TOPIC:AUTHENTICATION AND ACCESS CONTROL IN BANKING SECTOR APA 7th EDITION STYLE It is a list of research sources that includes concise descriptions and evaluations of each source. The annotation...

1 answer below »


TOPIC:AUTHENTICATION AND ACCESS CONTROL IN BANKING SECTOR


APA 7th EDITION STYLE
It is a list of research sources that includes concise descriptions and evaluations of each source. The annotation usually contains a brief summary of content and a short analysis or evaluation.
I. CITATION. Use a proper format (Please use in-text citation.)
II. SUMMARY. Sum up the important points in the article.
1. Why authors research is significant or Why is it an interesting or useful problem?2. What is the aim or objective of their research?3. What are their contribution to science?
III. CRITIQUE
2. What is the purpose for writing the article or doing the research?3. To what audience is the author writing? Is it intended for the general public, scholars, policymakers, teachers, professionals, practitioners, etc? Is this reflected in the author’s style of writing or presentation? How so?4. Does the author have a bias or make assumptions upon which the rationale of the publication or the research rests?5. What method of obtaining data or conducting research was employed by the author? Is the article based on personal opinion or experience, interviews, library research, questionnaires, standardized personality tests, etc.?6. At what conclusions does the author arrive?7. Does the author satisfactorily justify the conclusions from the research or experience? Why or why not?8. How does this study compare with similar studies? Is it in tune with or in opposition to conventional wisdom, established scholarship professional practice, government policy, etc.? Are there specific studies, writings, schools of thought, philosophies, etc. with which this one agrees or disagrees, and of which one should be aware?9. Are there significant attachments of appendixes such as charts, maps, bibliographies, photos, documents, tests, or questionnaires? If not, should there be?


Article Example only TASK 1 - ANNOTATED BIBLIOGRAPHY








Article 1CITATIONIn-text citation ONLY (e.g. Shin et al 2019)SUMMARYCRITIQUE













Article 2CITATIONIn-text citation ONLYSUMMARYCRITIQUE

Article 3CITATIONIn-text citation ONLYSUMMARYCRITIQUE





Article 4CITATIONIn-text citation ONLYSUMMARYCRITIQUE



Article 5CITATIONIn-text citation ONLYSUMMARYCRITIQUE



Article 6CITATIONIn-text citation ONLYSUMMARYCRITIQUE



Article 7CITATIONIn-text citation ONLYSUMMARYCRITIQUE



Article 8CITATIONIn-text citation ONLYSUMMARYCRITIQUE



Article 9CITATIONIn-text citation ONLYSUMMARYCRITIQUE



Article 10CITATIONIn-text citation ONLYSUMMARYCRITIQUE



Article 11CITATIONIn-text citation ONLYSUMMARYCRITIQUE

Article 12CITATIONIn-text citation ONLYSUMMARYCRITIQUE





Background SummaryUsing 12 articles shown in above table according to the given task.
Example 1:
I.SELF-EVALUATION REPORT ON ORIGINALITY (100-150 WORDS)


•Select a 1000-word sample of annotations text only (exclude references) from and submit it for testing at Turnitin turnitin.com•Save and append a copy of the originality report obtained (Screenshot with the similarity index percentage)•Critically evaluate and interpret the originality report, from your context or point of view as your personal Self-Evaluation Report on Originality (100-150 words).
II.TASK 2 10% - WRITE A 120-200 WORD JOURNAL SYNOPSIS PAPER BASED ON YOUR TASK 1 RESULTS
Abstract—It should make it easier if you use the simple template below for your 120-200 word Journal Synopsis paper as it has the following headings and length as a guide:AIM OF THE PROJECT (1 sentence or 15 words)METHOD (2 sentences or 30 words)RESULTS (1-2 sentences or 15 to 30 words)DISCUSSION (2 sentences or 30 words)CONCLUSION (1 sentence or 15 words)
* Please do not delete subtitles here.- The abstract should summarize the approach and the article's major scientific contributions, emphasizing the importance and significance of the results. The abstract should not contain literature citations or allusions to the illustrations.
- Define all non-standard symbols and abbreviations. Use running text only and avoid equations.
- Please do not include citations in Abstract.


RATIONALEThis assessment task will assess the following learning outcome/s:• be able to perform literature searches and critically analyse the literature in the chosen topic.• be able to critically reflect on and synthesize complex information, problems, concepts and theories in the chosen topic.• be able to apply established research methodologies with autonomy.• be able to apply project management and information and communication technologies (ICT) tools to plan, execute, record and present their research and project work as a capstone experience.
III.MATERIALS AND METHODS (VERY IMPORTANT)What are you going to propose to solve the problem that is existing in the current/existing solutions; (Mention the initial solution here)? You can use a diagram to clarify that with writing textHow you are going to do your research (step by step methodology is needed).




