SlideShare a Scribd company logo
1 of 35
Feedback from Lee Smith-Dennis
25/03/20 19:41
You have produced a reasonable rationale for conducting the
study, but must be clearer with your research questions as two
are very similar. Your literature review is reasonable, but
includes some very dated references which are now irrelevant.
Your methodology could be more detailed as you must explain
why you are choosing the methods that you are.
Your potential outcomes are reasonably clear. Overall, a
reasonable attempt but failing to show a current research gap.
Feedback from Ali Rasel
27/03/20 14:14
The proposal shows a good study background with a clear aim
and objectives. The rationale and significance of the study are
not clear. You need to use a specific theory to understand the
subject matter. The review seems to be done on mobile banking
in general. It should include ideas about security issues with
mobile banking. The review needs to be more critical. Research
methodology needs to be connected to the research
questions. You need to show the number of studies you are
going to systematically review. If Meta-analysis is the main
method to answer the research questions, you need to review
studies on the same topic and show how you are going to do
Meta-analysis with an appropriate analysis tool. Potential
outcomes need to be explained with good evidence of
analysis. The writing structure is fine but you need to improve
your English with good grammar and academic
writing. Referencing follows the Harvard style despite a few
journal references have been used in the proposal.
MBA Managerial Project Proposal
Security Issues in Mobile Banking System of the Maldives and
Its Effect on Customers
Executive Summary
Mobile Banking revolutionized the way people do banking.
Technology has brought the ease of doing a financial
transaction to the finger-tips. However, this radical
developmental has also lead to great negative impacts on the
customers due to security issues. This study seeks to investigate
the Security Issues in Mobile Banking System of the Maldives
and its Effect on Customers.
With the existing literature that demonstrates the Mobile
Banking and security issues and measures to counter, the study
will use Meta-analysis to bring a statistical solution to fill the
knowledge gap in the context of the research. Moreover,
existing models will be critically reviewed to find solutions to
the research questions and achieve objectives of the study.
Contents
Executive Summary 2
List of Figures 4
List of Table 4
1.0 Introduction 5
1.1 Area of Research 5
1.2 Research context 5
1.3 Scope of the study 6
1.3.1Research Question 6
1.3.2Research aim 7
1.3.3Research Objectives 7
1.4 Rationale of the Study 7
2.0 Literature Review 8
2.1 Model of E-Fraud 8
2.2 Bio-metrics model for authentication 9
2.3 Literature Review Summary 9
3.0 Research Methodologies 10
3.1 Research Philosophy 10
3.2 Research Approach 10
3.3 Research Design 11
3.4 Research Instruments Data Collection Methods 11
3.5 Data Analysis Method 11
3.6 Ethical Issues 11
3.7 Expected Sources of Information 12
4.0 Potential Outcomes 13
4.1 Research Plan 13
5.0 Reference Cited 14
6.0 Bibliography 15
List of Figures
Figure 1. E-Fraud Model
…………………………………………………… 8
Figure 2. Bio-Metric Model for Authentication
…………………………………… 9
Figure 3: Research Approach
……………………………………………………………10
Figure 4: Research Design
…………………………………………………………….11
List of Table
Figure 4: Gantt Chart
………………………..…………………………………………
13
Security Issues in Mobile Banking System of the Maldives and
Its Effect on Customers
1.0 Introduction
The technological advancement and the innovative trends that
endures to coerce the way of banking is perhaps convenient and
bringing customers more nearer to the banks. These
groundbreaking innovations has led to the establishment of
Mobile Banking where services have been brought to the finger-
tips of the customers all over the world in a very short span of
time. The advantage of technology is also abused by various
hackers and other cyber criminals. Thus, bringing the security
issue as a threat in using Mobile Banking Systems that have a
direct impact on customers.
