Feedback from Lee Smith-Dennis
25/03/20 19:41
You have produced a reasonable rationale for conducting the study, but must be clearer with your research questions as two are very similar. Your literature review is reasonable, but includes some very dated references which are now irrelevant.
Your methodology could be more detailed as you must explain why you are choosing the methods that you are.
Your potential outcomes are reasonably clear. Overall, a reasonable attempt but failing to show a current research gap.
Feedback from Ali Rasel
27/03/20 14:14
The proposal shows a good study background with a clear aim and objectives. The rationale and significance of the study are not clear. You need to use a specific theory to understand the subject matter. The review seems to be done on mobile banking in general. It should include ideas about security issues with mobile banking. The review needs to be more critical. Research methodology needs to be connected to the research questions. You need to show the number of studies you are going to systematically review. If Meta-analysis is the main method to answer the research questions, you need to review studies on the same topic and show how you are going to do Meta-analysis with an appropriate analysis tool. Potential outcomes need to be explained with good evidence of analysis. The writing structure is fine but you need to improve your English with good grammar and academic writing. Referencing follows the Harvard style despite a few journal references have been used in the proposal.
MBA Managerial Project Proposal
Security Issues in Mobile Banking System of the Maldives and Its Effect on Customers
Executive Summary
Mobile Banking revolutionized the way people do banking. Technology has brought the ease of doing a financial transaction to the finger-tips. However, this radical developmental has also lead to great negative impacts on the customers due to security issues. This study seeks to investigate the Security Issues in Mobile Banking System of the Maldives and its Effect on Customers.
With the existing literature that demonstrates the Mobile Banking and security issues and measures to counter, the study will use Meta-analysis to bring a statistical solution to fill the knowledge gap in the context of the research. Moreover, existing models will be critically reviewed to find solutions to the research questions and achieve objectives of the study.
Contents
Executive Summary 2
List of Figures 4
List of Table 4
1.0 Introduction 5
1.1 Area of Research 5
1.2 Research context 5
1.3 Scope of the study 6
1.3.1 Research Question 6
1.3.2 Research aim 7
1.3.3 Research Objectives 7
1.4 Rationale of the Study 7
2.0 Literature Review 8
2.1 Model of E-Fraud 8
2.2 Bio-metrics model for authentication 9
2.3 Literature Review Summary 9
3.0 Research Methodologies 10
3.1 Research Philosophy 10
3.2 Research Approach 10
3.3 Research Design 11
3.4 Research Instruments Data Col.
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
Feedback from Lee Smith-Dennis250320 1941You have produced .docx
1. Feedback from Lee Smith-Dennis
25/03/20 19:41
You have produced a reasonable rationale for conducting the
study, but must be clearer with your research questions as two
are very similar. Your literature review is reasonable, but
includes some very dated references which are now irrelevant.
Your methodology could be more detailed as you must explain
why you are choosing the methods that you are.
Your potential outcomes are reasonably clear. Overall, a
reasonable attempt but failing to show a current research gap.
Feedback from Ali Rasel
27/03/20 14:14
The proposal shows a good study background with a clear aim
and objectives. The rationale and significance of the study are
not clear. You need to use a specific theory to understand the
subject matter. The review seems to be done on mobile banking
in general. It should include ideas about security issues with
mobile banking. The review needs to be more critical. Research
methodology needs to be connected to the research
questions. You need to show the number of studies you are
going to systematically review. If Meta-analysis is the main
method to answer the research questions, you need to review
studies on the same topic and show how you are going to do
Meta-analysis with an appropriate analysis tool. Potential
outcomes need to be explained with good evidence of
analysis. The writing structure is fine but you need to improve
your English with good grammar and academic
writing. Referencing follows the Harvard style despite a few
journal references have been used in the proposal.
2. MBA Managerial Project Proposal
Security Issues in Mobile Banking System of the Maldives and
Its Effect on Customers
Executive Summary
Mobile Banking revolutionized the way people do banking.
