Thursday, October 31, 2019

Marketing Plan For An Art Gallery National Gallery of Art Term Paper

Marketing Plan For An Art Gallery National Gallery of Art - Term Paper Example The National Gallery of Art has come up with a new marketing strategy in order to cope with the rising completion and to retain the existing customers. The new marketing strategy involves market expansion and penetration strategies. It is planning to expand its product line and also to offer a new product by opening up a art school for students who are interested in learning about the American and European art. The main objective of the National Gallery of Art is to preserve the best art pieces from all around the world and pass them on to the future generations in the best condition. In the next three, consecutive years, the organization has planned to implement its new marketing strategy by using a step-by-step procedure. In the first year it will expand its collection base, in the second year it will expand its building and in the third year it will open up its art school. Company description The National Gallery of Art is based in Washington, DC. It was created in 1937 by the people of United States. It was formed as a result of collaboration between the congress and the Andrew. W. Mellon who was both the financier and art collector for the National Gallery of Art. Before his death Andrew W Mellon promised all his collection of sculpture and art to the United States and it was preserved in the National Gallery of Art. Since then the gallery has been like an art museum. It holds many precious paintings belonging to various artists. The collection at The National Art gallery consists of precious art pieces from United States and Europe

Monday, October 28, 2019

Confusing Truth Essay Example for Free

Confusing Truth Essay 1. 1 Introduction Before the advent of digital imaging, we rely on paintings and books to record for documentary use. While paintings and books suggest the clear separation of what is truth and what is falsehood, people believe that camera is trustworthy and photos taken from it are the truth because camera is a machine with no emotions. Digital imaging gives better quality images to readers. However, due to the potential of digital photography manipulation, it has clarified that truth is not fixed anymore but has fluidity. There is no absolute truth. Before digital imaging, although photograph still has manipulations during their creation through framing or posing, photo manipulation is not that serious because fake photos are usually easily detected. Nowadays, digital imaging has made manipulation much more easily and harder to be detected. But, there are different degrees of alterations. From removing a hair from the forehead to removing a person in news photo, we can see the potential of digital manipulation. People start arguing on the matter of what to be considered as truth and falsehood; it is all because of the presence of fluidity of truth. 1. 2 Concept of Fluidity of Truth Generally, we are used to the truth-versus-falsehood nature. However, with the potential of how digital imaging can be changed in different degrees of alterations, it is not always easy to identify a point where truth is lost and we cannot set a clear line separate truth from falsehood. This is the concept of fluidity of truth. In the following, I will explain how digital imaging clarified fluidity of truth, with 2 altered images examples with different intentions and degree of alterations. Digital imaging and the powerful techniques of manipulation distort the truth. Photographers manipulate photos mainly in 4 ways: bad intention with large alteration, bad intention with little alteration, good intention with large alteration and good intention with little alteration. 1. 3 Example of manipulated photo with bad intention Take the award-winning photo about Tibetan Railroad in 2006 as example (see figure 2. 1). The photographer combined two separate photographs together to make a photo of a group of antelopes running below the Tibetan Railroad, showing a state of harmony between railroad technology and animals. At that time, environmental protection groups were aware that the construction of railroad had destroyed the ecosystem. With this combined photo, it is proved and people believed that construction did not affect the animals at all. The Government used this photo as a proof to persuade the Environmental Protection groups who object to the construction of the railroad. This photo, for sure, should be considered as falsehood, covering the truth, because of its bad intention. Figure 2. 1: Photo of Tibetan railroad, Liu Weiqiang, 2006. (10 News photos 2009) 1. 4 Example of manipulated photo with good intention Another example is about National Geographic (see Figure 2. 2). In 1982, it was accused of altering a photo of Egyptian pyramids, squeezing them closer together, in order to fit into the cover vertically. In this case, the photographer did not have any bad intention. He just wanted to fit his original horizontal photo into the magazine’s vertical cover. He did not alter the photo a lot either with the fact that if he went farer and took the photograph, the resulting image would have been the same as the altered image. Regarding this case, pyramid was still there and nothing was added nor removed. Truth was not lost at all. Should this photo be considered as falsehood? It is difficult to set a clear point to discern between truth and falsehood. Figure 2. 2: Photo of National Geographic, February 1982. (10 News photos 2009) 1. 5 Different perception of ‘heavy alteration’ As shown above, it is difficult to discern manipulated digital images to truth or falsehood depend on the intention. So can we identify them in accordance with degree of alteration? For instance, photos with large alteration should be considered as falsehood. The answer is probably not because everyone can have distinct perspective towards what is more and what is less. Take Klavs Bo Christensen’s photo of Haiti in 2009 as example, his photo has been processed in terms of the color tone and sent to a Danish photo contest (see Figure 2. 3). Retouching made the photo stunning and contrasting in color tone. At the end, the judges disqualified the photo since they thought the photo were too extreme and unacceptable. Christensen, the photograph, admitted the retouching but insisted that the result image was within his limit. In this case, we can see that different people have different perception of ‘heavy alteration’. Neither did Christensen remove a person nor combine two separate photos. All he did was toning the color. It is difficult to identify a clear line to tell what is truth and what is falsehood. Figure 2. 3: Photo taken by Klavs Bo Christensen, April 2009. (10 News photos 2009) 1. 6 Ironic photography and retouching techniques in products In postcards and photos of residence catalogs, most of them have been processed and are taken in certain angle in order to make the place look spectacular. These beautified photos are to attract people to visit there, expanding number of possible customers. People are always disappointed when they really get there and realize the difference between the real place and the process one. Not only these two products, most, if not all, advertisement also retouch the photos to make the subject look perfect. For instance, in the advertisement selling skincare products, the skin of the model always looks silky and perfectly smooth. Again, this is the result image of retouching. However, we never criticize these photos as falsehood or lying even though they are also under the same kind of retouching technique and manipulations as the mentioned examples above. It is all because we have fluidity of truth. There is no absolute truth or falsehood. 1. 7 Inevitability of digital manipulation Indeed, media do need certain extent of digital manipulations, such as lightening or darkening a photograph just for better reproduction quality (Newton P. 11). Truth is not lost at all. In these cases, should we consider these manipulated photos as falsehood? It is always hard to judge because of the fluidity of truth where the line between truth and falsehood is ambiguous. 1. 8 Conclusion It is always hard to define what is real. With the potential of how people can digitally manipulate photos in totally different ways and with different intentions, fluidity of truth has been clarified, where not every photograph can fit into the truth-versus-falsehood nature. We can have people doing alterations with good intention or simply just for better reproduction quality, while we can also have people using photo manipulation for controlling and creating a scene that has never happened. At the same time, we have advertisements under retouching technique without being criticized. All these suggest that digital imaging, with numerous ways of manipulations, has clarified the fluidity of truth. A clear line or point to discern between truth and falsehood does not exist. We may not be able to determine absolute truth. Instead we can determine a reasonable truth, depending on our maturation of perception of reality (Newton 2007). Reference List 10 News photos that took retouching too far, 2009. Available from: . [20 October 2012]. Newton, JH 2007, Digital media: transformations in human communication, Peter Land Publishing, Inc. , New York.

Saturday, October 26, 2019

Trusted Platform Module (TPM)

Trusted Platform Module (TPM) Trusted Platform Module (TPM) is a term used to define a chip or microcontroller. This chip or microcontroller can be placed into a motherboard configuration such as devices like mobile devices, or a personal computer (PCs). The requirements and application was presented and established by the Trusted Computing Group (TCG), to deliver a solution where a reliable and genuine relationship exists amongst hardware and software configurations. This facility was executed through cryptographic and hashing algorithms. Additional, TPM offers remote confirmation, a verification and authentication process for other third party software. TPM is a global standard for a protected crypto processor, which is a devoted microcontroller or chip intended to protect hardware by joining cryptographic keys into devices. TPMs technical requirements were established and written by TCG and launched in 2003. TCG was created as a nonprofit from inception and known to have brands like Microsoft, IBM, Intel, and Hewlett-Packard as clients. TPM just as well as others has flaws, and suffers from attacks. These attacks include offline dictionary and OIAP attacks; nevertheless, when joined with other endpoint control systems like multifactor authentication, network access control, and malware detection, TPMs contribution to a sound security platform is valid. (Sparks, 2007) This survey is a complete review of research conducted on TPM, its components, mechanisms, application, and authorization protocols. Furthermore, a description of some common attacks to which TPM has been a victim will be presented. Finally, more recent and future implementations will be discussed, such as the incorporation of TPM within mobile and smart devices and even within cloud computing. First, it is important to start with an overview of the TPM specification, its components, and its purpose. The TPM background section discusses in some detail an overarching summary of TPM. This will include what the motivations and advantages are to using TPM as well as how the different types of keys function. Also discussed is the evolution of TPM over time in how it functions in both its hardware encryption but also its capabilities. 2.1 TPM Summary A Trusted Platform Module (TPM) is a cryptographic coprocessor that replaced smart cards in the 1990s and then became present on most commercial personal computer (PCs) and servers. TPMs are almost ubiquitous in computer hardware and typically not seen by users because of the lack of compelling applications that use them. However, this situation has changed effective with TPM version 1.16 by adding the Federal Information Processing Standards (FIPS) bit which is a static flag that verifies if the device or firmware the TPM is attached to is FIPS 140-2 cryptographic module compliant. This compliance is then registered by the consolidated validation certificates granted when FIPS 140-2 is validated and are then registered and published at NIST as public record listed alphabetically by vendor located at http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/1401vend.htm. (TCG FIPS 140-2 Guidance for TPM 2.0, ver 1, rev.8, 2016) Therefore, the line of thinking of TPM has increasingly becom e one of importance and an essential ingredient to cryptographic defense community whom are required to prove their FIPS 140-2 compliance. However, this was not always the case since security was not a mainstream issue in the early years of the Internet. 2.2 Motivation to use TPM The motivation for TPM began decades after the advent of what is known as the Internet. From the creation of Advanced Research Projects Agency (ARPA) in 1969 it took almost nineteen (19) years for us to become aware of the first known exploit called the Internet Worm in 1988. (Pearson Education, Inc., 2014) Until this time the focus had always been on the development of the computer with no security hardware and software that was easy to use. There was a real concept of information security threats. However, in the 1990s there was the concept of the potential of commerce the Internet would have and the need to secure the PCs that would exchange with that commerce. This prompted many computer engineers to convene and form and develop the first TPMs which became known to be as the Trusted Computing Group (TPM: A Brief Introduction, 2015). A main objective of this group was a cost effective approach to create a hardware anchor for PC system security on which secure systems could be buil t. This first resulted in a TPM chip that was required to be attached to a motherboard and the TPM command set was architected to provide all functions necessary for its security use cases. 