1.1 Area of Research
The chosen area for research for this study is “Security Issues in
Mobile Banking System of the Maldives and Its Effect on
Customers”. 1.2 Research context
At this age of technology, robbing banks by using weapons and
physical force has almost become fictional. Cyber fraud or E-
frauds, Identity theft and phishing are common crimes
committed in stealing funds from bank accounts (Belcher,
2004). Furnell and Evangelatos (2007) has argued that degree of
trust among the mobile banking customers diminishes as E-
fraud usage occurs due to unauthorized transactions. Similarly,
they have also argued reliability is an important factor
determining the trust between the mobile banking system and
communication between the mobile device during transaction
(Furnell and Evangelatos, 2007).
In this context, the Maldives is not detached from the identified
problem and the Maldives Police has reported more than 65
cases and theft of more than half a Million Ruffiya (Maldives
Independent, 2017). Thus, security threats posing a significant
threat on customers.
Maldives, even though have a population less than a mere
400,000 people dispersed into over 200 islands, adapting to the
revolutionizing technology is fast and quick. According to the
Communications Authority of Maldives (CAM, 2019), total
mobile subscribers in the Maldives amounts to 839,528
depicting 1:2 in mobile subscription. In addition, CAM (2019)
also has published that there are 90,237 fixed broadband
subscribers and 266,495 mobile broadband subscribers. Bank of
Maldives or the national bank in the Maldives introduced the
vital service of Mobile Banking service to its customers in July
2015, with the launch of its new Mobile Banking Application
available for use on Apple and Android smartphones
(Aramudhan, 2008).
However, with the growing trend of technology many
individuals are still not using Mobile banking and opt to go for
the traditional retail branch banking. The reasons are unknown
to the banks as to why people do not want to adopt internet
banking. This remains the case in many other countries as well.
With the increase in technology currently Bank of Maldives
(BML), HSBC, State Bank of India (SBI), Maldives Islamic
Bank (MIB) and Bank of Ceylon (BOC) has adopted Mobile
banking in the Maldives. According to Harb, Farahat and Ezz
(2008) Banking via mobile is changing lives of people all over
the world whereby they can make banking transaction 24 hours
a day wherever they are. It has added up to the convenience of
adapting to new technologies. Furthermore, it has helped many
people who are too busy and have no time to visit traditional
bank branches and make transactions. Using mobile banking has
many advantages for users such as saving time and the accuracy
of information flow.
This study intends to study the Security Issues in Mobile
Banking System of the Maldives and its Effect on Customers.
1.3 Scope of the study
This study will focus on the security issues in the Mobile
Banking System in the Maldives on the one hand and its impact
on customers on the other hand.Security issues describes the
existing cybercrime techniques like phishing attacks, E-fraud,
virus attacks, spoofing and etc.
1.3.1Research Question
What are the Security Issues in Mobile Banking System of the
Maldives and its Effects on Customers?
The study will further try to investigate the following;
· What are the security issues in Mobile Banking System in the
Maldives?
· How reliable is the current Mobile Banking System with
reference to security in the Maldives?
· What are the effects of security issues on customers?
1.3.2Research aim
Through various models based on the literature, this study will
insist to find out the most fragile area in Mobile Banking and
how that threat could be minimized to increase the trust and
reliability to the Mobile Banking System in the Maldives.
1.3.3Research Objectives
The objectives are subjected to change as the research
progresses.
· To analyze the current Mobile Banking System.
· To identify the security issues in Mobile Banking System.
· To assess the reliability of the current Mobile Banking
System with reference to security.
· To examine the effect of security on customers.
1.4 Rationale of the Study
Literature survey reveals that there are models that would allow
to understand the context and mechanics of E-fraud. Therefore
the basis of this study will be to examine one of the models that
will help to build the trust in Mobile Banking and minimize
risks and effects on the prevailing security issues.
2.0 Literature Review
Various literature and models are available on the security
issues of Mobile Banking and its effect on customers.