Technology has brought the ease of doing a financial
transaction to the finger-tips. However, this radical
developmental has also lead to great negative impacts on the
customers due to security issues. This study seeks to investigate
the Security Issues in Mobile Banking System of the Maldives
and its Effect on Customers.
With the existing literature that demonstrates the Mobile
Banking and security issues and measures to counter, the study
will use Meta-analysis to bring a statistical solution to fill the
knowledge gap in the context of the research. Moreover,
existing models will be critically reviewed to find solutions to
the research questions and achieve objectives of the study.
Contents
Executive Summary 2
List of Figures 4
List of Table 4
1.0 Introduction 5
3. 1.1 Area of Research 5
1.2 Research context 5
1.3 Scope of the study 6
1.3.1Research Question 6
1.3.2Research aim 7
1.3.3Research Objectives 7
1.4 Rationale of the Study 7
2.0 Literature Review 8
2.1 Model of E-Fraud 8
2.2 Bio-metrics model for authentication 9
2.3 Literature Review Summary 9
3.0 Research Methodologies 10
3.1 Research Philosophy 10
3.2 Research Approach 10
3.3 Research Design 11
3.4 Research Instruments Data Collection Methods 11
3.5 Data Analysis Method 11
3.6 Ethical Issues 11
3.7 Expected Sources of Information 12
4.0 Potential Outcomes 13
4.1 Research Plan 13
5.0 Reference Cited 14
6.0 Bibliography 15
List of Figures
Figure 1. E-Fraud Model
…………………………………………………… 8
Figure 2. Bio-Metric Model for Authentication
…………………………………… 9
Figure 3: Research Approach
……………………………………………………………10
Figure 4: Research Design
…………………………………………………………….11
List of Table
Figure 4: Gantt Chart
4. ………………………..…………………………………………
13
Security Issues in Mobile Banking System of the Maldives and
Its Effect on Customers
1.0 Introduction
The technological advancement and the innovative trends that
endures to coerce the way of banking is perhaps convenient and
bringing customers more nearer to the banks. These
groundbreaking innovations has led to the establishment of
Mobile Banking where services have been brought to the finger-
tips of the customers all over the world in a very short span of
time. The advantage of technology is also abused by various
hackers and other cyber criminals. Thus, bringing the security
issue as a threat in using Mobile Banking Systems that have a
direct impact on customers.
1.1 Area of Research
The chosen area for research for this study is “Security Issues in
Mobile Banking System of the Maldives and Its Effect on
5. Customers”. 1.2 Research context
At this age of technology, robbing banks by using weapons and
physical force has almost become fictional. Cyber fraud or E-
frauds, Identity theft and phishing are common crimes
committed in stealing funds from bank accounts (Belcher,
2004). Furnell and Evangelatos (2007) has argued that degree of
trust among the mobile banking customers diminishes as E-
fraud usage occurs due to unauthorized transactions. Similarly,
they have also argued reliability is an important factor
determining the trust between the mobile banking system and
communication between the mobile device during transaction
(Furnell and Evangelatos, 2007).
In this context, the Maldives is not detached from the identified
problem and the Maldives Police has reported more than 65
cases and theft of more than half a Million Ruffiya (Maldives
Independent, 2017). Thus, security threats posing a significant
threat on customers.
Maldives, even though have a population less than a mere
400,000 people dispersed into over 200 islands, adapting to the
revolutionizing technology is fast and quick. According to the
Communications Authority of Maldives (CAM, 2019), total
mobile subscribers in the Maldives amounts to 839,528
depicting 1:2 in mobile subscription. In addition, CAM (2019)
also has published that there are 90,237 fixed broadband
subscribers and 266,495 mobile broadband subscribers. Bank of
Maldives or the national bank in the Maldives introduced the
vital service of Mobile Banking service to its customers in July
2015, with the launch of its new Mobile Banking Application
available for use on Apple and Android smartphones
(Aramudhan, 2008).
However, with the growing trend of technology many
individuals are still not using Mobile banking and opt to go for
the traditional retail branch banking. The reasons are unknown
to the banks as to why people do not want to adopt internet
6. banking. This remains the case in many other countries as well.