2.2.1.Evolution TPM has evolved considerably over the years to become the trusted platform it is today. The earlier TPM 1.2 standard was incorporated into billions of PCs, servers, embedded systems, network gear and other devices, the evolving Internet of Things and increasing demand for security beyond traditional PC environment led TCG to develop a new TPM specification, which recently was adopted as an international standard ISO/IEC 11889:2015. For more flexibility of application and to enable more widespread use of the specification, TCG created TPM 2.0 with a library approach. This allows users to choose applicable aspects of TPM functionality for different implementation levels and levels of security. Also, new features and functions were added, such as algorithm agility, the ability to implement new cryptographic algorithms as needed (Trusted Platform Module (TPM): A Brief Introduction, 2015). ISO/IEC 11889-1:2015 ISO/IEC 11889-1:2015 defines the architectural elements of the Trusted Platform Module (TPM), a device which enables trust in computing platforms in general. Some TPM concepts are explained adequately in the context of the TPM itself. Other TPM concepts are explained in the context of how a TPM helps establish trust in a computing platform. When describing how a TPM helps establish trust in a computing platform, ISO/IEC 11889-1:2015 provides some guidance for platform requirements. However, the scope of ISO/IEC 11889 is limited to TPM requirements (Trusted Platform Module (TPM) Summary, 2008). 2.3 TPM Working Functionality The TPM (Trusted Platform Module) is a computer chip (microcontroller) that can securely store artifacts used to authenticate the platform on a PC or laptop. These artifacts can include passwords, certificates, or encryption keys. A TPM can also be used to store platform measurements that help ensure that the platform remains trustworthy. This is critical because Authentication and attestation are necessary to ensure safer computing in all environments. Trusted modules can be used in computing devices other than PCs, such as mobile phones or network equipment (Trusted Platform Module (TPM) Summary, 2008). . Figure 1: Components of a TPM 2.3.1 Hardware-based cryptography This cryptography makes certain that the data stored in hardware is guarded against malicious threats such as external software attacks. Also, many types of applications storing secrets on a TPM can be developed to strengthen security by increasing the difficulty of access without proper authorization. If the configuration of the platform has been altered as a result of unauthorized activities, access to data and secrets can be denied and sealed off using these applications. TPM is not responsible for control of other proprietary or vendor software running on a computer. However, TPM can store pre-run time configuration parameters, but it is other applications that determine and implement policies associated with this information. Also, processes can be made secure and applications such as email or secure document management. For example, if at boot time it is determined that a PC is not trustworthy because of unexpected changes in configuration, access to highly secure applications can be blocked until the issue is remedied. With a TPM, one can be more certain that artifacts necessary to sign secure email messages have not been affected by software attacks. And, with the use of remote attestation, other platforms in the trusted network can make a determination, to which extent they can trust information from another PC. Attestation or any other TPM functions do not transmit personal information of the user of the platform. 2.3.2 Capabilities TPM can improve security in many areas of computing, including e-commerce, citizen-to-government applications, online banking, confidential government communications and many other fields where greater security is required. Hardware-based security can improve protection for VPN, wireless networks, file encryption (as in Microsofts BitLocker) and password/PIN/credentials management. TPM specification is OS-agnostic, and software stacks exist for several Operating Systems. 2.4TPM Components Trusted Platform Module (TPM) is the core component of trusted computing. TPM is implemented as a secure hardware chip and provides the hardware Root of Trust. TPM has been designed to provide trusted computing based on Trusted Computing Group (TCG) specifications. TPM functions can be implemented either in hardware or software. A secure cryptographic chip (Figure 2) can be integrated on the motherboard of a computing device according to TPM 1.2 specifications (Angela, Renu Mary, Vinodh Ewards, 2013). Figure 2: A TPM 1.2 Chip (Source http://www.infineon.com) A logical layout of the TPM is represented below (Figure 3) along with the TPM components. Figure 3: TPM Component Diagram (Zimmer, Dasari, Brogam, 2009) Information flow is managed by the I/O component through the communication bus. The I/O component handles routing of messages to various components within the TPM and establishes access control for TPM functions and the Opt-in component. The non-volatile memory in the TPM is a repository for storing the Endorsement Key (EK) and the Storage Root Key (SRK). These long-term keys are the basis of key hierarchy. Owners authorization data such as password and persistent flags are also stored in the non-volatile memory (Trusted Computing Group, 2007). Platform Configuration Registers (PCR) are reset during power-offs and system restarts and can be stored in volatile or non-volatile region. In TPM v 1.1, minimum number of registers that can be implemented is 16. Registers 0-7 are allocated for TPM usage leaving the remaining registers (8-15) to be used by operating system and applications (Angela, Renu Mary, Vinodh Ewards, 2013). In TPM v 1.2, number of registers can be 24 or more and categorized as static PCRs (0-16) and dynamic PCRs (17-22). The Program Code, also known as Core Root of Trust for Measurement (CRTM) is the authoritative source for integrity measurements. Execution engine is responsible for initializing TPM and taking measurements. The execution engine is the driver behind the program code. RNG (Random Number Generator) is used for generating keys, nonce creation and to fortify passphrase entropy. The SHA-1 engine plays a key role in creating key Blobs and hashing large blocks of data. TPM modules can be shipped with various states ranging from disabled, and deactivated to fully enabled. The Opt-in component ensures the state of TPM modules during shipping. The RSA engine can be used for a variety purposes including key signing, encryption/decryption using storage keys and decryption using EK. The AIK (Attestation Identity Key) is an asymmetric key pair typically linked to the platform module that can be used to vouch for the validity of the platforms identity and configuration. The RSA key generation engine are used for creating symmetric keys of up to 2048 bits. 2.5 TPM Keys TCG keys can be categorized as signing or storage keys. Other key types defined by TCG are Platform, Identity, Binding, General and Legacy keys (Trusted Computing Group, 2007). Signing keys can be classified as general purpose keys and are asymmetric in nature. Application data and messages can be signed by the TPM using signing keys. Signing keys can be moved between TPM devices based on restrictions in place. Storage keys are asymmetric keys and primarily used for encrypting data and other keys as well as for wrapping keys. Attestation Identity Keys (AIK) are used for signing data pertaining to the TPM such as PCR register values. AIK are signing keys that cannot be exported. Endorsement Key (EK) is used for decrypting the owner authorization credentials as well as cryptic messages created by AIK. EK is not used for encryption or signing and cannot be exported. Bind keys (symmetric keys) come in handy to encrypt data on one platform and decrypt it on a different platform. Legacy keys can be imported from outside the TPM and used for signing and encrypting data. Authentication keys are responsible for securing the transport sessions related to TPM and are symmetric in nature. Endorsement Key (EK) in the TPM plays a critical role to maintain system security. TPM uses a private key EK to generate other keys which are bound to a specific EK. EK should be secured and protected from being compromised. A 160-bit AIK authentication value is necessary to use the AIK by TPM (Sparks, 2007). The parent key used for generating other keys should be loaded first and authenticated by users before TPM can load all other keys. The EK is unique to the TPM and embedded within the tamper resistant non-volatile memory (Angela, Renu Mary, Vinodh Ewards, 2013). Public EK is used for creating AIK certificates and during the process of encrypting data within the TPM. The private key pair of EK is not touched when generating signatures. Multiple AIKs can be stored within a TPM to ensure anonymity between various service providers requiring proof of identity. AIK keys should be stored in secure external storage (outside the TPM) to make them persistent. AIKs can be loaded on to th e volatile memory in the TPM when in use. TPM has a Storage Root Key which stays persistent. Keys are not stored permanently in TPM due to limited storage space. A brief description of the process involved in key generation, encryption, and decryption in TPM is outlined below (Osborn Challener, 2013). A new RSA key is generated by the TPM when a key creation request is initiated by a software. TPM concatenates a value to the RSA key, appends authorization data and then the data is encrypted using the public section of the Storage Root Key and sends an encrypted blob to the requested software. A request is sent for the key to be retrieved from the blob storage when requested by the software program. TPM uses the Storage Root Key for decryption and validates the proof value and password before loading the key into TPM memory. This loaded key is referred to as the parent key and can be used for subsequent key creation forming key hierarchies. The TMP security section discusses in some detail the various ways in which security is implemented and vulnerable. TPM authorization protocols in both version 1.2 and version 2.0 are addressed. Several examples of different types of TPM vulnerabilities are outlined as well as ways to verify the integrity of the system to protect against this vulnerabilities and what the future holds for TPM. 3.1 TPM Authorization Protocols TPM 1.2 Authorization The basic definition of TPM authorization is the process of verifying that software is allowed to use a TPM key. For TPM 1.2 this process is accomplished by utilizing a couple basic commands in an authorization session; typically using passwords or values stored in the Platform Configuration Registers (PCRs) which are referred to as authorization data. The three types of authorization sessions for TPM 1.2 are: Object Independent Authorization Protocol (OIAP), which creates a session that allows access to multiple objects, but works only for certain commands; Object Specific Authorization Protocol (OSAP), which creates a session that can manipulate only a single object, but allows for new authorization transfer; and Delegate-Specific Authorization Protocol (DSAP), which delegates access to an object without disclosing the authorization data (Nyman, Ekberg, Asokan, 2014). Commands are then used to manipulate the keys within an authorization session. Software can prove that it is trusted by sending a command which includes the password hash to verify it has knowledge of the password. Also the locking of non-volatile random-access memory (NVRAM) to PCRs and particular localities is utilized for two different authorizations; one for reading and one for writing. While effective, these authorization mechanisms created a relatively rigid authorization system which make it difficult to administrate the sharing of TPM keys and data (Osborn Chaneller, 2013). 3.1.2 TPM 2.0 Authorization The implementation of TPM 2.0 on the other hand, takes a couple different approaches by introducing enhanced authorization (EA). EA takes methods from the TPM 1.2 authorization methods and improves upon them by incorporating features mentioned in Table 1 below. Table 1. TPM 2.0 Authorization Feature Description Passwords in the clear Reduces overhead in environments where the security of hash message authentication (HMAC) may not be feasible due to its extra cost and complexity HMAC key In some cases when the software talking to the TPM is trusted but the OS is untrusted (like in a remote system), it could be useful to use HMAC for authorization the same way as used in TPM 1.2 Signature methods Allows IT employees to perform maintenance on a TPM by authenticating using a smart card or additional data such as a biometric fingerprint or GPS location. This ensures that passwords cant be shared or compromised by unauthorized users and that an additional verification check is conducted PCR values as a proxy for system boot state If the system management module software has been compromised, this prevents the release of the full-disk encryption key Locality as a proxy for command origins Can be used to indicate whether a command originated from the CPU in response to a special request. Time Can limit the use of a key to certain times of the day Internal counter values Limits the use of an object so that a key can only be used a certain number of times indicated by an internal counter Value in a non-volatile (NV) index Use of a key is restricted to when certain bits are set to 1 or 0 NV index Authorization is based on whether the NV index has been written Physical presence Requires proof that the user is physically in possession of the platform (Table created with information from (Arthur, Challener, Goldman, 2015)) These features can be combined to create more complex policies by using the logical operators AND or OR which allows for the creation of policies to include multifactor/multiuser authentication of resources, limited time constraints for resources, and/or revocation of resources. (Arthur, Challener, Goldman, 2015). 