be expected that the
mobile application itself check the upgrades and updates and download necessary
patches. Mobile banking has brought the advantage to have an alternate to debit and
credit card usage. Mobile banking has the below three inter-related concepts: Mobile
accounting, Mobile brokerage, Mobile financial information services. Mobile bank-
ing services are Account information provision, Monetary Transaction, Investment
facilitation, Support and Content services. The threats involved in Mobile Banking
are categorized as, Threats against end user and end user device, Threats against
communication network, Threats against remote banking service.
Chapter 15: Credit Card Fraud: Behind the Scenes
In 2004, Dan DeFilippi was arrested for numerous counts of credit card fraud. This
chapter will include a full length interview transcript between Katina Michael and
Dan DeFilippi. The transcript will cover areas to do with: (1) how Dan became
involved with credit card fraud, (2) the techniques used by fraudsters to evade de-
tection; (3) the socio-ethical impacts of the fraud; (4) how he was detained by the
FBI; and (5) how he reformed by becoming a key informant and evading jail. The
interview is 12,000 words in length, and has numerous sections. It contains numer-
ous illustrations and primary documentation of the offences of credit card fraud,
and victim statements.
xxvii
Acknowledgment
The editor would like to acknowledge the help of all the people involved in this
project and, more specifically, to the authors and reviewers that took part in the
review process. Without their support, this book would not have become a reality.
First, the editor would like to thank each one of the authors for their contributions.
Our sincere gratitude goes to the chapter’s authors who contributed their time and
expertise to this book.
Second, the editor wishes to acknowledge the valuable contributions of the reviewers
regarding the improvement of quality, coherence, and content presentation of chapters.
Most of the authors also served as referees; we highly appreciate their double task.
Shadi A. Aljawarneh
Jordan University of Science and Technology, Jordan
1
Chapter 1
Online Banking
and Finance
Marta Vidal
Complutense University of Madrid, Spain
Javier Vidal-García
University of Valladolid, Spain
ABSTRACT
In recent years, online banking has become an alternative channel for most tradi-
tional entities. The increase in the number of users and rapid expansion has resulted
in a successful strategy among financial institutions. This chapter discusses the use
of technology in the finance industry and the various factors associated with it, as
well as introducing the reader to the basic characteristics of online financial ser-
vices. We review the current literature identifying the relevant research questions
for our purpose.
DOI: 10.4018/978-1-5225-0864-9.ch001
Copyright ©2017, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Random documents with unrelated
content Scribd suggests to you:
whom we test its practical value is the preacher. Emerson remarked,
“What you are thunders so loud I cannot hear what you say.”
No great writer of modern times has written more persuasively of
the Christian way of life than Tolstoi; there is no doubt that his stories
and tracts have had an immense influence on millions of readers and
have inspired them toward unselfishness, kindness and humility. But
of all great Russian writers, Tolstoi himself was the most difficult to
get along with; he could not bear to hear any other writer praised and
was lacking in the grace of appreciation. His rival, Turgenev, who
had no religious belief of any kind, excelled Tolstoi in the virtues of
modesty, unselfishness and consideration for others.
One of the many reasons why the art of bringing up children is
the most difficult of all arts is that it is essential for parents to set a
daily example. All the moral precepts in the world will not seriously
impress children if their parents do not in their daily life come
somewhere near the ideals they hold up. The child will after a
fashion love his parents anyhow, but as he grows older and begins
to compare what he has been taught with what he sees, the child is
transformed into a judge. This partly explains that fear of their own
children which so many parents secretly feel.
If the parents make their small children go to church and stay
home themselves, the children quite naturally regard church-going
as one of the numerous penalties imposed on youth and look
forward to maturity as an escape from this and many other
unpleasant compulsions. If parents impress on their children the
necessity of telling the truth, they must not themselves tell lies; they
are being watched by the sharpest eyes in the world.
Although in a certain sense we are all hypocrites—for no one
can live up to his ideals—we hate any flagrant case of hypocrisy. I
suppose one reason we have a sneaking admiration for pirates is
that pirates are not hypocrites. There is no doubt that professional
pirates are more generally admired than professional politicians. I do
not say that politicians are hypocrites; I say that pirates are not.