Aramudhan (2008) has revealed that User Assigned Security
Policy Framework for m-commerce Applications increases its
security levels from both the user and server side to increase the
reliability. Similarly, Bangdao and Rosco (2010) has argued
that increasing the Mobile Electronic Identity through
biometrics secures payment on Mobile phones. In 2016, A.S.
Bhatt has identified the factors Affecting Customer’s Adoption
of Mobile Banking Services. Furthermore, Lee and Chung
(2009) argued that a Developed Information System model
would increase customer satisfaction and reliability on the
Mobile Banking services as payment transactions are made
without any human contact.
A study conducted Amola (2016) to analyze the factors
affecting customer’s adoption of Mobile Banking Services
revealed demographic, attitudinal, and behavioral
characteristics of mobile bank users are interconnected, but
security issues were not addressed. In another study by Palani
(2012) to examine customers perception towards Mobile
Banking in Indian Overseas Bank Chennai identified the
causative factors so that mobile banking can be used by
more people to make banking operations more cost effective.
However, one of the compelling model on E-fraud which is
relevant to this study was formulated by Malakedsuwan and
Stevens (2003) identifying key elements that describes E-fraud
and effective counter measures to increase customers trust.
2.1 Model of E-Fraud
E-Fraud Model ofMalakedsuwan and Stevens (2003) focuses on
five key elements to exhibit a reliable model to identify and
examine e-fraud and its impact. The model is illustrated below
with the key elements.
Perpetrator
Mode of Attack
Target System
Target Entity
Impact
Figure 1. E-Fraud Model
Key element one is the Perpetrator or the attacker. According to
Malakedsuwan and Stevens (2003) the perpetrator will be either
internal or external to the entity committing the fraud.
Secondly, the Mode of Attack describes the technique used to
execute the fraud. Malakedsuwan and Stevens (2003) states that
the fraudulent activity can be conducted through technical
modes like IP spoofing or malicious codes and non-technical
modes like identity stealing. The third element of Target System
describes the system through which the fraudulent activity is
conducted or perpetrated. Fourthly, Target Entity features
individuals or organizations by identifying the weaknesses in
the systems. The last element explains the Impact, whetherthe
perpetration has incurred financial losses or non-financial losses
like loss of competitive advantage and reputation.
2.2 Bio-metrics model for authentication
In 2011, Bilal and Sankar proposed a Bio-Metrics model for
Mobile Banking Authentication, where finger-print is the
mechanism to counter-measure the existing security issue. Their
study through literature review and study of existing systems
using login, password and SMS mechanisms showed that only
the authorized user will be able to use particular account.
Mobile Device
Bio-Metric Device
Bank System
Figure 2. Bio-Metric Model for Authentication
Bilal and Sankar (2011) in their study of Trust and Security
Issues in Mobile Banking and its effect on Customers showed
that 90% of the respondents strongly agreed that such a model
will increase the ease of use of Mobile Banking and 70% agreed
that this model will increase customer satisfaction while 60%
agreed it will reduce fraud, thus increasing trust and safety.
2.3 Literature Review Summary
The literature review revealed that there are pros and cons of
using Mobile Banking in the evolving technological
phenomenon (Chandran, 2014). It is also evident as Bilal and
Sankar (2011) has suggested that invalidating security issues to
0% is not possible. However, with many security measures, it
can only be reduced and prevented (Chandran, 2014). Despite
the literature demonstrated in this section, upon analysis on the
context of this study, it will viable and suitable to use the E-
fraud Model by Malakedsuwan and Stevens (2003).
3.0 Research Methodologies
As Saunders, Lewis and Thornhill (2009) suggests, a research
can be classified into perspectives of (i) application of research
study (ii) objectives in undertaking the research and (iii)
inquiry mode employed. From these perspectives, in practice,
most studies are a combination of descriptive, correlational and
exploratory researches which is categorized under the second
perspective of objectives in undertaking the research. 3.1
Research Philosophy
The research philosophy intended to use in this study will be
Pragmatism in order to emphasize and use both positivist and
interpretivist elements of epistemology (Saunders, Lewis and
Thornhill, 2009). In this way, to adapt pragmatism Systematic
literature review will be conducted as the study will focus on
studying issues to bring out positive consequences by examining
the existing secondary sources to be synthesized and evidence
compared (Saunders, Lewis and Thornhill, 2009).