3.2TPM Vulnerabilities When ranked against other standards, TPM comes in as highly secure but that isnt to say that it is immune to all attacks. There are several vulnerabilities that can allow an attacker to circumvent TPMs level of security. The sections below explain a few vulnerabilities that attackers can use to exploit TPM, and the mitigation techniques one could deploy to manage the risk. Dictionary Attack TPM authorization relies on a 20-byte authorization code that is sent by the requestor which if not properly locked down can result in an attacker guessing their way past the authorization. TPM issues guidance on how best to mitigate and prevent these attacks; however, the guidance is not very detailed and rather leaves the specifics up to the implementer. For example, one could implement a design that has TPM disable further input whenever it encounters more than 3 failed attempts. This would effectively prevent online dictionary attacks and has the added benefit of also preventing Denial-of-Service attacks. Weve spoken about preventing online dictionary attacks but where the threat truly comes into play is with an offline-based attack. This vulnerability comes into play when the authorization code is easily guessable, or in other words, poorly implemented. An attacker could observe a given command, the associated Key-Hash Message Authentication Code (HMAC) sent by the requestor and finally, the TPM response back. Since the HMAC is created from the authorization code, session handle and nonces; an attacker can utilize a dictionary attack to try different nonces and authorization codes with the given HMAC algorithm. A match would then provide the attacker with the correct authorization code. This offline attack bypasses TPMs lockout policy and though the attacker but sift through the random nonces and authorization codes, the method is a viable means of attack because it can be reasonably executed given the availability of time and computing resources. The mitigation for this comes down t o proper configuration and ensuring that the authorization code is not easily guessable. DRAM Attack Though this attack is not directly against TPM, it is worth mentioning as it is a viable way to circumvent TPMs security authorization protocols. TPM maintains its keys within non-volatile memory within the TPM component; however, when these keys are pulled by a requestor or requesting application, they are stored within Dynamic Random Access Memory (DRAM). It is well known that one can easily exploit DRAM to extract valuable information (keys, passcodes, etc) with this even being demonstrated against Microsofts BitLocker encryption utility. During reboot, Windows would load the encryption keys stored within TPM into DRAM, prior to even prompting the user. Given this, an attacker could go in and dump the raw memory to an external device, obtain the keys, then utilize those keys to decrypt the disk. This flaw enabled attackers to gain access to data on stolen laptops, even with full disk encryption. This hits on how a system is designed and ensuring that every detail is accounted for. Even if your system has a TPM, it is only going to be as secure as the weakest component within the overall system. OIAP Replay Attack Replay attacks are a method used by many attackers across a multitude of systems. TPM is no exception and is vulnerable to replay attacks based on several characteristics. First, a TPM Object-Independent Authorization Protocol (OIAP) session can be left open for an indefinite period. The authorized session is only closed by the requestor whenever an abnormal message is received and finally, the HMAC that wraps the message can detect alterations to the message but cannot distinguish between a deliberate alteration and a simple network error. For example, an attacker would first capture a requestors authorized command for later use. The attacker then sends an abnormal message to the requestor which then fools it into resetting the session. The requestor is unable to distinguish between the abnormal message and a network error so no concern is raised. Since there is no concern, the TPM keeps the authorized session open, allowing the attacker the ability to replay the previously captured command through the open session. This could lead to the attacker being able to corrupt or even overwrite a subsequent command issued by the requestor. The TPM would not be able to notice this type of attack which is truly concerning based upon the foundational principles of TPM and its assurance of being able to detect unauthorized modifications to data. 3.3TPM Attestations Attestation is the method a platform uses to prove to another platform that it is in a particular configuration by using a digitally signed set of cryptographic hash values which creates a trust between platforms (Fisher, McCune, Andrews, 2011). The network server first creates a cryptographic random value (used to prevent replay attacks) called a nonce, which is then sent to the client. Software on the client then sends the nonce to the TPM and specifies an identity key. The TPM hashes the PCR values along with the nonce and then signs the hash with a private key. The client software sends this back to the server which then verifies the platform configuration by comparing the public portion of the identity key. This process provides hardware-based assurance that software on these platforms has not been modified. (Osborn Chaneller, 2013). Figure 5 provides a visual representation of attestation as provided by (Osborn Chaneller, 2013) Figure 5: Attestation In order for the attestation process to be valid however, it must be able to be proven that the TPM values from the client are not being spoofed. This can be accomplished using a couple of key components: attestation identity keys (AIK), which are created by the TPM and securely stored on disk before being reloaded into volatile TPM memory; endorsement keys (EK), which are hardcoded by the manufacturer into the TPM chip; and a privacy certificate authority (CA), which is a third-party validation entity. The first step of this process occurs when the public half of the AIK and EK is sent to the CA. The CA then uses the public EK certificate to verify that the request comes from a valid TPM by comparing it to a list of all valid TPM manufacturers public keys. The CA then puts the public AIK in a certificate and encrypts it with the public EK. This ensures that the only party that can decrypt it is the computer with the AIK of the corresponding TPM, thus confirming that the TPM from the requesting platform is trusted, and therefore, the attestation method is trusted as well. (Uppal Brandon, 2011). 3.4Application of TPM With the ever-evolving landscape of technology, there is an increased need for faster, more reliable and more secure methods of protecting private and personal data. TPM is a product of those evolving requirements and has thus been incorporated into many different sets of applications. This section will expand upon those sets of applications and delve into how TPM is utilized within the industry today. Encryption One of the most popular uses of TPM is to ensure the confidentiality of user data by providing full encryption capabilities for disks and file systems. The full disk encryption utilizes symmetric encryption with a key created from the users supplied passcode and used during the initial configuration and system boot. This protects against the loss of the disk drive and serves to facilitate disposal or repurposing of the drive since deleting the keys will result in the drive being wiped. The same method is utilized for the encryption of file systems and can be done so to protect specific nodes. Policy Enforcement With Bring-Your-Own-Device (BYOD) policies becoming more and more prevalent within the commercial businesses, TPM has found a use as a policy enforcement mechanism for remote access. TPM can be used to establish trust and verify a devices integrity before allowing remote connection to an organizations intranet. This utilization of TPM is comprised of a series of hashes that measure the predefined sequence of code loads, starting with the boot of the BIOS through the loading of the applications. The chain of hash measures are then compared to the stored value in order to validate the systems integrity. This is very useful for establishing the base operating environment and developing a baseline with which access control policies can be developed. Password Protection TPM protected storage provides a method of storing encryption/decryption keys as well as providing utility management of user passwords. Typically, the password manager retrieves the then encrypted password from TPM, decrypts it, and then sends it to the client application for validation. Since the passwords are usually sent to the client applications over plain-text, this is a serious vulnerability in which TPM can provide a solution for. Using the 20-byte authorization code, a TPM object is created for each user password with this then being saved in the objects authorization field. To verify a password, an application would need to send an OIAP request to access the TPM object. TPMs response to this request would indicated whether the password was correct or not. As a plus, this serves as both password storage and verification with the password never being sent to the application thus eliminating the vulnerability associated with plain-text. 3.5TPM Future TPM is compatible with many hardware and software platforms in use in todays commercial markets and is already in use by several major business functions, to include: Banking, E-Commerce, Biometrics and even Antivirus applications. Looking forward, TPM will play an even bigger role in the evolving mobile market, providing more enhanced security for cell phones, GPS tracking systems, tablets and more. TPM can be used to secure the Mobile Operating System (OS) from being modified by attackers and can be used to further secure authorized access by implementing a hard-coded digital signature solution. For GPS devices, TPM can be used to protect against the modification of system defined location parameters, thus preventing an attacker from adjusting those parameters to satisfy their ends. The biggest constraint facing TPMs implementation within the mobile realm is the space and power constraints on mobile devices. Research is being done on whether a mobile instantiation of TPM should be based on firmware, software or even hardware. A hardware implementation would be the most secure; however, the firmware-based option will likely prove to be the best approach as it will balance the security of the device with the size limitations. TPM is also being looked at with regards to providing security enhancements for cloud-based services. Cloud computing has migrated most of the standard desktop to a virtual and remotely

Thursday, October 24, 2019

Essay --

Pendidikan yang sedia ada ini juga tidak hanya terhad kepada pembelajaran kurikulum di sekolah sahaja. Ia juga merupakan sebahagian daripada konsep pembelajaran sepanjang hayat atau lifelong learning bukanlah merupakan suatu konsep yang baru sama ada di dalam sistem pendidikan negara malah di peringkat antarabangsa juga. Konsep pembelajaran sepanjang hayat ini sangat luas pengertiannya kerana ia bukan sahaja terhad kepada para pelajar yang sedang menuntut di sekolah, malah ia juga melibatkan kanak-kanak kecil sehinggalah kepada mereka yang sudah tua. Secara tidak langsung, konsep ini merujuk kepada pendemokrasian pendidikan yang merangkumi program meningkatkan pengetahuan, kemahiran dan kompetensi sama ada ia dilakukan secara formal ataupun secara tidak formal berdasarkan pengalaman dan latihan yang telah dibekalkan oleh pihak pengurusan sekolah kepada para pelajarnya. Setiap individu haruslah menanam sifat suka dalam mereka agar rajin dalam meneroka ilmu pengetahuan secara berterusan tanpa mengira masa, tempat dan keadaan. Sidang dewan yang berwawasan, wacana saya yang seterusnya masih berkisar dengan kecemerlangan dalam pendidikan. Kita tahu betapa pentingnya penyediaan pendidikan bertaraf dunia kerana jika sistem pendidikan kita setaraf dengan dengan insitusi-institusi pendidikan di negara-negara maju di seluruh ini, penghasilan modal insan dan peratus kecemerlangan pelajar di seluruh negara dapat ditingkatkan. Oleh itu, sektor industri pendidikan negara hendaklah melakukan perubahan dan pembaharuan secara dinamis. Matlamat untuk menjadikan Malaysia sebagai salah satu pusat kecemerlangan pendidikan (centre of academics excellence) di Rantau Asia dan juga di peringkat anatarabangsa pada abad 21 ini nanti akan memerlukan negar... ...unyai muhasabah diri, mereka mampu mencipta nama dan berjaya di peringkat global. Tuan-tuan dan puan-puan yang dihormati sekalian, Sedarkah anda bahawa percubaan dan uji kaji ribuan kali telah dilakukan oleh Thomas Adison untuk mencipta lampu yang dapat kita nikmati faedahnya sehingga ke hari ini? Tahukah anda bahawa Colonel Sandera telah bersusah payah siang dan malam untuk mencipta resepi rahsia KFC nya sehingga semua kita yang pada hari ini menjamahnya sehingga menjilat jari? Sikap sebeginilah yang wajar diambilkan sebagai contoh dan panduan sekiranya kita ingin betul-betul cemerlang dalam akademik bahkan kehidupan kita seharian. Antara rahsia kejayaan orang-orang yang hebat ini ialah kepatuhan kepada disiplin. Lihatlah wahai dunia bahawa orang-orang yang berdisiplin ini yang akan menggoncang dunia! Bak kata pepatah, â€Å"siapa yang menuai, dia akan dapat hasilnya†.