With the increase in technology currently Bank of Maldives
(BML), HSBC, State Bank of India (SBI), Maldives Islamic
Bank (MIB) and Bank of Ceylon (BOC) has adopted Mobile
banking in the Maldives. According to Harb, Farahat and Ezz
(2008) Banking via mobile is changing lives of people all over
the world whereby they can make banking transaction 24 hours
a day wherever they are. It has added up to the convenience of
adapting to new technologies. Furthermore, it has helped many
people who are too busy and have no time to visit traditional
bank branches and make transactions. Using mobile banking has
many advantages for users such as saving time and the accuracy
of information flow.
This study intends to study the Security Issues in Mobile
Banking System of the Maldives and its Effect on Customers.
1.3 Scope of the study
This study will focus on the security issues in the Mobile
Banking System in the Maldives on the one hand and its impact
on customers on the other hand.Security issues describes the
existing cybercrime techniques like phishing attacks, E-fraud,
virus attacks, spoofing and etc.
1.3.1Research Question
What are the Security Issues in Mobile Banking System of the
Maldives and its Effects on Customers?
The study will further try to investigate the following;
· What are the security issues in Mobile Banking System in the
Maldives?
· How reliable is the current Mobile Banking System with
reference to security in the Maldives?
· What are the effects of security issues on customers?
1.3.2Research aim
Through various models based on the literature, this study will
7. insist to find out the most fragile area in Mobile Banking and
how that threat could be minimized to increase the trust and
reliability to the Mobile Banking System in the Maldives.
1.3.3Research Objectives
The objectives are subjected to change as the research
progresses.
· To analyze the current Mobile Banking System.
· To identify the security issues in Mobile Banking System.
· To assess the reliability of the current Mobile Banking
System with reference to security.
· To examine the effect of security on customers.
1.4 Rationale of the Study
Literature survey reveals that there are models that would allow
to understand the context and mechanics of E-fraud. Therefore
the basis of this study will be to examine one of the models that
will help to build the trust in Mobile Banking and minimize
risks and effects on the prevailing security issues.
2.0 Literature Review
Various literature and models are available on the security
issues of Mobile Banking and its effect on customers.
Aramudhan (2008) has revealed that User Assigned Security
Policy Framework for m-commerce Applications increases its
security levels from both the user and server side to increase the
reliability. Similarly, Bangdao and Rosco (2010) has argued
that increasing the Mobile Electronic Identity through
biometrics secures payment on Mobile phones. In 2016, A.S.
Bhatt has identified the factors Affecting Customer’s Adoption
of Mobile Banking Services. Furthermore, Lee and Chung
(2009) argued that a Developed Information System model
would increase customer satisfaction and reliability on the
Mobile Banking services as payment transactions are made
without any human contact.
8. A study conducted Amola (2016) to analyze the factors
affecting customer’s adoption of Mobile Banking Services
revealed demographic, attitudinal, and behavioral
characteristics of mobile bank users are interconnected, but
security issues were not addressed. In another study by Palani
(2012) to examine customers perception towards Mobile
Banking in Indian Overseas Bank Chennai identified the
causative factors so that mobile banking can be used by
more people to make banking operations more cost effective.
However, one of the compelling model on E-fraud which is
relevant to this study was formulated by Malakedsuwan and
Stevens (2003) identifying key elements that describes E-fraud
and effective counter measures to increase customers trust.
2.1 Model of E-Fraud
E-Fraud Model ofMalakedsuwan and Stevens (2003) focuses on
five key elements to exhibit a reliable model to identify and
examine e-fraud and its impact. The model is illustrated below
with the key elements.
Perpetrator
Mode of Attack
Target System
Target Entity
Impact
Figure 1. E-Fraud Model
Key element one is the Perpetrator or the attacker. According to
Malakedsuwan and Stevens (2003) the perpetrator will be either
9. internal or external to the entity committing the fraud.