3.2 Research Approach
The Secondary data required for the research will be collected
with the help of the analysis of the historical records and
analysis of the documents. The Historical record presents the
data about the mobile banking which have been collected by the
various researchers in mobile banking field (Bloor et al, 2000).
The Secondary data will help in finding out the process of
adoption for any kind of new innovation among the users. Thus,
the research approach will be divided into the following four
phases.
PHASE 1
Research Design
PHASE 2
Conduct
PHASE 3
Analysis
PHASE 4
Structure and writing
Figure 3: Research Approach
3.3 Research Design
The research will designed as follows;
RESEARCH DESIGN
1. Contribution to the existing knowledge gap
2. Potential
Audience
3. Purpose of the
Research
4. Appropriate
Method
5. Search
Strategy
Figure 4: Research Design
3.4 Research Instruments Data Collection Methods
For collecting this data various news articles, magazines,
journal articles and data bases would be searched in order to
present the relative data about the research.
3.5 Data Analysis Method
After collection and reviewing of literature, Meta–analysis will
be used to answer the formulated research questions. Meta-
analysis enables to bring out a statistical solution by weighing
the reviewed literature into classification by codes (Saunders,
Lewis and Thornhill, 2009). This analysis method would
therefore enable the researcher to assess the impact of excluding
or down weighing unpublished studies, low quality studies and
out-of-date studies.
3.6 Ethical Issues
There will be no ethical issues, since this study will consist of
secondary research which will be fully cited and referenced.
3.7 Expected Sources of Information
The expected sources of information includes
i) Annual Reports of the Banks in the Maldives.
ii) Online Libraries for journal articles.
iii) Books.
iv) Online news articles.
4.0 Potential Outcomes
From this study, the author will be able to identify the security
issues that pertains in the Mobile Banking System in the
Maldives. In the light of the literature, the author will also be
able to find the gap in the existing literature on security issues.
In addition, identifying perpetrators, mode of attack, target
system, target entity and impact will help to find the answers
for the research questions and formulate counter measures.
4.1 Research Plan
Table 1: Gantt Chart
5.0 Reference Cited
Aramudhan M 2008, User Assigned Security Policy Framework
for m-commerce Applications, International Conference
Computer and Communication Engineering, ICCCE 2008, pp.
148-150.
Bangdao C and Rosco A W 2010, Mobile Electronic Identity:
Securing Payment on Mobile Phones, pp.1-15
Bhatt A S B 2016, Factors Affecting Customer’s Adoption of
Mobile Banking Services, Journal of Internet Banking and
Commerce, Vol.3, pp 8-13.
CAM (2019). Telecom Statistics – November 2019. [online].
Communications Authority of Maldives. [Viewed 2 March
2020]. Available from http://www.cam.gov.mv/Statistics.htm
Chandran R 2014, Pros and Cons of Mobile Banking,
International Journal of Scientific and Research Publications,
Vol. 4, Issue 10, pp. 1-5
Furnell S and Evangelatos K 2007, Public awareness and
perceptions of biometrics, Journal of Computer Fraud &
Security, vol. 2007, pp. 8-13.
Harb H, Farahat H, and Ezz M 2008, SecureSMSPay: Secure
SMS Mobile Payment Model, 2nd International Conference on
Anti-counterfeiting, Security and Identification, 2008. ASID
2008, pp. 11-17.
Lee K C and Chung N 2009, Understanding Factors Affecting
Trust in and Satisfaction With Mobile Banking in Korea: A
Modified DeLone and McLean's Model Perspective, Journal of
Interacting with Computers, Vol. 21, pp. 385-392.