Wednesday, October 23, 2019

Ulrich Beck

Sociology http://soc. sagepub. com Beck's Sociology of Risk: A Critical Assessment Anthony Elliott Sociology 2002; 36; 293 DOI: 10. 1177/0038038502036002004 The online version of this article can be found at: http://soc. sagepub. com/cgi/content/abstract/36/2/293 Published by: http://www. sagepublications. com On behalf of: British Sociological Association Additional services and information for Sociology can be found at: Email Alerts: http://soc. sagepub. com/cgi/alerts Subscriptions: http://soc. sagepub. com/subscriptions Reprints: http://www. agepub. com/journalsReprints. nav Permissions: http://www. sagepub. com/journalsPermissions. nav Citations (this article cites 6 articles hosted on the SAGE Journals Online and HighWire Press platforms): http://soc. sagepub. com/cgi/content/refs/36/2/293 Downloaded from http://soc. sagepub. com by Madhu Menon on September 24, 2007  © 2002 BSA Publications Ltd.. All rights reserved. Not for commercial use or unauthorized distribution. 022761 Elliott 13/5/2002 9:49 am Page 293 Risk Society Sociology Copyright  © 2002 BSA Publications Ltd ®Volume 36(2): 293–315 [0038-0385(200205)36:2;293–315;022761] SAGE Publications London,Thousand Oaks, New Delhi Beck’s Sociology of Risk: A Critical Assessment s Anthony Elliott University of the West of England AB ST RAC T The German sociologist Ulrich Beck has elaborated a highly original formulation of the theory of risk and re? exive modernization, a formulation that has had a signi? cant impact upon recent sociological theorizing and research. This article examines Beck’s sociology of risk in the context of his broader social theory of re? xivity, advanced modernization and individualization. The article argues that Beck’s work is constrained by several sociological weaknesses: namely, a dependence upon objectivistic and instrumental models of the social construction of risk and uncertainty in social relations, and a failure to adequately de? ne the relations between institutional dynamism on the one hand and self-referentiality and critical re? ection on the other. As a contribution to the reformulation and further development of Beck’s approach to sociological theory, the article seeks to uggest other ways in which the link between risk and re? exivity might be pursued. These include a focus upon (1) the intermixing of re? exivity and re? ection in social relations; (2) contemporary ideologies of domination and power; and (3) a dialectical notion of modernity and postmodernization. K E Y WORDS domination / modernity / postmodernity / re? exivity / risk / social theory A s competent re? ective agents, we are aware of the many ways in which a generalized ‘climate of risk’ presses in on our daily activities.In our dayto-day lives, we are sensitive to the cluster of risks that affect our relations with the self, with others, and with the broader culture. We are specialists in carving out ways of coping and managing risk, whether this be through active engagement, resigned acceptance or confused denial. From dietary concerns to 293 Downloaded from http://soc. sagepub. com by Madhu Menon on September 24, 2007  © 2002 BSA Publications Ltd.. All rights reserved. Not for commercial use or unauthorized distribution. 022761 Elliott 294 13/5/2002 Sociology 9:49 am Volume 36 s Page 294 Number 2 sMay 2002 prospective stock market gains and losses to polluted air, the contemporary risk climate is one of proliferation, multiplication, specialism, counterfactual guesswork, and, above all, anxiety. Adequate consideration and calculation of risktaking, risk-management and risk-detection can never be fully complete, however, since there are always unforeseen and unintended aspects of risk environments. This is especially true at the level of global hazards, where the array of industrial, technological, chemical and nuclear dangers that confront us grows, and at an alarming rate.Indeed the Germa n sociologist, Ulrich Beck (1996a), de? nes the current situation as that of ‘world risk society’. The rise of risk society, Beck argues, is bound up with the new electronic global economy – a world in which we live on the edge of high technological innovation and scienti? c development, but where no one fully understands the possible global risks and dangers we face. My aim in this article is to explore some of the issues that concern the relation between risk and society by focusing on the work of Beck.A profoundly innovative and imaginative social theorist, Beck has developed powerful analyses of the ways in which the rise of the risk society is transforming social reproduction, nature and ecology, intimate relationships, politics and democracy. 1 It is necessary to state at the outset that I am not seeking in this article to provide a general introduction to Beck’s work as a whole. Rather, I shall offer a short exposition of Beck’s risk society thesis, in conjunction with his analysis of re? exivity and its role in social practices and modern institutions. The econd, more extensive half of the article is then critical and reconstructive in character. I try to identify several questionable social-theoretic assumptions contained in Beck’s risk society thesis, as well as limitations concerning his analysis of re? exivity, social reproduction and the dynamics of modernity. In making this critique, I shall try to point, in a limited and provisional manner, to some of the ways in which I believe that the themes of risk and social re? exivity can be reformulated and, in turn, further developed in contemporary sociological analysis.Outline of the Theory Let me begin by outlining the central planks of Beck’s social theory. These can be divided into three major themes: (1) the risk society thesis; (2) re? exive modernization; and (3) individualization. The Risk Society Thesis From his highly in? uential 1986 volume Ris k Society through to Democracy without Enemies (1998) and World Risk Society (1999b), Beck has consistently argued that the notion of risk is becoming increasingly central to our global society. 2 As Beck (1991: 22–3) writes: Downloaded from http://soc. agepub. com by Madhu Menon on September 24, 2007  © 2002 BSA Publications Ltd.. All rights reserved. Not for commercial use or unauthorized distribution. 022761 Elliott 13/5/2002 9:49 am Page 295 Beck’s sociology of risk Elliott [T]he historically unprecedented possibility, brought about by our own decisions, of the destruction of all life on this planet †¦ distinguishes our epoch not only from the early phase of the Industrial Revolution but also from all other cultures and social forms, no matter how diverse and contradictory.If a ? re breaks out, the ? re brigade comes; if a traf? c accident occurs, the insurance pays. This interplay between before and after, between security in the here-and-now and security i n the future because one took precautions even for the worst imaginable case, has been revoked in the age of nuclear, chemical and genetic technology. In their brilliant perfection, nuclear power plants have suspended the principle of insurance not only in the economic but also in the medical, psychological, cultural, and religious sense.The ‘residual risk society’ is an uninsured society, in which protection, paradoxically, decreases as the threat increases. For Beck, modernity is a world that introduces global risk parameters that previous generations have not had to face. Precisely because of the failure of modern social institutions to control the risks they have created, such as the ecological crisis, risk rebounds as a largely defensive attempt to avoid new problems and dangers. Beck contends that it is necessary to separate the notion of risk from hazard or danger.The hazards of pre-industrial society – famines, plagues, natural disasters – may or m ay not come close to the destructive potential of technoscience in the contemporary era. Yet for Beck this really is not a key consideration in any event, since he does not wish to suggest that daily life in today’s risk society is intrinsically more hazardous than in the pre-modern world. What he does suggest, however, is that no notion of risk is to be found in traditional culture: pre-industrial hazards or dangers, no matter how potentially catastrophic, were experienced as pre-given.They came from some ‘other’ – gods, nature or demons. With the beginning of societal attempts to control, and particularly with the idea of steering towards a future of predictable security, the consequences of risk become a political issue. This last point is crucial. It is societal intervention – in the form of decision-making – that transforms incalculable hazards into calculable risks. ‘Risks’, writes Beck (1997: 30), ‘always depend on d ecisions – that is, they presuppose decisions’.The idea of ‘risk society’ is thus bound up with the development of instrumental rational control, which the process of modernization promotes in all spheres of life – from individual risk of accidents and illnesses to export risks and risks of war. In support of the contention that protection from danger decreases as the threat increases in the contemporary era, Beck (1994) discusses, among many other examples, the case of a lead crystal factory in the former Federal Republic of Germany. The factory in question – Altenstadt in the Upper Palatinate – was prosecuted in the 1980s for polluting the atmosphere.Many residents in the area had, for some considerable time, suffered from skin rashes, nausea and headaches, and blame was squarely attributed to the white dust emitted from the factory’s smokestacks. Due to the visibility of the pollution, the case for damages against the factory was imagined, by many people, to be watertight. Downloaded from http://soc. sagepub. com by Madhu Menon on September 24, 2007  © 2002 BSA Publications Ltd.. All rights reserved. Not for commercial use or unauthorized distribution. 295 022761 Elliott 296 13/5/2002 Sociology 9:49 am Volume 36 s Page 296Number 2 s May 2002 However, because there were three other glass factories in the area, the presiding judge offered to drop the charges in return for a nominal ? ne, on the grounds that individual liability for emitting dangerous pollutants and toxins could not be established. ‘Welcome to the real-life travesty of the hazard technocracy! ’ writes Beck, underlining the denial of risks within our cultural and political structures. Such denial for Beck is deeply layered within institutions, and he calls this ‘organized irresponsibility’ – a concept to which we will return.The age of nuclear, chemical and genetic technology, according to Beck, unleashes a destruction of the calculus of risks by which modern societies have developed a consensus on progress. Insurance has been the key to sustaining this consensus, functioning as a kind of security pact against industrially produced dangers and hazards. 3 In particular, two kinds of insurance are associated with modernization: the private insurance company and public insurance, linked above all with the welfare state.Yet the changing nature of risk in an age of globalization, argues Beck, fractures the calculating of risks for purposes of insurance. Individually and collectively, we do not fully know or understand many of the risks that we currently face, let alone can we attempt to calculate them accurately in terms of probability, compensation and accountability. In this connection, Beck emphasizes the following: s s s s risks today threaten irreparable global damage which cannot be limited, and hus the notion of monetary compensation is rendered obsolescent; in the case of the wors t possible nuclear or chemical accident, any security monitoring of damages fails; accidents, now reconstituted as ‘events’ without beginning or end, break apart delimitations in space and time; notions of accountability collapse. Re? exive Modernization Beck develops his critique of modernity through an examination of the presuppositions of the sociology of modernization. Many mainstream sociological theories remain marked, in his view, by a confusion of modernity with industrial society – seen in either positive or negative terms.This is true for functionalists and Marxists alike, especially in terms of their preoccupation with industrial achievement, adaptation, differentiation and rationalization. Indeed, Beck ? nds an ideology of progress concealed within dominant social theories that equate modernization with linear rationalization. From Marx through Parsons to Luhmann, modern society is constantly changing, expanding and transforming itself; it is clear th at industrialism results in the using up of resources that are essential to the reproduction of society.But the most striking limitation of social theories that equate modernity with industrial society, according to Beck, lies in their lack of comprehension of the manner in which dangers to societal preservation and renewal in? ltrate the institutions, organizations and subsystems of modern society itself. Downloaded from http://soc. sagepub. com by Madhu Menon on September 24, 2007  © 2002 BSA Publications Ltd.. All rights reserved. Not for commercial use or unauthorized distribution. 