Secondly, the Mode of Attack describes the technique used to
execute the fraud. Malakedsuwan and Stevens (2003) states that
the fraudulent activity can be conducted through technical
modes like IP spoofing or malicious codes and non-technical
modes like identity stealing. The third element of Target System
describes the system through which the fraudulent activity is
conducted or perpetrated. Fourthly, Target Entity features
individuals or organizations by identifying the weaknesses in
the systems. The last element explains the Impact, whetherthe
perpetration has incurred financial losses or non-financial losses
like loss of competitive advantage and reputation.
2.2 Bio-metrics model for authentication
In 2011, Bilal and Sankar proposed a Bio-Metrics model for
Mobile Banking Authentication, where finger-print is the
mechanism to counter-measure the existing security issue. Their
study through literature review and study of existing systems
using login, password and SMS mechanisms showed that only
the authorized user will be able to use particular account.
Mobile Device
Bio-Metric Device
Bank System
Figure 2. Bio-Metric Model for Authentication
Bilal and Sankar (2011) in their study of Trust and Security
Issues in Mobile Banking and its effect on Customers showed
that 90% of the respondents strongly agreed that such a model
will increase the ease of use of Mobile Banking and 70% agreed
that this model will increase customer satisfaction while 60%
agreed it will reduce fraud, thus increasing trust and safety.
10. 2.3 Literature Review Summary
The literature review revealed that there are pros and cons of
using Mobile Banking in the evolving technological
phenomenon (Chandran, 2014). It is also evident as Bilal and
Sankar (2011) has suggested that invalidating security issues to
0% is not possible. However, with many security measures, it
can only be reduced and prevented (Chandran, 2014). Despite
the literature demonstrated in this section, upon analysis on the
context of this study, it will viable and suitable to use the E-
fraud Model by Malakedsuwan and Stevens (2003).
3.0 Research Methodologies
As Saunders, Lewis and Thornhill (2009) suggests, a research
can be classified into perspectives of (i) application of research
study (ii) objectives in undertaking the research and (iii)
inquiry mode employed. From these perspectives, in practice,
most studies are a combination of descriptive, correlational and
exploratory researches which is categorized under the second
perspective of objectives in undertaking the research. 3.1
Research Philosophy
The research philosophy intended to use in this study will be
Pragmatism in order to emphasize and use both positivist and
interpretivist elements of epistemology (Saunders, Lewis and
Thornhill, 2009). In this way, to adapt pragmatism Systematic
literature review will be conducted as the study will focus on
studying issues to bring out positive consequences by examining
the existing secondary sources to be synthesized and evidence
compared (Saunders, Lewis and Thornhill, 2009).
3.2 Research Approach
The Secondary data required for the research will be collected
with the help of the analysis of the historical records and
analysis of the documents. The Historical record presents the
data about the mobile banking which have been collected by the
various researchers in mobile banking field (Bloor et al, 2000).
The Secondary data will help in finding out the process of
adoption for any kind of new innovation among the users. Thus,
the research approach will be divided into the following four
11. phases.
PHASE 1
Research Design
PHASE 2
Conduct
PHASE 3
Analysis
PHASE 4
Structure and writing
Figure 3: Research Approach
3.3 Research Design
The research will designed as follows;
RESEARCH DESIGN
1. Contribution to the existing knowledge gap
2. Potential
Audience
3. Purpose of the
Research
4. Appropriate
Method
5. Search
Strategy
12. Figure 4: Research Design
3.4 Research Instruments Data Collection Methods
For collecting this data various news articles, magazines,
journal articles and data bases would be searched in order to
present the relative data about the research.
3.5 Data Analysis Method
After collection and reviewing of literature, Meta–analysis will
be used to answer the formulated research questions. Meta-
analysis enables to bring out a statistical solution by weighing
the reviewed literature into classification by codes (Saunders,
Lewis and Thornhill, 2009). This analysis method would
therefore enable the researcher to assess the impact of excluding
or down weighing unpublished studies, low quality studies and
out-of-date studies.
3.6 Ethical Issues
There will be no ethical issues, since this study will consist of
secondary research which will be fully cited and referenced.