Maldives Independent (2017). More than half a Million Ruffiya
Stolen in phone scams. [online]. [Viewed 2 March 2020].
Available from https://maldivesindependent.com/society/more-
than-half-a-million-rufiyaa-stolen-in-phone-scams-120943
Palani P 2012, A Study On Customer Perception Towards
Mobile Banking In Indian Overseas Bank Chennai,
International Journal of Trend in Scientific Research and
Development (IJTSRD) International Open Access Journal, Vol.
2, pp. 259.6.0 Bibliography
Chuchen C 2016, The Perception of Mobile Banking Adoption:
The Study of Behavioral, Security, and Trust in Thailand,
Behavioral, Security, and Trust in Thailand, International
Journal of Social Science and Humanity, Vol. 6, No. 7, pp. 547-
550.
Coface.com. 2020. Risk Analyses And Evaluations / Our
Economic Studies / Our Business - Coface. [online] Available
at: <https://www.coface.com/Our-business/Our-economic-
studies/Risk-analyses-and-evaluations> [Accessed 22 February
2020].
Devaraj, S., Krajewski, L. and Wei, J., 2007. Impact of
eBusiness technologies on operational performance: The role of
production information integration in the supply chain. Journal
of Operations Management, 25(6), pp.1199-1216.
My New Desk (2014). Phishing Fraud (Maldives Mobile
Banking) [online] Bank of Maldives. [Viewed 11 March 2020].
Available from
http://www.mynewsdesk.com/mv/bankofmaldives/pressreleases/
phishing-fraud-maldives-mobile-banking-1043407
Mallat N, Rossi M and Tuunainen V. K 2004, Mobile Banking
Services, Communications of the ACM, Vol. 47, May. 2004, pp.
42–46.
Nie J and Hu X 2008, Mobile Banking Information Security and
Protection Methods, International Conference on Computer
Science and Software Engineering, 2008, pp. 587-590.
Peng L and Lai L 2009, A Study on Service Quality Assurance
in Mobile Commerce, Journal of Computer Science and
Engineering, pp. 207-211.
Pfitzmann A, Pfitzmann B, Schunter M and Waidner M 1997,
Trusting Mobile User Devices and Security Modules, Computer,
Vol. 30, pp. 61-68.
Wei D and Yanling T 2010, Research on Security Payment
Technology Based on Mobile E-Commerce, 2nd International
Conference on e-Business and Information System Security
(EBISS), 2010, pp. 1-4.
Ying L and Can Z 2010, Customer's Adoption Decision Analysis
of Mobile Banking Service, Journal of Management and Service
Science (MASS), pp. 1-4.
Zhuo Q Y and Li Y 2010, Chinese Mobile Banking Service
Evaluation Based on AHP Method, International Conference on
E-Product E-Service and E-Entertainment (ICEEE), 2010, pp. 1-
5.
14 | Page
What am I required to do in this assignment?
You should complete and submit the final dissertation to the
relevant submission link via Assessment & Feedback on BREO
by the deadline.
Note: Turnitin will be used for all submissions to check for
plagiarism. We also reserve the right to initiate a viva voce
examination if we have concerns regarding the originality of
your submission. Dates of the Viva will be provided during the
induction week. You need to be available for such an event
following the submission of your dissertation.
• Your f inal assessment will be an individual managerial
dissertation which will be a considered and comprehensive
response to your research objectives agreed with your
supervisor.
• Your dissertation will encapsulate your approach to the
research, the research methods that you have deployed, an
analysis of the knowledge generated as part of the
investigative process and a ref lection on your personal
development
as a consequence of this research p roject experience.
Submission Deadline Marks and Feedback
Before 10am on:
Click or tap to enter a date.
20 working days after deadline (L4, 5 and 7)
15 working days after deadline (L6)
10 working days after deadline (block delivery)
Click or tap to enter a date.