It is the personalities of great leaders, much more than their
sayings, that have had a beneficial influence. The sayings of Jesus
—every word that has come down to us—can be read through in
three hours. But from His life and character flows a vital force,
tremendously effective after nineteen centuries. Very few people
read the literary compositions of Sir Philip Sidney, but millions have
been influenced by his life and character. The pure, unselfish life of
George Herbert is more efficacious than his poems; and consider
Saint Francis!
The Christian Church has had in every century of its existence
able, honest, determined foes, who have done their best to destroy
it; it is probable that they have done it no injury. Nor have the frank
sensualists and materialists hurt it at all. It has been injured only by
its professed friends.
If a physician opens an office, his most dangerous foes are not
his competitors, that is to say, other doctors; his most dangerous
foes are those of his patients who say, “Well, I took his medicine, and
it did me no good.” The best advertising is done by one’s sincere
friends and admirers; the good word about the new doctor, or the
new novel, or the new play, is passed along.
The Christian religion professes to make those who accept it
better and happier; every one who professes it and exhibits none of
its graces is a powerful argument against its validity. A man’s foes
are those of his own household.
Sometimes I think religion should first of all show itself in good
manners; that is, in true politeness, consideration for others,
kindness and deference without servility. Such persons are those we
love to meet and be with; they are good advertisements of their
religion; they will not have to talk about it because its effects are so
plainly and attractively seen.
XXV
LONDON AS A SUMMER RESORT
I had an interesting conversation with Bernard Shaw last week.
The next day he and Mrs. Shaw were leaving to spend the summer
on the Riviera, which from time immemorial has been regarded as a
winter resort. He gave, as is his custom, an original and diverting
explanation of the fact that many now prefer to visit winter resorts in
the summer. It is a matter of clothes. The Victorians were forced to
go to cool places, or at any rate to avoid warm places; because they
were compelled to wear stuffy clothes, the men being encased in
frock coats, thick waistcoats, collars and swaddling neckcloths. But
today, when one leaves off almost everything, the finest place in the
world, according to G. B. S., is a climate where one can live outdoors
in comfort, day and night.
It is certainly true that many European resorts, where the hotels
used to be open only during a short winter season, now attract
visitors the year round. The converse is also true. I can well
remember when the great hotels of Switzerland—the playground of
Europe—were open only during the summer; and were crowded only
during the month of August. But now they never close and are as
much sought after in December and January as in the good old
summertime. The same is true of Lake Placid in America and of
many other places. People in Victorian times were forced to dress
according to the prevailing style, which bore no reference to climate
or common sense; remember how the women used to look, playing
golf and tennis!
Furthermore the old idea that everyone who could afford it must
leave the city during the “heated term” has become obsolete, even in
America. President Harper of the University of Chicago established a
Summer Quarter, and professors who wished to do so could take
their three months’ vacation in the winter, a privilege that many
continue to enjoy. The Country clubs and golf have had much to do
with the contentment of business men who remain in cities during
the summer. As a matter of fact, the city is not at all a bad place, I
mean, of course, for those who can afford to make themselves
comfortable.
The city of Munich has for many years been a Mecca for
summer pilgrims. The season of music, arranged for foreign visitors,
reaches its climax in August. Now I wish to urge the millions of
Americans who at one time or another cross the ocean to consider
the merits of London as a summer resort.
For over a hundred years July has been a part of the London
“season”; Parliament is in session, operas and theatres are open,
and parties flourish amain. The twelfth of August, the opening of the
grouse shooting season, is the formal beginning of the vacation;
Parliament always adjourns for it, and London society flies north. But
to an American London is day by day interesting, and there should
be no closing of any season for him.
London has no prolonged hot weather, like St. Louis. It has been
said that the English climate consists of eight months of winter, and
four months of bad weather. This is an exaggeration. Every now and
then there is a year when summer is omitted; but even in such an
unfortunate time, one is better off in London than in the country. In
fact, to an American London, while not the most beautiful city in the
world, is assuredly the most interesting. It is inexhaustible. Every foot
of it, to one well read in English literature, is hallowed ground; I think
I could walk along Fleet street a thousand days in succession, and
always receive a thrill.