3.7 Expected Sources of Information
The expected sources of information includes
i) Annual Reports of the Banks in the Maldives.
ii) Online Libraries for journal articles.
iii) Books.
iv) Online news articles.
4.0 Potential Outcomes
From this study, the author will be able to identify the security
issues that pertains in the Mobile Banking System in the
Maldives. In the light of the literature, the author will also be
13. able to find the gap in the existing literature on security issues.
In addition, identifying perpetrators, mode of attack, target
system, target entity and impact will help to find the answers
for the research questions and formulate counter measures.
4.1 Research Plan
Table 1: Gantt Chart
5.0 Reference Cited
Aramudhan M 2008, User Assigned Security Policy Framework
for m-commerce Applications, International Conference
Computer and Communication Engineering, ICCCE 2008, pp.
148-150.
Bangdao C and Rosco A W 2010, Mobile Electronic Identity:
Securing Payment on Mobile Phones, pp.1-15
Bhatt A S B 2016, Factors Affecting Customer’s Adoption of
Mobile Banking Services, Journal of Internet Banking and
Commerce, Vol.3, pp 8-13.
CAM (2019). Telecom Statistics – November 2019. [online].
Communications Authority of Maldives. [Viewed 2 March
14. 2020]. Available from http://www.cam.gov.mv/Statistics.htm
Chandran R 2014, Pros and Cons of Mobile Banking,
International Journal of Scientific and Research Publications,
Vol. 4, Issue 10, pp. 1-5
Furnell S and Evangelatos K 2007, Public awareness and
perceptions of biometrics, Journal of Computer Fraud &
Security, vol. 2007, pp. 8-13.
Harb H, Farahat H, and Ezz M 2008, SecureSMSPay: Secure
SMS Mobile Payment Model, 2nd International Conference on
Anti-counterfeiting, Security and Identification, 2008. ASID
2008, pp. 11-17.
Lee K C and Chung N 2009, Understanding Factors Affecting
Trust in and Satisfaction With Mobile Banking in Korea: A
Modified DeLone and McLean's Model Perspective, Journal of
Interacting with Computers, Vol. 21, pp. 385-392.
Maldives Independent (2017). More than half a Million Ruffiya
Stolen in phone scams. [online]. [Viewed 2 March 2020].
Available from https://maldivesindependent.com/society/more-
than-half-a-million-rufiyaa-stolen-in-phone-scams-120943
Palani P 2012, A Study On Customer Perception Towards
Mobile Banking In Indian Overseas Bank Chennai,
International Journal of Trend in Scientific Research and
Development (IJTSRD) International Open Access Journal, Vol.
2, pp. 259.6.0 Bibliography
Chuchen C 2016, The Perception of Mobile Banking Adoption:
The Study of Behavioral, Security, and Trust in Thailand,
Behavioral, Security, and Trust in Thailand, International
Journal of Social Science and Humanity, Vol. 6, No. 7, pp. 547-
550.
Coface.com. 2020. Risk Analyses And Evaluations / Our
Economic Studies / Our Business - Coface. [online] Available
at: <https://www.coface.com/Our-business/Our-economic-
studies/Risk-analyses-and-evaluations> [Accessed 22 February
2020].
Devaraj, S., Krajewski, L. and Wei, J., 2007. Impact of
eBusiness technologies on operational performance: The role of
15. production information integration in the supply chain. Journal
of Operations Management, 25(6), pp.1199-1216.
My New Desk (2014). Phishing Fraud (Maldives Mobile
Banking) [online] Bank of Maldives. [Viewed 11 March 2020].
Available from
http://www.mynewsdesk.com/mv/bankofmaldives/pressreleases/
phishing-fraud-maldives-mobile-banking-1043407
Mallat N, Rossi M and Tuunainen V. K 2004, Mobile Banking
Services, Communications of the ACM, Vol. 47, May. 2004, pp.
42–46.
Nie J and Hu X 2008, Mobile Banking Information Security and
Protection Methods, International Conference on Computer
Science and Software Engineering, 2008, pp. 587-590.
