Chapter 2: Literature Review Rough Draft ( 5 page)
According to the instruction Chapter 2 must contain on below parts
(1) Explain overall research topic
(2) literature gathering process
(3) scope and organization of the literature review
(4) The introduction should conclude with a paragraph that describes the sequence of the literature you will include and the literature analysis process
(5) After the introduction, you should incorporate possible headings/subheadings that you plan to cover and include at least 20 scholarly references.
You need to define the architecture and the way of communication and then define the problems in general. After that select the problem of your interest
scope and organization of the literature review
The introduction should conclude with a paragraph that describes the sequence of the literature you will include and the literature analysis process
In the introduction part of the identified topic, it should contain the introduction, the infrastructure, and architecture
Literature gathering process
Write according to this information ===
Author focused on three strategies to prevent identity theft such as new technology use, training/education, vigilance strategy but how to use new technology strategies on customers who is not familiar with technology or smartphones or language. How new technology strategy is helping to customer?? What plans do you have to implement payment-card security? Identity theft and payment-card fraud define how identity theft affects credit-card fraud. Sentinel will collect approximately 4.7 million consumer reports in 2020, which the FTC will divide into 29 segments. Top three categories were credit card fraud, employment or tax-related fraud, and phone or utilities fraud.
The main purpose of the qualitative study is to gain a better understanding of specific phenomena of identity theft on credit card fraud to minimize payment card fraud. Credit card fraud is the unauthorized use of a credit or debit card or similar payment tool to fraudulently obtain money or property. Credit and debit card numbers can be stolen from unsecured websites .A data breach can occur because of either purposeful or inadvertent data leak. Cybercriminals mostly target the credit card industries. The most stolen data from businesses is credit cards and personal information.
This study will focus on a population of at least five people from the credit card company. I will conduct semi structured interviews with five credit card company who is trying to implement strategies to mitigate the effects of identity theft on credit card fraud. Purposeful sampling is the good choice for this study, as I am going to select one leader from each of the credit card company that met the strict eligibility criteria. Convenience sampling and snowball sampling are not appropriate for this study, as I am going to select one leader that meets the strict set of criteria from each of the five-credit card company. The conceptual framework is on fraud theory, but fraud theory has different types of categories and I choose fraud diamond theory. The goal of this study is to use the fraud diamond theory, and the research approach includes ethnography, phenomenology, and case study. One method to combat bias is using a triangulation strategy that involves the use of multiple data collection methods to provide credibility and validation to the research. This study demonstrates which consists of compiling the data, disassembling the data, reassembling the data, interpreting the meaning of the data, and concluding the data to analyze the data collected by use of Microsoft Excel and latest software to support it.
Pages: 5 Double spaced(1375 words)
Style and sources: APA7, 20 sources
Free extras: Outline/Title page/Bibliography / Reference page
Study level: PhD
Assignment type: Research Paper