022761 Elliott 13/5/2002 :49 am Page 297 Beck’s sociology of risk Elliott In contrast to this grand consensus on modernization, Beck argues that we are between industrial society and advanced modernity, between simple modernization and re? exive modernization. As Beck (1996b: 28) develops these distinctions: In view of these two stages and their sequence, the concept of ‘re? exive moder nization’ may be introduced. This precisely does not mean re? ection (as the adjective ‘re? exive’ seems to suggest), but above all self-confrontation.The transition from the industrial to the risk epoch of modernity occurs unintentionally, unseen, compulsively, in the course of a dynamic of modernization which has made itself autonomous, on the pattern of latent side-effects. One can almost say that the constellations of risk society are created because the self-evident truths of industrial society (the consensus on progress, the abstraction from ecological consequences and hazards) dominate the thinking and behaviour of human beings and institutions. Risk society is not an option which could be chosen or rejected in the course of political debate.It arises through the automatic operation of autonomous modernization processes which are blind and deaf to consequences and dangers. In total, and latently, these produce hazards which call into question – inde ed abolish – the basis of industrial society. It is the autonomous, compulsive dynamic of advanced or re? exive modernization that, according to Beck, propels modern men and women into ‘self-confrontation’ with the consequences of risk that cannot adequately be addressed, measured, controlled or overcome, at least according to the standards of industrial society.Modernity’s blindness to the risks and dangers produced by modernization – all of which happens automatically and unre? ectingly, according to Beck – leads to societal self-confrontation: that is, the questioning of divisions between centres of political activity and the decision-making capacity of society itself. Society, in effect, seeks to reclaim ‘the political’ from its modernist relegation to the institutional sphere, and this, says Beck, is achieved primarily through sub-political means – that is, locating the politics of risk at the heart of forms of social and cultural life. Within the horizon of the opposition between old routine and new awareness of consequences and dangers’, writes Beck, ‘society becomes self-critical’ (1999b: 81). The prospects for arresting the dark sides of industrial progress and advanced modernization through re? exivity are routinely short-circuited, according to Beck, by the insidious in? uence of ‘organized irresponsibility’. Irresponsibility, as Beck uses the term, refers to a political contradiction of the self-jeopardization and self-endangerment of risk society.This is a contradiction between an emerging public awareness of risks produced by and within the social-institutional system on the one hand, and the lack of attribution of systemic risks to this system on the other. There is, in Beck’s reckoning, a constant denial of the suicidal tendency of risk society – ‘the system of organized irresponsibility’ – which manifests itself in, s ay, technically orientated legal procedures designed to satisfy rigorous causal proof of individual liability and guilt. This self-created dead end, in which culpability is passed off on to individualsDownloaded from http://soc. sagepub. com by Madhu Menon on September 24, 2007  © 2002 BSA Publications Ltd.. All rights reserved. Not for commercial use or unauthorized distribution. 297 022761 Elliott 298 13/5/2002 Sociology 9:49 am Volume 36 s Page 298 Number 2 s May 2002 and thus collectively denied, is maintained through political ideologies of industrial fatalism: faith in progress, dependence on rationality and the rule of expert opinion. Individualization The arrival of advanced modernization is not wholly about risk; it is also about an expansion of choice.For if risks are an attempt to make the incalculable calculable, then risk-monitoring presupposes agency, choice, calculation and responsibility. In the process of re? exive modernization, Beck argues, more and more areas o f life are released or disembedded from the hold of tradition. That is to say, people living in the modernized societies of today develop an increasing engagement with both the intimate and more public aspects of their lives, aspects that were previously governed by tradition or taken-forgranted norms.This set of developments is what Beck calls ‘individualization’, and its operation is governed by a dialectic of disintegration and reinvention. For example, the disappearance of tradition and the disintegration of previously existing social forms – ? xed gender roles, in? exible class locations, masculinist work models – forces people into making decisions about their own lives and future courses of action.As traditional ways of doing things become problematic, people must choose paths for a more rewarding life – all of which requires planning and rationalization, deliberation and engagement. An active engagement with the self, with the body, with rel ationships and marriage, with gender norms, and with work: this is the subjective backdrop of the risk society. The idea of individualization is the basis upon which Beck constructs his vision of a ‘new modernity’, of novel personal experimentation and cultural innovation against a social backdrop of risks, dangers, hazards, re? xivity, globalization. Yet the unleashing of experimentation and choice which individualization brings is certainly not without its problems. According to Beck, there are progressive and regressive elements to individualization; although, in analytical terms, these are extremely hard to disentangle. In personal terms, the gains of today’s individualization might be tomorrow’s limitation, as advantage and progress turn into their opposite. A signal example of this is offered in The Normal Chaos of Love (1995), where Beck and Beck-Gernsheim re? ct on the role of technological innovation in medicine, and of how this impacts upon conte mporary family life. Technological advancements in diagnostic and genetic testing on the unborn, they argue, create new parental possibilities, primarily in the realm of health monitoring. However, the very capacity for medical intervention is one that quickly turns into an obligation on parents to use such technologies in order to secure a sound genetic starting point for their offspring.Individualization is seen here as a paradoxical compulsion, at once leading people into a much more engaged relationship with science and technology than used to be the case, and enforcing a set of obligations and responsibilities that few in society have thought through in terms of broad Downloaded from http://soc. sagepub. com by Madhu Menon on September 24, 2007  © 2002 BSA Publications Ltd.. All rights reserved. Not for commercial use or unauthorized distribution. 022761 Elliott 13/5/2002 9:49 am Page 299 Beck’s sociology of risk Elliott moral and ethical implications.It is perhaps lit tle wonder therefore that Beck (1997: 96), echoing Sartre, contends that ‘people are condemned to individualization’. Critique Beck has elaborated a highly original formulation of the theory of risk, a formulation which links with, but in many ways is more sophisticated in its detail and application than, other sociological approaches to the analysis of risk environments in contemporary society (among other contributions, see Douglas and Wildavsky (1982), Castell (1991), Giddens (1990, 1991), Luhmann (1993) and Adam (1998)).Beck’s sociology of risk has clearly been of increasing interest to sociologists concerned with understanding the complex temporal and spatial ? gurations of invisible hazards and dangers including global warming, chemical and petrochemical pollution, the effects of genetically modi? ed organisms and culturally induced diseases such as Bovine Spongiform Encephalopathy (BSE) (see Lash et al. , 1996; Adam, 1998). In what follows, there are three core areas around which I shall develop a critique of the work of Beck: (1) risk, re? xivity, re? ection; (2) power and domination; and (3) tradition, modernity and postmodernization. Risk, Re? exivity, Re? ection Let me begin with Beck’s discussion of the ‘risk society’, which, according to him, currently dominates socio-political frames thanks to the twin forces of re? exivity and globalization. There are, I believe, many respects in which Beck’s vision of Risikogesellschaft, especially its rebounding in personal experience as risk-laden discourses and practices, is to be welcomed.In the wake of the Chernobyl disaster and widespread environmental pollution, and with ever more destructive weapons as well as human-made biological, chemical and technological hazards, it is surely the case that thinking in terms of risk has become central to the way in which human agents and modern institutions organize the social world. Indeed, in a world that could litera lly destroy itself, risk-managing and risk-monitoring increasingly in? uences both the constitution and calculation of social action.As mentioned previously, it is this focus on the concrete, objective physical-biological-technical risk settings of modernity which recommends Beck’s analysis as a useful corrective to the often obsessive abstraction and textual deconstruction that characterizes much recent social theory. However, one still might wonder whether Beck’s theory does not overemphasize, in a certain sense, the phenomena and relevance of risk. From a social-historical perspective it is plausible to ask, for instance, whether life in society has become more risky? In ‘From Regulation to Risk’, Bryan S. Turner (1994: 180–1) captures the problem well:Downloaded from http://soc. sagepub. com by Madhu Menon on September 24, 2007  © 2002 BSA Publications Ltd.. All rights reserved. Not for commercial use or unauthorized distribution. 