I wish that every American journalist, every American book
reviewer, every American drama critic, would spend a month in
London and diligently read the morning newspapers, such as The
Times, The Telegraph, The Morning Post. Every page seems to be
written for intelligent readers. These London journalists review
tennis, golf and cricket matches with more dignity than the average
New Yorker reviews plays and books. One reason that militates
steadily against intellectual progress in America is the fact that
apparently we have no language suitable as a medium for the
exchange of ideas. Our book reviews and our drama criticisms are
too often written in a cheap kind of slang that is intended to be smart.
If anyone imagines that the journalism of London loses in intensity by
being written in suitable English, let him turn to a file of The London
Times and read the story of Tilden playing tennis at Wimbledon.
A remarkable thing about literary society in London is that age
has nothing to do with it. One meets in social gatherings men and
women in the twenties and in the eighties—disparity in years seems
to be forgotten.
One should remember that, owing to the small size of England,
one can use London as a base of operations and take excursions
into the country on the swift English trains, returning to London every
evening; many happy, baggageless days have I spent in this
manner.
When G. K. Chesterton was in America, I asked him what
difference between the two countries impressed him most. Instantly
he replied, “Your wooden houses.” I had never thought of them as
curiosities, but one does not see them in England. The thing that to
me is most noticeable on the London streets is the absence of straw
hats. There are many more bare male heads than there are straw
hats. It is almost impossible to attract attention in London, but a
straw hat will come nearest to doing the trick. Some men are
exquisitely and others strangely clad, and nobody cares. I saw a
man riding a bicycle. He had on tan shoes, homespun trousers, a
frock coat, and a tall silk hat.
XXVI
WHAT THE MAN WILL WEAR
Men, women, and children are all interested in clothes; there
have been many scholarly works, displaying vast erudition, on the
history of costume; and two literary masterpieces, dealing with the
philosophy of clothes, belong permanently to literature—A Tale of a
Tub, by Jonathan Swift, and Sartor Resartus, by Thomas Carlyle.
So much attention has recently been paid in the newspapers and
by the public to the clothes of women, that we are forgetting what
revolutionary changes have taken place in the garments of men.
Women’s clothes have decreased in number, weight, and size.
Men’s clothes have gone through a process of softening. Hard hats,
hard collars, hard shirts, hard shoes, hard suits, have given way to
soft; and, for the first time in centuries, the carcasses of males are
comfortably clad.
One hundred years ago the average gentleman, not satisfied
with covering his body with an accumulation of intolerably thick
clothes, wound an enormous stock around his neck. How stifling
they look in those old family portraits! Robert Louis Stevenson
applied an unexpected but accurate adjective to those collections of
oil paintings of deceased ancestors, with which their descendants
adorned walls of their dining rooms. Stevenson called them “these
constipated portraits.”
This is the way my father dressed on practically every morning of
his life; that is, after he left the farm, and entered upon the practice of
his profession. He wore long, heavy flannel underwear, reaching to
his ankles and his wrists. He put on a “hard-boiled,” white, full-
bosomed shirt, stiff as sheet-iron. At the neck he fastened a stiff,
upright, white linen choker collar; at the ends of the sleeves he
buttoned on thick, three-ply linen cuffs. He imprisoned his feet,
ankles, and shins in black, stiff, leather boots, reaching to the knees,
but concealed above the ankles by his trousers. He wore a long-
tailed coat, a waistcoat, and trousers made out of thick, dark-blue or
black broadcloth. The trousers were strapped over his shoulders by
suspenders. For the top of his head there was a tall, heavy, beaver
hat.
Thus, clad in impenetrable armour from head to foot, he set out
for the day’s work.