Peng L and Lai L 2009, A Study on Service Quality Assurance
in Mobile Commerce, Journal of Computer Science and
Engineering, pp. 207-211.
Pfitzmann A, Pfitzmann B, Schunter M and Waidner M 1997,
Trusting Mobile User Devices and Security Modules, Computer,
Vol. 30, pp. 61-68.
Wei D and Yanling T 2010, Research on Security Payment
Technology Based on Mobile E-Commerce, 2nd International
Conference on e-Business and Information System Security
(EBISS), 2010, pp. 1-4.
Ying L and Can Z 2010, Customer's Adoption Decision Analysis
of Mobile Banking Service, Journal of Management and Service
Science (MASS), pp. 1-4.
Zhuo Q Y and Li Y 2010, Chinese Mobile Banking Service
Evaluation Based on AHP Method, International Conference on
E-Product E-Service and E-Entertainment (ICEEE), 2010, pp. 1-
5.
14 | Page
16. What am I required to do in this assignment?
You should complete and submit the final dissertation to the
relevant submission link via Assessment & Feedback on BREO
by the deadline.
Note: Turnitin will be used for all submissions to check for
plagiarism. We also reserve the right to initiate a viva voce
examination if we have concerns regarding the originality of
your submission. Dates of the Viva will be provided during the
induction week. You need to be available for such an event
following the submission of your dissertation.
• Your f inal assessment will be an individual managerial
dissertation which will be a considered and comprehensive
response to your research objectives agreed with your
supervisor.
• Your dissertation will encapsulate your approach to the
research, the research methods that you have deployed, an
analysis of the knowledge generated as part of the
investigative process and a ref lection on your personal
development
as a consequence of this research p roject experience.
17. Submission Deadline Marks and Feedback
Before 10am on:
Click or tap to enter a date.
20 working days after deadline (L4, 5 and 7)
15 working days after deadline (L6)
10 working days after deadline (block delivery)
Click or tap to enter a date.
Unit title & code MBA Managerial Project; APO017-6
Assignment number and title 2 Dissertation
Assessment type Individual Written Report
Weighting of assessment 80%
Size or length of assessment 10000 words (+/- 10%)
Unit learning outcomes 1 Demonstrate the f ollowing knowledge
and understanding
• Demonstrate a systematic understanding and critical
appreciation of the
interrelationship of diverse theories in the MBA toolkit to
challenge existing
preconceptions and develop positive and enquiring approaches
to global
management and enterprise. Demonstrate an aptitude and ability
to solve a def ined
18. business problem through enquiry having drawn upon your
MBA studies and
appreciating the interrelated nature of organisations.
2 Demonstrate the f ollowing skills and abilities
Demonstrate intelligent practice by imaginative and critical
integration of theory and
practice to create a tangible deliverable through critical insightf
ul evaluation
stipulating areas of excellence and ref lecting on areas f or
development to improve
perf ormance in contemporary organisations.
2
• It will need to demonstrate your understanding of the topic
area in the context of contemporary academic theory, models
and debate. Your dissertation will comprise a number of
integrative elements all of which will contribute to the
achievement of the learning outcomes f or this unit.
• You will receive supervision and guidance through the process
by regular communication and f eedback on your progress
by the tutor.
• Please see the “Guided Learning” section of the BREO unit
site f or detailed guidelines f or writing each section of a
19. dissertation.
• The main assessment and marking criteria are listed at the end
of this assignment brief .
What do I need to do to pass? (Threshold Expectations from
UIF)
In order to PASS Assessment 2, you will need to:
• Demonstrate critical assessment of theories underpinning the
aim and objectives of the project and integrate this
understanding into a coherent f ramework f or analysing case
studies or other data/evidence.
• Develop a research design to identif y and assemble sources of
data and evidence and carry our data analysis as
appropriate to achieve the aim and objectives.
• Demonstrate critical analysis and evaluation of case
studies/evidence, debate the implications of the analysis and
develop a tangible deliverable.
How do I produce high quality work that merits a good grade?