299 022761 E lliott 300 13/5/2002 Sociology 9:49 am Volume 36 s Page 300 Number 2 s May 2002 [A] serious criticism of Beck’s arguments would be to suggest that risk has not changed so profoundly and signi? cantly over the last three centuries. For example, were the epidemics of syphilis and bubonic plague in earlier periods any different from the modern environment illnesses to which Beck draws our attention?That is, do Beck’s criteria of risk, such as their impersonal and unobservable nature, really stand up to historical scrutiny? The devastating plagues of earlier centuries were certainly global, democratic and general. Peasants and aristocrats died equally horrible deaths. In addition, with the spread of capitalist colonialism, it is clearly the case that in previous centuries many aboriginal peoples such as those of North America and Australia were engulfed by environmental, medical and political catastrophes which wiped out entire populations.If we take a broader view of the notion of risk as entailing at least a strong cultural element whereby risk is seen to be a necessary part of the human condition, then we could argue that the profound uncertainties about life, which occasionally overwhelmed earlier civilizations, were not unlike the anxieties of our own ? n-de-siecle civilizations. Extending Turner’s critique, it might also be asked whether risk assessment is the ultimate worry in the plight of individuals in contemporary culture?Is it right to see the means-ended rationality of risk, and thus the economistic language of preference, assessment and choice, as spreading into personal and intimate spheres of life (such as marriage, friendship and child-rearing) in such a determinate and uni? ed way? And does the concept of risk actually capture what is new and different in the contemporary social condition? I shall not pursue these general questions, important though they are, here. Instead, the issue I want to raise concerns the multiple ways in which risk is perceived, approached, engaged with or disengaged from, in contemporary culture.Beck’s approach, however suggestive it may be, is at best a signpost which points to speci? c kinds of probabilities, avoidances and unanticipated consequences, but which is limited in its grasp of the social structuring of the perception of risk. The American social theorist Jeffrey C. Alexander (1996: 135) has argued that Beck’s ‘unproblematic understanding of the perception of risk is utilitarian and objectivist’. Alexander takes Beck to task for adopting a rationalistic and instrumental-calculative model of risk in microsocial and macrosocial worlds; to which it can be added that such a model has deep af? ities with neo-classical economics and rational-choice theory, and thus necessarily shares the conceptual and political limitations of these standpoints also. Beck has also been criticized by others for his cognitive realism, moral proceduralism and lack of attention to aesthetic and hermeneutical subjectivity (Lash and Urry, 1994); failure to acknowledge the embodied nature of the self (Turner, 1994; Petersen, 1996); and neglect of the psychodynamic and affective dimensions of subjectivity and intersubjective relations (Elliott, 1996; Hollway and Jefferson, 1997).In a social-theoretical frame of reference, what these criticisms imply is that Beck’s theory cannot grasp the hermeneutical, aesthetic, psychological and culturally bounded forms of subjectivity and intersubjectivity in and through Downloaded from http://soc. sagepub. com by Madhu Menon on September 24, 2007  © 2002 BSA Publications Ltd.. All rights reserved. Not for commercial use or unauthorized distribution. 022761 Elliott 13/5/2002 9:50 am Page 301 Beck’s sociology of risk Elliott which risk is constructed and perceived.To study risk-management and riskavoidance strategies, in the light of these criticisms, requires attention to forms of meaning-making within socio-symbolically inscribed institutional ? elds, a problem to which I return in a subsequent section when looking at Beck’s analysis of tradition, modernity and postmodernity. In raising the issue of the construction and reconstruction of risk – in particular, its active interpretation and reconstruction – one might reference numerous studies of socio-political attitudes relating to the conceptualization and confrontation of risk, danger and hazard.The anthropologist Mary Douglas (1986, 1992), for example, argues that advanced industrial risks are primarily constructed through the rhetoric of purity and pollution. For Douglas, what is most pressing in the social-theoretic analysis of risk is an understanding of how human agents ignore many of the potential threats of daily life and instead concentrate only on selected aspects. Interestingly, Beck fails to discuss in any detail Douglas’s anthropology of risk. This would seem peculiar not only sin ce Douglas’s path-breaking analyses of risk appear to have laid much of the thematic groundwork for Beck’s sociological theory, but also because her work is highly relevant to the critique of contemporary ideologies of risk – that is, the social forms in which risk and uncertainty are differentiated across and within social formations, as well as peculiarly individuated. My purpose in underscoring these various limitations of Beck’s theory is not to engage in some exercise of conceptual clari? cation.My concern rather is to stress the sociologically questionable assumptions concerning risk in Beck’s work, and to tease out the more complex, nuanced forms of risk perception that might fall within the scope of such an approach. To call into question Beck’s notion of risk is, of course, also to raise important issues about the location of re? exivity between self and societal reproduction. Now it is the failure of simple, industrial society to c ontrol the risks it has created, which, for Beck, generates a more intensive and extensive sense of risk in re? xive, advanced modernity. In this sense, the rise of objective, physical, global risks propels social re? exivity. But again one might wish to question the generalizations Beck makes about human agents, modern institutions and culture becoming more re? exive or self-confronting. Much of Beck’s work has been concerned to emphasize the degree of re? exive institutional dynamism involved in the restructuring of personal, social and political life, from the reforging of intimate relationships to the reinvention of politics.But there are disturbing dimensions here as well, which the spread of cultural, ethnic, racial and gendered con? ict has shown only too well, and often in ways in which one would be hard pressed to ? nd forms of personal or social re? exive activity. No doubt Beck would deny – as he has done in his more recent writings – that the renewal of traditions and the rise of cultural con? icts are counterexamples to the thesis of re? exive modernization. For we need to be particularly careful, Beck contends, not to confuse re? exivity (self-dissolution) with re? ction (knowledge). As Beck (1994b: 176–7) develops this distinction: Downloaded from http://soc. sagepub. com by Madhu Menon on September 24, 2007  © 2002 BSA Publications Ltd.. All rights reserved. Not for commercial use or unauthorized distribution. 301 022761 Elliott 302 13/5/2002 Sociology 9:50 am Volume 36 s Page 302 Number 2 s May 2002 †¦ the ‘re? exivity’ of modernity and modernization in my sense does not mean re? ection on modernity, self-relatedness, the self-referentiality of modernity, nor does it mean the self-justi? ation or self-criticism of modernity in the sense of classical sociology; rather (? rst of all), modernization undercuts modernization, unintended and unseen, and therefore also re? ection-free, with the force of autonomized modernization. †¦ [R]e? exivity of modernity can lead to re? ection on the self-dissolution and self-endangerment of industrial society, but it need not do so. Thus, re? exivity does not imply a kind of hyper-Enlightenment culture, where agents and institutions re? ect on modernity, but rather an unintended self-modi? ation of forms of life driven by the impact of autonomized processes of modernization. Re? exivity, on this account, is de? ned as much by ‘re? ex’ as it is by ‘re? ection’. ‘It is possible to detect’, write Lash et al. (1996) of Beck’s recent sociology, ‘a move towards seeing re? exive modernization as in most part propelled by blind social processes – a shift, crudely, from where risk society produces re? ection which in turn produces re? exivity and critique, to one where risk society automatically produces re? exivity, and then – perhaps – re? ection’.Without wishing t o deny the interest of this radical conception of re? exivity as self-dissolution, it still seems to me that Beck’s contention that contemporary societies are propelled toward self-confrontation, split between re? ex and re? ection, remains dubious. In what sense, for instance, can one claim that re? ection-free forms of societal self-dissolution exist independently of the re? ective capacities of human agents? For what, exactly, is being dissolved, if not the forms of life and social practices through which institutions are structured?How might the analytical terms of re? exivity, that is social re? exes (nonknowledge) and re? ection (knowledge), be reconciled? It may be thought that these dif? culties can be overcome by insisting, along with Beck, on re? exivity in the strong sense – as the unseen, the unwilled, the unintended; in short, institutional dynamism. But such an account of blind social processes is surely incompatible with, and in fact renders incoherent, concepts of re? ection, referentiality, re? exivity.Alternatively, a weaker version of the argument might be developed, one that sees only partial and contextual interactions of selfdissolution and re? ection. Yet such an account, again, would seem to cut the analytical ground from under itself, since there is no adequate basis for showing how practices of re? exivity vary in their complex articulations of re? ex and re? ection or repetition and creativity. Power and Domination I now want to consider Beck’s theory in relation to sociological understandings of power and domination. According to Beck, re? xive modernization combats many of the distinctive characteristics of power, turning set social divisions into active negotiated relationships. Traditional political con? icts, centred around class, race and gender, are increasingly superseded by new, globalized risk con? icts. ‘Risks’, writes Beck (1992: 35), ‘display an equalizing effect’. Everyone Downloaded from http://soc. sagepub. com by Madhu Menon on September 24, 2007  © 2002 BSA Publications Ltd.. All rights reserved. Not for commercial use or unauthorized distribution. 022761 Elliott 13/5/2002 9:50 am Page 303 Beck’s sociology of risk Elliott ow is threatened by risk of global proportions and repercussions; not even the rich and powerful can escape the new dangers and hazards of, say, global warming or nuclear war. And it is from this universalized perspective that Beck argues political power and domination is shedding the skin of its classical forms and reinventing itself in a new global idiom. The problematic nature of Beck’s writings on this reinvention of political power and its role in social life, however, becomes increasingly evident when considering his analysis of social inequalities and cultural divisions.Take, for example, his re? ections on class. Re? exive modernization, says Beck, does not result in the self-destruction of class antagonis ms, but rather in selfmodi? cation. He writes (1997: 26): Re? exive modernization disembeds and re-embeds the cultural prerequisites of social classes with forms of individualization of social inequality. That means †¦ that the disappearance of social classes and the abolition of social inequality no longer coincide. Instead, the blurring of social classes (in perception) runs in tandem with an exacerbation of social inequality, which now does not follow large identi? ble groups in the lifeworld, but is instead fragmented across (life) phases, space and time. The present-day individualizing forces of social inequality, according to Beck, erode class-consciousness (personal dif? culties and grievances no longer culminate into group or collective causes) and also, to some considerable degree, class-in-itself (contemporary social problems are increasingly suffered alone). In short, class as a community of fate or destiny declines steeply. With class solidarities replaced by brittl e and uncertain forms of individual self-management, Beck ? ds evidence for a ‘rule-altering rationalization’ of class relationships in new business and management practices, as well as industrial relations reforms. He contends that new blendings of economics and democracy are discernible in the rise of political civil rights within the workplace, a blend which opens the possibility of a post-capitalistic world – a ‘classless capitalism of capital’, in which ‘the antagonism between labour and capital will collapse’. There is considerable plausibility in the suggestion that class patterns and divisions have been altered by rapid social and political changes in recent years.These include changes in employment and the occupational structure, the expansion of the service industries, rising unemployment, lower retirement ages, as well as a growing individualization in the West together with an accompanying stress upon lifestyle, consumption a nd choice. However, while it might be the case that developments associated with re? exive modernization and the risk society are affecting social inequalities, it is surely implausible to suggest, as Beck does, that this involves the trans? guration of class as such. Why, as Scott Lash (Beck et al. , 1994: 211) asks, do we ? nd re? xivity in some sectors of socio-economic life and not others? Against the backdrop of new communication technologies and advances in knowledge transfer, vast gaps in the sociocultural conditions of the wealthy and the poor drastically affect the ways in which individuals are drawn into the project of re? exive modernization. These Downloaded from http://soc. sagepub. com by Madhu Menon on September 24, 2007  © 2002 BSA Publications Ltd.. All rights reserved. Not for commercial use or unauthorized distribution. 