Fifty years ago was the age of dressing-gown and slippers. Why
is it we never hear slippers mentioned nowadays? I have not owned
a pair of slippers (except bedroom slippers) for more than thirty
years. Yet in Victorian novels we are always reading of how, when
the breadwinner returns to his home in the evening, he finds his
slippers ready for him, warmed on the hearth. My father always took
off his great boots—worn in summer as well as in winter—and put on
his slippers when he came home, having called it a day.
Poets, novelists, and men whose occupation kept them at home,
sat down to their desk in dressing-gown and slippers. The moment a
man sat down in his own house to anything, with no immediate
thought of going out, dressing-gown and slippers were the regulation
costume. They were like knights-at-arms, taking off their suits of mail
when they entered the interior of the castle.
Eventually the knee-boots gave way to high shoes—called boots
in England—which were laced up to the top. In time these were
succeeded by low shoes, which are now worn by millions of
Americans the year round.
The swaddling, stifling, heavy underclothes were scrapped, and
their place taken by sleeveless, shinless undergarments, light in
weight, and more or less open in texture. Best of all, the intolerable
stiff shirt, the bottom edge of which cut into the abdomen, and bellied
out above like a sail in a fair wind, was reserved only for formal
evening wear; shirts were made and worn that had no trace of starch
in front, back, collar or cuff. I have not worn a stiff shirt (except for
evening) in twenty years.
Suspenders (braces) became obsolete; and the pleasant belt
came in, the belt that may be loosened or tightened at will, and
which in any case leaves the shoulders free. In hot weather the
waistcoat was discarded; and the man in his thin, loose clothes
moved about almost as easily as Adam in Paradise.
Various are the names for the round stiff hat, derby, dicer, pot
hat, bowler, billy-cock. Under any name it is just as bad. Some fifteen
or twenty years ago the derby went temporarily out of fashion. Up to
that time, if you looked into a cloak-room by a hotel dining-room, you
saw about two hundred men’s hats looking exactly alike. Now you
see a vast assortment of soft headgear, grey, brown, green, all of
pleasing shape. The thousands of men at a football game now show
variety aloft, instead of the intolerable black monotony of former
years. I have not owned a “derby” since the war. Apart from my own
hatred of the object, I always crushed it getting in or out of an
automobile. And one indentation ruins a derby forever: every wound
is mortal.
I am quite aware that the derby is returning. Everyone knows the
nation-wide fame acquired by a certain brown derby. But no stiff hat,
black or brown, will ever adorn my brows again during the hours of
daylight.
The English, owing to their horrible climate and also partly to an
invincible conservatism, still wear heavy clothes, thicksoled high
shoes, braces, waistcoats, etc., even in hot weather. The only reform
they have made is discarding the frock coat for daily wear, which up
to a very few years ago was universal. A common sight in London
was to see clerks going to the “city” on bicycles, arrayed in “Prince
Albert” coats.
The clothes of an American tourist still look funny to an
Englishman; how funny I never realised until I attended a play in
London where an American was the object of good-natured
caricature. He came on the stage with low shoes and silk shoe-
laces, bright, thin socks, trousers held by a belt, no waistcoat, and
jacket unbuttoned. The audience burst into roars of laughter and I
laughed too, because he did look queer by contrast with the other
actors. Then I suddenly realised that I was dressed precisely like the
man they were laughing at!
One more reform must be made in men’s dress; and I believe it
will come. In very hot weather, men must be allowed to discard the
jacket. Even a thin jacket, with its collar and shouldercloth, is
intolerable. A clean, attractive shirt, with soft collar and necktie, and
belt around the trousers, looks so sensible in hot weather that it
ought to become the rule rather than the exception.
XXVII
DREAMS
I look upon horrible dreams as one of the assets of humanity,
one of the good things of life; because one feels so elated after
waking. I am convinced that most men and women do not sufficiently
appreciate the advantages they possess. They either exaggerate
their sufferings and drawbacks or, instead of enjoying what they
have, they spend their time in longing for what is beyond their reach.
Just as it takes an illness to make one appreciate the
satisfactions of health, so one needs a calamity to make one realise
how good daily existence really is. It is often said that experience is
the best teacher. This is by no means always or even often true.