We will be filling this section in together in class on Click or
tap to enter a date. make sure you have downloaded/printed out
the
Assignment Brief and bring it to the session with you.
20. We suggest that you avoid writing in the f irst person (“I”);
rather the third person is recommended (e.g. it can theref ore be
suggested
that...).
You may include headings and subtitles and a contents page if
you f eel this will help you to stay f ocused and create clearer
sign -
posting f or the reader.
Guide to writing the Project Report
Section / Title Details / Guidance
Title page Title of your report.
Executive
Summary
Concise summary of your report, including aim, analysis, key
conclusions and recommendations
(comes f irst, written last)
Contents Page Include page numbers.
Introduction Introduction to the report setting out what the aims
and objectives of the report are, the context,
what the report will cover, why and your method of analysis.
Must be supported by the ideas of
inf luential contributors using in text citations.
21. Methodology Justif y the choice of your research methodology
(e.g. primary or secondary) f or data collection
and analysis and design the approaches that best f it your
research project.
Consider any ethical issues considered and explain clearly your
sources of inf ormation
Literature Review You will need to draw on a wide range of
recent (2008-2018) quality academic sources, including
peer-reviewed material, combined with practical examples to
support your arguments. You will
need to critically evaluate the sources in relation to the
application of theory to practice.
Analysis You need to state and justif y the method of analysis
as appropriate to the aim and objectives of
your project. If using systematic literature review you will need
to present f ull details of the
3
Literature:
Use academic source, i.e. books, journal articles etc. Ref er to
respected industry sources DO NOT overuse the Internet, do not
use and / or quote from Wikipedia.
22. Reminder:
You are required to use proper in-text ref erence and the ref
erence list in the end using the Harvard Referencing System.
The writing:
Try to approach this assignment in a logical and systematic
way. Make sure you have a logical structure, a convincing
argument,
clear description of the situations which ‘set the scene’, and
clear explanation which relate to theories, and a conclusion that
draws
your argument together.
search(es) with number of results and inclusion/exclusion
criteria resulting in the f inal sample of
evidence f or review.
You need to present the evidence (data) published in quality
academic sources. You need to
analyse in-depth the evidence (data) and present the f indings
clearly.
For systematic review and comparative analysis methods a table
is usef ul to illustrate the
f indings.
Word count f or this section will depend on the topic of your
project and may vary widely between
23. projects
Discussion In the discussion, you will need to interpret your f
indings with ref erence to theories introduced in
the literature review. Apply the theory to the data, critically
analyse and evaluate in -depth the
ef f ectiveness of theory in applied in practice. What is the
unique insight f rom your research?
Conclusions This section should initially answer the report aim
and objectives and draw together the main
points f rom your analysis. It summarises what has been learned
f rom undertaking this project
concerning the application of theory into practice. What are
the main conclusions f rom your
project? No new inf ormation should be presented in the
conclusions.
Recommendations Make recommendations f or improvement
based upon your conclusions, clearly stating how they
can add value. Recommendations should be f ully f easible and
justif ied considering costs, priority
level, timescale, resources, who is responsible, benef its and
any f urther implications. Proposals
should be actionable (‘immediately implementable’) not just a
list of ideas.
Ref erence List A list of all sources cited directly in the text
using Harvard ref erencing style
24. Ref erences/Bibliography – NOT OPTIONAL
The ref erences/bibliography should comprise a variety of
sources used in the text, most of
which should be academic journal articles. Other sources could
include books, trade
publications, news articles, industry reports, company websites
etc.
Harvard ref erencing style is expected
How does assignment relate to what we are doing in scheduled
sessions?
The first sessions will provide an insight into the tools that can
be used to develop a proposal. Further help will be provided by
local tutors during workshops to develop a bespoken approach.
4
How will my assignment be marked?
25. Your assignment will be marked according to the threshold
expectations and the criteria on the following page .
You can use them to evaluate your own work and consider your
grade before you submit.
Criteria Pass Good Pass Commendation Distinction
Introduction
Weight 10%
40 to 49 %
A rea sonable
introduction with
objectives mentioned,
but not clea rly stated a nd
not put in context.