303 022761 Elliott 304 13/5/2002 Sociology 9:50 am Volume 36 s Page 304 Number 2 s May 2002 ensions are especially evident today in new social d ivisions between the ‘information rich’ and ‘information poor’, and of the forces and demands of such symbolic participation within the public sphere. What Beck fails to adequately consider is that individualization (while undoubtedly facilitating unprecedented forms of personal and social experimentation) may directly contribute to, and advance the proliferation of, class inequalities and economic exclusions. That is to say, Beck fails to give suf? cient sociological weight to the possibility that individualization may actually embody systematically asymmetrical relations of class power.Taken from a broader view of the ideals of equal opportunity and social progress, Beck’s arguments about the relationship between advanced levels of re? exivity and the emergence of a new sub-politics do not adequately stand up to scrutiny. The general, tendential assertions he advances about business and organizational restructuring assume what needs to be demonstra ted – namely, that these new organizational forms spell the demise of social class, as well as the viability of class analysis. Moreover, it seems implausible to point to ‘subpolitics’, de? ned by Beck only in very general terms, as symptomatic of a new socio-political agenda.When, for example, have the shifting boundaries between the political and economic spheres not played a primary role in the unfolding of relations between labour and capital? Is decision-making and consciousness really focused on a post-capitalistic rationalization of rights, duties, interests and decisions? A good deal of recent research shows, on the contrary, that income inequality between and within nations continues to escalate (Braun, 1991; Lemert, 1997); that class (together with structures of power and domination) continues to profoundly shape possible life chances and material nterests (Westergaard, 1995); and that the many different de? nitions of class as a concept, encompassing t he marginal, the excluded as well as the new underclass or new poor, are important in social analysis for comprehending the persistence of patterns of social inequality (Crompton, 1996). These dif? culties would suggest that Beck’s theory of risk requires reformulation in various ways.Without wishing to deny that the risk-generating propensity of the social system has rapidly increased in recent years due to the impact of globalization and techno-science, it seems to me misleading to contend that social division in multinational capitalist societies is fully trans? gured into a new logic of risk, as if the latter disconnects the former from its institutionalized biases and processes. The more urgent theoretical task, I suggest, is to develop methods of analysis for explicating how patterns of power and domination feed into, and are reconstituted by, the socio-symbolic structuring of risk.Here I shall restrict myself to noting three interrelated forces, which indicate, in a ge neral way, the contours of how a politics of risk is undergoing transformation. The ? rst development is that of the privatization of risk. Underpinned by new trans-national spatializations of economic relations as well as the deregulation of the government of political life (Giddens, 1990; Hirst and Thompson, 1996; Bauman, 1998), the individual is increasingly viewed today as an active Downloaded from http://soc. sagepub. om by Madhu Menon on September 24, 2007  © 2002 BSA Publications Ltd.. All rights reserved. Not for commercial use or unauthorized distribution. 022761 Elliott 13/5/2002 9:50 am Page 305 Beck’s sociology of risk Elliott agent in the risk-monitoring of collectively produced dangers; risk-information, risk-detection and risk-management is more and more constructed and designed as a matter of private responsibility and personal security. By and large, human agents confront socially produced risks individually.Risk is desocialized; risk-exposure and risk-avoi dance is a matter of individual responsibility and navigation. This is, of course, partly what Beck means by the individualization of risk. However, the relations between individualized or privatized risk, material inequalities and the development of global poverty are more systematic and complex than Beck’s theory seems to recognize. In the post-war period, the shift from Keynesian to monetarist economic policies has been a key factor in the erosion of the management of risk through welfare security.The impact of globalization, transnational corporations and governmental deregulation is vital to the social production of the privatization of risk, all of which undoubtedly has a polarizing effect on distributions of wealth and income. It has also become evident – and this is crucial – that one must be able to deploy certain educational resources, symbolic goods, cultural and media capabilities, as well as cognitive and affective aptitudes, in order to count as a ‘player’ in the privatization of risk-detection and risk-management.People who cannot deploy such resources and capabilities, often the result of various material and class inequalities, are likely to ? nd themselves further disadvantaged and marginalized in a new world order of re? exive modernization. The second, related development concerns the commodi? cation of risk. Millions of dollars are made through product development, advertising, and market research in the new industries of risk, which construct new problems and market new solutions for risk-? ghting individual agents. As risk is simultaneously proliferated and rendered potentially manageable’, writes Nikolas Rose (1996: 342), ‘the private market for â€Å"security† extends: not merely personal pension schemes and private health insurance, but burglar alarms, devices that monitor sleeping children, home testing kits for cholesterol levels and much more. Protection against risk through an investment in security becomes part of the responsibilities of each active individual, if they are not to feel guilt at failing to protect themselves and their loved ones against future misfortunes’.In other words, the typical means for insuring against risk today is through market-promoted processes. However the fundamental point here, and this is something that Beck fails to develop in a systematic manner, is that such ‘insurance’ is of a radically imaginary kind (with all the misrecognition and illusion that the Lacanian-Althusserian theorization of the duplicate mirror-structure of ideology implies), given that one cannot really buy one’s way out of the collective dangers that confront us as individuals and societies. How does one, for example, buy a way out from the dangers of global warming?The commodi? cation of risk has become a kind of safe house for myths, fantasies, ? ction and lies. The third development concerns the instrumentalization of iden tities in terms of lifestyle, consumption and choice. Beck touches on this issue through the individualization strand of his argument. Yet because he sees individualiza- Downloaded from http://soc. sagepub. com by Madhu Menon on September 24, 2007  © 2002 BSA Publications Ltd.. All rights reserved. Not for commercial use or unauthorized distribution. 305 022761 Elliott 306 13/5/2002 Sociology 9:50 am Volume 36 s Page 306 Number 2 s May 2002 ion as an active process transforming risk society, he pays almost no attention to the kinds of affective ‘investments’, often destructive and pathological, unleashed by an instrumentalization of identities and social relations. Of core importance here is the ‘culture of narcissism’ (Lasch, 1980) which pervades contemporary Western life, and plays a powerful role in the instrumental affective investments in individuals which a risk society unleashes. Joel Kovel (1988) writes of ‘the de-sociation of the narcissist ic character’, a character lacking in depth of emotional attachment to others and communities.Unable to sustain a sense of personal purpose or social project, the narcissistic character, writes Kovel, rarely moves beyond instrumentality in dealing with other people. Such instrumental emotional investments may well be increasingly central to the management of many risk codes in contemporary culture. Consider the ways in which some parents fashion a narcissistic relation with their own children as a kind of imaginary risk-insurance (involving anxieties and insecurities over old age, mortality and the like), rather than relating to their offspring as independent individuals in their own right.Also in risks relating to the home, personal comfort as well as safety, hygiene, health and domesticity, the veneer-like quality of pathological narcissism can be found. Some analytical caution is, of course, necessary here, primarily because the work on narcissistic culture of Lasch and Se nnett, among others, has been criticized in terms of over-generalization (Giddens, 1991: 174–80). Accordingly, it may be more plausible to suggest that narcissistic forms of identity are a tendency within contemporary cultural relations of risk management, and not a wholesale social trend.Beck’s writings, I am suggesting, are less than satisfying on issues of power and domination because he fails to analyse in suf? cient depth the psychological, sociological and political forces by means of which the self-risk dialectic takes its varying forms. To develop a more nuanced interpretative and critical approach, I have suggested, the sociological task is to analyse privatization, commodi? cation and instrumentalization as channels of risk management. Tradition, Modernity, Postmodernity The limitations in the concept of re? xivity I have highlighted are, in turn, connected to further ambiguities concerning the nature of social reproduction in contemporary culture. The produc tion and reproduction of contemporary social life is viewed by Beck as a process of ‘detraditionalization’. The development of re? exive modernization, says Beck, is accompanied by an irreversible decline in the role of tradition; the re? exivity of modernity and modernization means that traditional forms of life are increasingly exposed to public scrutiny and debate. That the dynamics of social re? xivity undercut pre-existing traditions is emphasized by Beck via a range of social-theoretical terms. He speaks of ‘the age of side-effects’, of individualization, and of a sub-politics beyond left and right – a world in which people can and must come to terms with the opportunities and dangers of new technologies, markets, experts, systems and Downloaded from http://soc. sagepub. com by Madhu Menon on September 24, 2007  © 2002 BSA Publications Ltd.. All rights reserved. Not for commercial use or unauthorized distribution. 