Experience charges too much for her lessons.
There is no good in learning how one might have shown sagacity
in business after one is bankrupt; there is no good in discovering
how one ought to have avoided a certain article of diet after one is
fatally poisoned; there is no good in receiving the proof of the danger
in carelessly driving a motor car after one lies dead in the ditch.
Now the best way to discover how cheerful daily life may be is to
be visited by a frightful dream. The horrible wild beast has seized us,
because when we tried to flee, our legs were lead. Just as it is about
to sink its terrible tusks in our shrinking frame, we wake up, and hear
the good old trolley car go by. Hurrah! it was only a dream; and we
are alive on the blessed earth. And we have learned how sweet plain
ordinary life is without the lesson costing us anything but a transitory
sweat.
I think, too, that many who either profess to hate life or at all
events refuse to admit anything good about it, might appreciate it
more if they could be temporarily transferred, not to hell, but to their
own imagined heaven. Wagner in the famous music-drama,
Tannhäuser, has given an admirable illustration. This knight, like all
his fellow-creatures, felt the call of the senses; he was transported
from this imperfect earth to the pagan Heaven, where he lived in the
constant society of Venus. But after a time this palled upon him and
eventually became intolerable. He tore himself away, and suddenly
found himself back on the earth. He was in a green pasture in the
springtime, and a shepherd boy was singing—what happiness!
The accomplished German dramatist Ludwig Fulda wrote a play,
Schlaraffenland. There was a poor boy, ragged, cold and chronically
hungry. He dreamed he was in a magic land. Remarkable birds flew
so slowly by him that he found he could reach out his hand and
grasp them. He did this, and lo, he had in his hand a broiled chicken!
He ate several with avidity, but could not eat forever. Glancing at his
ragged garments, a wardrobe door flew wide, and he had his choice
among many elegant suits. Thus every desire was instantly and
abundantly gratified. After some time, this palled upon him, and then
became so unendurable that he gave a yell of horror; he woke up.
He was cold, ragged, and hungry; but his heart was singing. He was
back on the good old earth.
Thus, whether we dream of hell or of heaven, it is usually with a
sigh or even a shout of satisfaction that we find ourselves back on
this imperfect globe.
Many persons tell me that they never dream; their sleep is blank.
It is with me quite otherwise; I almost always dream; many of my
dreams are extraordinarily vivid and some are unforgettable.
When I was a child I dreamed three nights in succession of the
Devil. The first night the Devil chased me upstairs. I ran as fast as I
could, but sank down when only half way up. Then the Devil took
from his pocket a shoemaker’s awl and bored it deftly into my right
knee. The second night the Devil was in my front yard. Suddenly he
changed into the form of a dog; and when another dog rushed
barking at him the satanic hound swallowed him as easily as one
takes a pill. The third night I also dreamed of the Devil, but I have
forgotten the details.
One of the worst dreams I had in childhood was when I was
being attacked by wild beasts, and suddenly my mother appeared on
the scene. I shrieked to her for help, and she looked at me with calm
indifference. That was the worst dream I ever had, and you may be
sure it went by contraries.
I suppose the only way we can distinguish dreams from what is
called actual life is that in dreams the law of causation is suspended.
There is no order in events, and no principle of sufficient reason to
account for them. Things change in an impossible manner. Apart
from this, dreams are as real as life while they last.
I often have prolonged dreams that are not only fully as real as
waking experiences, but are orderly and sensible, and sometimes
delightful. Many years ago I dreamed that I was walking the streets
of a Russian city with Count Tolstoi. It was one of the most agreeable
and most inspiring days of my life, and I have always regretted it
never happened. We walked together for hours and discussed
modern literature. He said a great many wise and brilliant things, all
of which I have, alas, forgotten. The only feature of that dream unlike
reality was that Tolstoi had shaved off his beard.
Wilkie Collins, in Armadale, suggested that every dream we
have is a repetition of an experience that has actually happened to
us during the preceding twenty-four hours. I read that novel in my
boyhood and was impressed by that explanation of dreams, and for
several months I wrote down my dreams and found that every one
was suggested by something that had happened to me during the
preceding day.