50 to 59 %
A good introduction with
clea r ba ckground
information a nd sta tement
of objectives which link to
resea rch questions.
26. 60 to 69 %
A well-presented
introduction with clea r
ba ckground information
a nd clea r statement of
objectives with ra tionale,
linked to purpose a nd scope
of the work.
70 to 100 %
A complete a nd thorough
introduction with clea r
ba ckground information
a nd sta tement of objectives
with a comprehensive a nd
persua sive ra tionale.
Literature Review
Weight 25%
40 to 49 %
Evidence of a limited
knowledge of the
27. releva nt litera ture. Some
critica l a rea s a re
included.
50 to 59 %
Evidence of a satisfactory
review of releva nt
litera ture, containing
a ca demically sound
sources.
60 to 69 %
Evidence of a
comprehensive review of
releva nt litera ture with a
ra tionale. The review
contains a good variety of
a ca demically va lid sources.
70 to 100 %
Evidence of critica l
eva luation of relevant
litera ture a nd a convincing
ra tionale. The review
contains a rea sonably wide
28. va riety of a cademically
va lid sources.
Research
Methodology
Weight 20%
40 to 49 %
Evidence of some
understanding of the
resea rch methodology
used, but la cking cla rity
a nd purpose.
50 to 59 %
Evidence of some
understanding of
methodology used a nd how
a re a ppropriate to the
resea rch question.
60 to 69 %
Evidence of a sound
29. understanding of the
possibilities a nd limita tions
of the methodology used
a nd a pply it rea sonably well
for da ta collection a nd
a na lysis.
70 to 100 %
Evidence of a n a dvanced
a wa reness of the
possibilities a nd limita tions
of the methodologies used
a nd a pply it soundly for
robust da ta collection a nd
a na lysis.
Analysis/Discussions
of findings and
conclusions
Weight 25%
40 to 49 %
Discussion is not so
releva nce to the research
30. question. Some evidence
of a nalysis support
reported findings.
50 to 59 %
Evidence of sa tisfactory
a na lysis a nd judgement.
Rea sonable a rguments
ba sed on a firm foundation
from the question through
to the conclusions
constructed.
60 to 69 %
Evidence of sound a nalysis
a nd judgement. Persuasive
a rguments based on a firm
foundation from the
question through to the
conclusions constructed.
70 to 100 %
Evidence of robust a nalysis
a nd judgement. Precise a nd
31. persua sive arguments
ba sed on a firm foundation
from the question through
to the conclusions
constructed
Coherence
Weight 10%
40 to 49 %
Evidence of
prepa redness to state a
position on a n issue but
with a limited use of
supporting evidence.
50 to 59 %
Evidence of a bility to sta te,
on the ba sis of evidence a
personal position on a n
issue, a selection of
a ppropria te materia l with a
60 to 69 %
32. Evidence of a bility to sta te
a nd defend on the basis of
evidence a personal position
on a n issue. Clea r evidence
of a selection of a ppropriate
70 to 100 %
As for commendation with
a n a dditional fla ir a nd
ima gina tion. Cogent and
clea r sta tements reflecting
5
Where a n a rgument is
not presented in a
coherent or critica l form.
logica l structure a nd
coherent argument.
ma terial with a logica l
structure a nd coherent
a rgument, which displa y
33. high levels of critica lity.
findings a nd a statement of
future direction.
Structure, format,
language and
referencing
Weight 10%
40 to 49 %
Rea sonable structure,
a ca demically sound
la ngua ge a nd formatting,
a nd rea sonable
referencing.
50 to 59 %
Rea sonably well-structured
a nd proofread report,
linking to the question
through to da ta collection
to findings. Good use of
34. references.
60 to 69 %
Well-structured and
proofread report which is
linked to the research
question and findings.
Appropriate use of
references.
70 to 100 %
Very well-structured report
which is strongly linked to
the research question and
findings. Very well
presented supporting
references.
3rd Class – 40-49% Lower 2nd – 50-59% Upper 2nd – 60-69%
1st Class – 70%+