IV.RESULTS* You include the "Results" section, ONLY, if you have obtained your own results.* You cannot include someone else’s figures or tables in this section. This is only your own analysis.* Comprehensive Figure caption is needed.


V.REFERENCES
APA 7TH EDITION STYLE


Answered Same DaySep 06, 2021

Answer To: TOPIC:AUTHENTICATION AND ACCESS CONTROL IN BANKING SECTOR APA 7th EDITION STYLE It is a list of...

Sarabjeet answered on Sep 08 2021
153 Votes
Annotated Bibliography
Student Name:
Unit Name:
University Name:
Date:
Contents
Annotated Bibliography    3
References    16
Annotated Bibliography
Article 1
    CITATION
    Camillo, M. (2017). Cybersecurity: Risks and management of risks for global banks and financial institutions. Journal of Risk Management in Financial Institutions, 10(2), 1-200.
    SUMMARY
    This article states that the challenge of cyber threats in the financial industry has greatly escalated. First, the severity of these attacks shows this. Second, the complexity of the
cyber attack intentions shows this. In this article author found that IBM1 found that compared with the previous year, thefts committed by malware or other malicious means in the financial sector increased by 80% in 2015.” Therefore, this clearly shows that today’s financial the industry is in serious trouble. This source will be used to explore how network insecurity affects the financial sector (Camillo, 2017).
    CRITIQUE
    This article summarizes that the recommended solutions will be used to design and explain how accountants and financial institutions should take security measures in a modern business environment. The issues discussed will be discussed in detail, such as the importance of network intelligence and managing network security through risk transfer.
Article 2
    CITATION
    Darwish, S., & Hassan, A. (2012). A model to authenticate requests for online banking transactions. Alexandria Engineering Journal, 51(3), 185-191. https://doi.org/https://doi.org/10.1016/j.aej.2012.02.005
    SUMMARY
    As number of customers using online banking increases, online banking systems are becoming more ideal targets for attacks. In order to maintain customers' confidence and trust in safety of their online banking services; financial institutions should determine how attacker compromise accounts moreover develop techniques to defend them. To this end, this article proposes a modified model that combines identity-based intermediary RSA (IB-mRSA) technology and one-time ID concept to verify customers of online banking transactions in order to improve security and avoid swallows (Darwish & Hassan, 2012).
    CRITIQUE
    This article claims that to prevent reply attacks. From a computing and storage point of view, the generated models seem to be practical. The experimental outcomes show the success of the model.
Article 3
    CITATION
    Sharaaf, N., Haamid, M., Samarawickrama, S., & Gunawardhane, C. (2016). Improved-E-banking-System-With-Advanced-Encryption-Standards-And-Security-Models. INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY ARTICLE, 5(10).
    SUMMARY
    Emerging new technologies as well as big-scale businesses have turned the world into a international village. Many business organizations provide online services for global customer groups. In order to meet the requirement of the above-mentioned business associations, banks around the world have realized international-scale transactions through electronic banking (Sharaaf et al., 2016). E-banking brings many benefits to both bank customers and the bank itself. It improves the value of customer satisfaction with higher service quality as well as allows the bank to increase a competitive advantage over other competitors. In order to provide a secure, consistent and robust online environment, online banking needs to have a high level of security to ensure safe data transmission as well as the identity of the bank and customers.
    CRITIQUE
    Lack of safety might lead to reduced or difficult trust in online banking. Though consumers are attracted by the convenience of online banking, they seem to be largely worried about identity theft and phishing (Sharaaf et al., 2016). The focus of this article is on safety beyond the aforementioned mechanisms. This article ensures the safety of the online banking from three stages. On the client side, an Internet dongle integrated with fingerprint scanning technology is used at the bank server side and data transmission level.
Article 4
    CITATION
    
Normalini, M.K, & Ramayah, T. (2012). Biometrics Technologies Implementation in Internet Banking Reduce Security Issues. Retrieved 8 September 2020.
    SUMMARY
    Information System is a problem that computer users are very concerned about. The main problem associated to online banking in Malaysia is the weak security of online banking applications. Hence, this article will further article solutions to increase the safety problem in the implementation of online banking (Normalini, et al., 2012). In nowadays high-speed world, millions of transactions occur each minute. For these transactions, the data must readily exist to real people who need to access it, or it should be safe from imposters.
    CRITIQUE
    There are three basic methods for verifying personal recognize: something you have (such as a debit card), something you understand (such as a PIN, password), or something you own (such as a fingerprint). Most of the systems use a combination of these techniques to increase the stage of safety.
Article 5
    CITATION
    Minakshi, S., Pradeep, T., & Dahikar, B. (2015). A Review of Security Aspects of Online and ATM Transactions in Banking Domain. International Journal Of Advanced Article In Electronics And Communication Engineering, 4(12).
    SUMMARY
    
Improvements in banking have made it easier for customers to access its services. Among the services provided by banks, ATM services play a key role in...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here