The only thing I am certain of in dreams is that they do not in any
way forecast the future. When I was a child I dreamed I saw heaven
and Jesus sitting on a cloud. He called to me, “Willie Phelps, come
here.” The next day I told my father and mother about it, and to my
surprise they were exceedingly alarmed.
XXVIII
EATING BREAKFAST
In the daily life of the average person the longest interval between
eating is that between the evening meal and breakfast; the very name
for the morning repast accurately describes its nature. It should
therefore, be taken seriously, which means that there should not only
be enough to eat, but that plenty of time should be allowed to eat it.
I am aware that there are many men of excellent character who eat
almost nothing for breakfast, and that there are some saints who eat
no breakfast at all. In character and personal habits, I have never met
a man more saintly than Henry Ford. I refer both to the asceticism of
his physical life and to the purity of the motives that inspire his
conduct. He eats no breakfast at all, not a morsel of food. He rises
very early, goes outdoors, runs a mile or two and then works with
absolute concentration till one o’clock, when he has the first meal of
the day. I asked him if he never felt any desire for food during so long a
morning; he replied that it was necessary for him in his vast
undertakings to have a mind entirely fresh and clear, and that he found
he could do better work on an empty stomach and with a brain
unclouded by food.
I suppose every man must be a law unto himself. It does not seem
to me that I could live happily without breakfast, yet I am sure that it is
better to omit the meal altogether than to eat it in the hurry and fever in
which many Americans devour it. Far too many prefer to lie in bed half
an hour longer than to use that precious half hour in the consumption
of food.
* * * * *
In the days when they had required morning chapel at Yale a great
many students came to chapel either without any breakfast or with
unassorted junks of it in their stomachs engaged in civil war. One early
morning I was walking up Elm Street in New Haven; the streets ware
filled with undergraduates sprinting to chapel. The lady with me said:
“Do look at those poor boys running to chapel with their tongues
hanging out!” I set her right at once. “Those are not tongues, those are
griddle cakes!”
Those young men were accurate calculators. Three minutes for
breakfast, one minute to reach chapel. They hurried the last griddle
cake into their faces as they left the dining hall, and it gradually
disappeared as they ran.
I love to see the whole family assemble at breakfast and eat a
good meal leisurely. In order to accomplish this, every one must get up
early enough to allow for complete preparation in the way of bathing,
shaving, etc., and then leave enough time to consume food in peace of
mind. Of how many families is this true? Of course, there are many
persons who like to eat breakfast in bed, and perhaps, there are some
who can do this neatly, even artistically. I never eat breakfast in bed
unless I am too sick to get up, for I hate to have crumbs all over my
night clothes or inside the bed. Furthermore, in spite of considerable
practice during various illnesses, I have never mastered the fine art of
swallowing food while in a horizontal position. To take coffee in this
manner is an achievement. And what is breakfast without coffee?
Although coffee is not an American product, I have never had a
satisfactory cup of coffee outside of the United States of America.
Americans alone seem to understand the secret of good coffee. The
English meet this problem illegitimately, by substituting tea. Now tea is
all very well in the late afternoon, but in the morning it is without
inspiration. And every man ought to start the day in an inspired
manner.
G. K. Chesterton says that Bernard Shaw is like coffee; he
stimulates but does not inspire. I should amend that, by saying Shaw is
like coffee because he stimulates but does not nourish. For I firmly
believe that both Shaw and coffee are alike in this: they do both
stimulate and inspire, but they do not nourish. I used to wonder what
Chesterton could possibly mean by saying that coffee did not inspire,
when suddenly the true explanation occurred to me. He was thinking of
English coffee.
The newspaper should not be read during the sacred rite of
breakfast. There is no doubt that many divorces have been caused by
the man’s opening and reading the newspaper at breakfast, thereby
totally eclipsing his wife. It is simply a case of bad manners, and bad
manners at food have in thousands of instances extinguished the fires
of love. Nor, although it is a common custom, do I believe that letters
should be opened and read at the breakfast table. One letter may
contain enough worry, disappointment and anger to upset a reader for
hours. And to eat food while one is angry, or worried, or excited is
almost as bad as eating poison. I never read letters at breakfast and I
never read letters in the evening.