022761 Elliott 13/5/2002 9:5 0 am Page 307 Beck’s sociology of risk Elliott nvironments. Beck thus argues that the contemporary age is one characterized by increased levels of referentiality, ambivalence, ? exibility, openness and social alternatives. It might be noted that certain parallels can be identi? ed between the thesis of detraditionalization and arguments advanced in classical social theory. Many classical social theorists believed that the development of the modern era spelled the end of tradition. ‘All that is solid melts into air’, said Marx of the power of the capitalist mode of production to tear apart traditional forms of social life.That the dynamics of capitalism undercut its own foundations meant for Marx a society that was continually transforming and constantly revolutionizing itself. Somewhat similar arguments about the decline of tradition can be found in the writings of Max Weber. The development of industrial society for Weber was inextricably intertwined with the ri se of the bureaucratic state. Weber saw in this bureaucratic rationalization of action, and associated demand for technical ef? ciency, a new social logic destructive of the traditional texture of society.The views of Marx and Weber, among others, thus advanced a general binary opposition of ‘the traditional’ and ‘the modern’. For proponents of the thesis of detraditionalization, such as Beck, the self-referentiality and social re? exivity of advanced modernity also necessarily implies that traditional beliefs and practices begin to break down. However, the thesis of detraditionalization is not premised upon the broad contrast between ‘the traditional’ and ‘the modern’ that we can discern in much classical social theory. On the contrary, Beck ? nds the relation between tradition and modernity at once complex and puzzling.If tradition remains an important aspect of advanced modernity, it is because tradition becomes re? exive; tradi tions are invented, reinvented and restructured in conditions of the late modern age. So far I think that there is much that is interesting and important in this general orientation of Beck to understanding the construction of the present, past and future. In particular, I think the stress placed upon the re? exive construction of tradition, and indeed all social reproduction, is especially signi? cant – even though I shall go on to argue that this general theoretical framework requires more speci? ation and elaboration. I want, however, to focus on a speci? c issue raised by Beck’s social theory, and ask, has the development of society toward advanced modernization been accompanied by a decline in the in? uence of tradition and traditional understandings of the past? Must we assume, as Beck seems to, that the social construction of tradition is always permeated by a pervasive re? exivity? At issue here, I suggest, is the question of how the concept of re? exivity shou ld be related to traditional, modern and postmodern cultural forms. I shall further suggest that the concept of re? xivity, as elaborated by Beck, fails to comprehend the different modernist and postmodernist ? gurations that may be implicit within social practices and symbolic forms of the contemporary age. In order to develop this line of argumentation, let us consider in some more detail the multiplicity of world traditions, communities and cultures as they impact upon current social practices and life-strategies. I believe that Beck is Downloaded from http://soc. sagepub. com by Madhu Menon on September 24, 2007  © 2002 BSA Publications Ltd.. All rights reserved. Not for commercial use or unauthorized distribution. 07 022761 Elliott 308 13/5/2002 Sociology 9:50 am Volume 36 s Page 308 Number 2 s May 2002 right to emphasize the degree to which modernity and advanced modernization processes have assaulted traditions, uprooted local communities and broken apart unique regional, e thnic and sub-national cultures. At the level of economic analysis, an argument can plausibly be sustained that the erratic nature of the world capitalist economy produces high levels of unpredictability and uncertainty in social life and cultural relations, all of which Beck analyses in terms of danger, risk and hazard.It is worth noting, however, that Beck’s emphasis on increasing levels of risk, ambivalence and uncertainty is at odds with much recent research in sociology and social theory that emphasizes the regularization and standardization of daily life in the advanced societies. George Ritzer’s The McDonaldization of Society (1993) is a signal example. Drawing Weber’s theory of social rationalization and the Frankfurt School’s account of the administered society into a re? ctive encounter, Ritzer examines the application of managerial techniques such as Fordism and Taylorism to the fast food industry as symptomatic of the in? ltration of instrumen tal rationality into all aspects of cultural life. McDonaldization, as Ritzer develops the term, is the emergence of social logics in which risk and unpredictability are written out of social space. The point about such a conception of the standardization of everyday life, whatever its conceptual and sociological shortcomings, is that it clearly contradicts Beck’s stress on increasing risk and uncertainty, the concept of re? xive individualization, and the notion that detraditionalization produces more ambivalence, more anxiety, and more openness. Of course, Beck insists that re? exive modernization does not mark a complete break from tradition; rather re? exivity signals the revising, or reinvention, of tradition. However, the resurgence and persistence of ethnicity and nationality as a primary basis for the elaboration of traditional beliefs and practices throughout the world is surely problematic for those who, like Beck, advance the general thesis of social re? exivity.Ce rtainly, the thesis would appear challenged by widespread and recently revitalized patterns of racism, sexism and nationalism which have taken hold in many parts of the world, and indeed many serious controversies over race, ethnicity and nationalism involve a reversion to what might be called traditionalist battles over traditional culture – witness the rise of various religious fundamentalisms in the United States, the Middle East and parts of Africa and Asia. These political and theoretical ambivalences have their roots in a number of analytical dif? ulties, speci? cally Beck’s diagnosis of simple and advanced modernity. Beck furnishes only the barest social-historical sketch of simple modernity as a distinctive period in the spheres of science, industry, morality and law. He underscores the continuing importance and impact of simple industrial society for a range of advanced, re? exive determinations (for example politically, economically, technologically and envir onmentally), yet the precise relations of such overlapping are not established or demonstrated in any detail.Exactly how we have moved into the age of re? exive modernization, although often stated and repeated, is not altogether clear. Beck’s main line of explanation seems to focus on the side-effects of modernization as undercutting the Downloaded from http://soc. sagepub. com by Madhu Menon on September 24, 2007  © 2002 BSA Publications Ltd.. All rights reserved. Not for commercial use or unauthorized distribution. 022761 Elliott 13/5/2002 9:50 am Page 309 Beck’s sociology of risk Elliott foundations of modernity. But, again, the dynamics of simple and re? xive modernization, together with their social-historical periodization, remain opaque. In addition, it is not always clear how Beck is intending to draw certain conceptual distinctions between ‘positive’ and ‘negative’ instantiations of respectively simple and advanced modernist socio- symbolic figurations. Rejecting outright any crude opposition between traditional and modern societies, Beck relates a tale of the proliferation of re? exive biographies and practices, lives and institutions, in which creative possibilities develop and new forms of risk and hazard take shape.Yet social advancement is far from inevitable: Beck speaks of counter-modernities. The question that needs to be asked here, however, is whether it is analytically useful for social theory to construct the contemporary age as characterized by interacting tropes of industrial society and re? exive modernization on the one side, and a range of countermodernities on the other. Viewed from the frame of postmodern social theory, and in particular the sociology of postmodernity (see Bauman, 1992a), Beck’s argument concerning the circularity of the relationship between risk, re? xivity and social knowledge appears in a more problematic, and perhaps ultimately inadequate, light. For postmodern so cial theorists and cultural analysts diagnose the malaise of present-day society not only as the result of re? exively applied knowledge to complex techno-scienti? c social environments, but as infused by a more general and pervasive sense of cultural disorientation. The most prominent anxieties that underpin postmodern dynamics of social regulation and systemic reproduction include a general loss of belief in the engine of progress, as well as feelings of out-of-placeness and loss of direction.Such anxieties or dispositions are accorded central signi? cance in the writings of a number of French theorists – notably, Foucault, Derrida, Lyotard, Baudrillard, and Deleuze and Guattari – and also in the work of sociologists and social scientists interested in the rami? cations of post-structuralism, semiotics and deconstruction for the analysis of contemporary society (Lash and Urry, 1987; Harvey, 1989; Poster, 1990; Best and Kellner, 1991; Smart, 1992, 1993; Bauman, 1992a, 2000; Elliott, 1996).Postmodern anxieties or dispositions are, broadly speaking, cast as part of a broader cultural reaction to universal modernism’s construction of the social world, which privileges rationalism, positivism and techno-scienti? c planning. Premised upon a vigorous philosophical denunciation of humanism, abstract reason, and the Enlightenment legacy, postmodern theory rejects the metanarratives of modernity (that is, totalistic theoretical constructions, allegedly of universal application) and instead embraces fragmentation, discontinuity and ambiguity as symptomatic of current cultural conditions.To express the implications of these theoretical departures more directly in terms of the current discussion, if the social world in which we live in the 21st century is signi? cantly different from that of the simple modernization, this is so because of both socio-political and epistemological developments. It is not only re? ection on the globalization of risk tha t has eroded faith in humanly engineered progress. Postmodern contributions stress that the plurality of Downloaded from http://soc. sagepub. om by Madhu Menon on September 24, 2007  © 2002 BSA Publications Ltd.. All rights reserved. Not for commercial use or unauthorized distribution. 309 022761 Elliott 310 13/5/2002 Sociology 9:50 am Volume 36 s Page 310 Number 2 s May 2002 heterogeneous claims to knowledge carries radical consequences for the unity and coherence of social systems. Bluntly stated, a number of core issues are identi? ed by postmodern analysts in this connection: s s s The crisis of representation, instabilities of meaning, and fracturing of knowledge claims;The failure of the modernist project to ground epistemology in secure foundations; The wholesale transmutation in modes of representation within social life itself. Postmodernization in this context spells the problematization of the relationship between signi? er and referent, representation and reality, a re lationship made all the more complex by the computerization of information and knowledge (Poster, 1990). What I am describing as a broadly postmodern sociological viewpoint highlights the de? iency of placing ‘risk’ (or any other sociological variable) as the central paradox of modernity. For at a minimum, a far wider range of sources would appear to condition our current cultural malaise. What is signi? cant about these theoretical sightings, or glimpses, of the contours of postmodernity as a social system are that they lend themselves to global horizons and de? nitions more adequately than the so-called universalism of Beck’s sociology of risk.Against a theoretical backdrop of the break with foundationalism, the dispersion of language games, coupled with the recognition that history has no overall teleology, it is surely implausible to stretch the notion of risk as a basis for interpretation of phenomena from, say, an increase in worldwide divorce rates through to the collapse of insurance as a principle for the regulation of collective life. Certainly, there may exist some family resemblance in trends surrounding new personal, social and political agendas.Yet the seeds of personal transformation and social dislocation are likely to be a good deal more complex, multiple, discontinuous. This is why the change of mood – intellectual, social, cultural, psychological, political and economic – analysed by postmodern theorists has more far-reaching consequences for sociological analysis and research into modernity and postmodernization than does the work of Beck. In Beck’s sociology, the advent of advanced modernization is related to the changing social and technological dimensions of just one institutional sector: that of risk and its calculation.The key problem of re? exive modernization is one of living with a high degree of risk in a world where traditional safety nets (the welfare state, traditional nuclear family, etc . ) are being eroded or dismantled. But what is