For the same reason breakfast should be eaten in a calm and
peaceful state of mind, illuminated by happy family conversation. Many
men every day eat breakfast in feverish haste and then run to catch a
trolley car or a train. That horrible breakfast soon begins to assert
itself, and the man is in an irritable condition all the morning. It simply
does not pay to eat in a hurry. Breakfast should not resemble a
delirium.
And at the breakfast table all the members of the party should eat
or leave the room. It is a sad experience to be in a hotel or in a dining
car and have some acquaintance come up briskly and say: “I have
already had my breakfast, but I will sit and talk with you while you eat
yours.” That means he intends to watch you eat, and, just as your
mouth is full of food, he will ask you a question. I have observed many
patient men suffering tortures in this manner. I have even observed an
enormous mass of unchewed food distend their throats as they hastily
bolt it in the endeavor to reply to interrogations. A snake may swallow
a toad, but the snake’s constitution differs from a man’s.
If I could have only one meal a day, it would be breakfast. After a
good American breakfast—orange juice, cereal, coffee, toast, bacon
and eggs—I am ready for everything and anything. If the day begins in
the right manner its progress will be satisfactory. And the best of all
rules of diet is to eat what you like and take the time to do it.
XXIX
THE MOTHER TONGUE
Judges xii:6—“Then said they unto him, Say now Shibboleth:
and he said Sibboleth: for he could not frame to pronounce it right.
Then they took him, and slew him at the passages of Jordan: and
there fell at that time of the Ephraimites forty and two thousand.”
If there were forty-two thousand of the sons of Ephraim who
could not speak correctly and distinctly, we may be sure that the
sons and daughters of America are not impeccable. Indeed, we have
daily evidence not only on the street and in railway coaches, but in
schools, churches, colleges and theatres, of linguistic matricide—
mortal attacks on the mother tongue, committed with impunity in the
absence of the axe. In Old Testament times they had, as we see by
the text of this sermon, drastic methods for establishing correct
standards of pronunciation; those who did not speak accurately were
eliminated.
Besides the suffering inflicted on sensitive and sympathetic ears,
there is a feeling of shame in the heart of this present evangelist that
the American public school, which ought to be a temple where the
English language is treated with reverence, should actually be a
scene of cynical—since everything careless is cynical—desecration.
I am not condemning colloquial slang, which in its metaphorical
picturesqueness is often the very life of speech, but rather the
shoddy mutilation of words in good and regular standing.
More important than the study of foreign tongues is the
unaffectedly correct pronunciation of that language which is now
heard in the uttermost parts of the earth. Furthermore, the very
difficulties of English pronunciation make the successful surmounting
of them a glorious achievement, one that should appeal to the Spirit
of Youth, which instinctively loves a desperate undertaking.
German is practically a phonetic language; leaving out the
matter of accent, it is easier for an American, with proper instruction,
to speak German words correctly than it is for him to conquer the
wild and lawless army of English syllables. Let us then not minimise
the strength of the foe; let this rather become an inspiration.
Let me say two things to all school and college teachers: No
matter what subject you teach, Greek, chemistry or physics,
whenever you hear one of your pupils mispronounce an English
word correct him so that he and the other members of the class will
learn something valuable there and then. And when you do this, tell
the class that if any member of it hears you mispronounce a word,
you will be grateful for immediate and public correction.
Second, do not allow any pupil to speak better English than that
spoken by you. Our schools and colleges contain a few pupils who
speak the language so well that they beat the teacher; the teacher
should not permit such a thing to continue. Although I was brought
up in a cultivated home, I learned in my boyhood a considerable
number of bad pronunciations; I changed these for better ones
because I was determined that no one of my students should speak
more correctly than I.
Bernard Shaw told me he was on a special committee appointed
to standardise English pronunciation in Great Britain; this committee,
consisting of a very few, tell all the radio broadcasters exactly how to
pronounce a long list of words, in the hope that by this means the
millions “listening in” will learn how to speak their own language.
There is no reason why Americans should imitate the British in
the pronunciation of certain words which the cultivated citizens of
both countries pronounce quite differently—I refer to words like
schedule, clerk, capitalist, trait, fracas, lieutenant and the last letter in
the alphabet which Shakespeare calls by a bad name.
It is sheer affectation to imitate the British in such special
matters, as it is an affectation to imitate what is called the Oxford
accent, where the word smoke is pronounced as if it were spelled
smilk—see Julian Street’s delightful book In Need of Change.
Yesterday afternoon I heard an English actress on the New York
stage pronounce No as if it were spelled NAAO. But after all,
England is the home of the English speech; and I wish that it were
possible for the United States, Canada, Australia, New Zealand,
Capetown and other places to follow in general the best English
spelling and pronunciation. For example, it is certainly better for
Americans to pronounce the word been like the sacred vegetable of
Boston than like the first syllable of the Christian name of Franklin.
In America the most shamefully treated of our five vowels is U,
and the combination of letters EW, which should resemble U in
accuracy, as it now so often does in sin. There should be a distinct
difference between the sound of U and the double O, actually
observable to the naked ear in such words as Duke, Duty, Tutor,
Constitution, Enthusiasm, Tuesday, News.
The way to make this distinction is to remember that the English
language is the only one where the true sound of U is YU; whereas
the Russians, Italians and Germans pronounce U like OO, and the
French differently from any one of these. Just as the Russians
pronounce E as if it were YE, so Americans, when they practice in
secret words like evolution, should visualize a Y in front of the U; it
will help them.
The most popular letter in our alphabet, E, is abominably treated
in such words as cellar, yellow, Philadelphia, where it is so
offensively given the sound of U in “skull”; this is even more common
and still more unpleasant in two useful words, Very and American.
Cultivated English and Americans laugh at the Cockney for
leaving the H silent where it should be heard; but they themselves
are equally and more unpardonably guilty in omitting the H in the
combination Wh. There should be a difference in the pronunciation
of Whine and Wine; yet most cultivated people in both countries talk
about games of Wist, and say Wen, Wich and Wy. Let them heal
themselves before laughing at the Cockney.
The dogletter, R, has a curious fate in American mouths; it is
either unduly accented in such words as Here and Dinner (Middle
West) or it is (East) hitched on to the end of words like idea, and
saw, where it is as awkward as a sailor on horseback. Listen to the
average Yankee when he says “I have no idea of it” and you will see
that he speaks the truth.
XXX
OUR SOUTH AS CURE FOR FLU
The chief reason for my present sojourn at Augusta is the flu,
which attacked me in Connecticut some weeks ago. The American
use of the words “flu” and “grip” is both modern and interesting.
Epidemics of influenza, which seem to cross the ocean from Europe
to America without suffering any sea-change, have been more or
less common since the pilgrims landed at Plymouth. Richard
Hildreth, in his admirable History of the United States, describes
these attacks in the Massachusetts Colony in the seventeenth
century; and it appears from his realistic accounts that they differed
in no respect from recent nation-wide flu epidemics.
If I remember rightly, the word “grip” was not used currently in
America until the epidemic of 1889–1890, which was both severe
and general; it was the subject of constant discussion in the
newspapers, and it was generally believed to be a French
importation, where it was known as la grippe. This in American
became the “grip,” except in certain isolated districts, where it was
called “the la grippe.” But the word, either in its French or English
form, was not commonly used in America until the season of 1889–
1890, when France made a Christmas present of it to the United
States.
The word “flu” had been British slang for some time before it
penetrated America; it was one of the numerous unprofitable things
that our country acquired during the war. In a conversation I had with
the novelist, William De Morgan, in London, in 1911, he casually
used the word “flu,” and for a moment I did not guess its meaning.
Then I saw it was an abbreviation. When the disease crossed the
ocean in 1918, it brought with it its British pet name, which,
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
Let us accompany you on the journey of exploring knowledge and
personal growth!
textbookfull.com