Unit title & code MBA Managerial Project; APO017-6
Assignment number and title 2 Dissertation
Assessment type Individual Written Report
Weighting of assessment 80%
Size or length of assessment 10000 words (+/- 10%)
Unit learning outcomes 1 Demonstrate the f ollowing knowledge
and understanding
• Demonstrate a systematic understanding and critical
appreciation of the
interrelationship of diverse theories in the MBA toolkit to
challenge existing
preconceptions and develop positive and enquiring approaches
to global
management and enterprise. Demonstrate an aptitude and ability
to solve a def ined
business problem through enquiry having drawn upon your
MBA studies and
appreciating the interrelated nature of organisations.
2 Demonstrate the f ollowing skills and abilities
Demonstrate intelligent practice by imaginative and critical
integration of theory and
practice to create a tangible deliverable through critical insightf
ul evaluation
stipulating areas of excellence and ref lecting on areas f or
development to improve
perf ormance in contemporary organisations.
2
• It will need to demonstrate your understanding of the topic
area in the context of contemporary academic theory, models
and debate. Your dissertation will comprise a number of
integrative elements all of which will contribute to the
achievement of the learning outcomes f or this unit.
• You will receive supervision and guidance through the process
by regular communication and f eedback on your progress
by the tutor.
• Please see the “Guided Learning” section of the BREO unit
site f or detailed guidelines f or writing each section of a
dissertation.
• The main assessment and marking criteria are listed at the end
of this assignment brief .
What do I need to do to pass? (Threshold Expectations from
UIF)
In order to PASS Assessment 2, you will need to:
• Demonstrate critical assessment of theories underpinning the
aim and objectives of the project and integrate this
understanding into a coherent f ramework f or analysing case
studies or other data/evidence.
• Develop a research design to identif y and assemble sources of
data and evidence and carry our data analysis as
appropriate to achieve the aim and objectives.
• Demonstrate critical analysis and evaluation of case
studies/evidence, debate the implications of the analysis and
develop a tangible deliverable.
How do I produce high quality work that merits a good grade?
We will be filling this section in together in class on Click or
tap to enter a date. make sure you have downloaded/printed out
the
Assignment Brief and bring it to the session with you.
We suggest that you avoid writing in the f irst person (“I”);
rather the third person is recommended (e.g. it can theref ore be
suggested
that...).
You may include headings and subtitles and a contents page if
you f eel this will help you to stay f ocused and create clearer
sign -
posting f or the reader.
Guide to writing the Project Report
Section / Title Details / Guidance
Title page Title of your report.
Executive
Summary
Concise summary of your report, including aim, analysis, key
conclusions and recommendations
(comes f irst, written last)
Contents Page Include page numbers.
Introduction Introduction to the report setting out what the aims
and objectives of the report are, the context,
what the report will cover, why and your method of analysis.
Must be supported by the ideas of
inf luential contributors using in text citations.
Methodology Justif y the choice of your research methodology
(e.g. primary or secondary) f or data collection
and analysis and design the approaches that best f it your
research project.
Consider any ethical issues considered and explain clearly your
sources of inf ormation
Literature Review You will need to draw on a wide range of
recent (2008-2018) quality academic sources, including
peer-reviewed material, combined with practical examples to
support your arguments. You will
need to critically evaluate the sources in relation to the
application of theory to practice.
Analysis You need to state and justif y the method of analysis
as appropriate to the aim and objectives of
your project. If using systematic literature review you will need
to present f ull details of the
3
Literature:
Use academic source, i.e. books, journal articles etc. Ref er to
respected industry sources DO NOT overuse the Internet, do not
use and / or quote from Wikipedia.
Reminder:
You are required to use proper in-text ref erence and the ref
erence list in the end using the Harvard Referencing System.
The writing:
Try to approach this assignment in a logical and systematic
way. Make sure you have a logical structure, a convincing
argument,
clear description of the situations which ‘set the scene’, and
clear explanation which relate to theories, and a conclusion that
draws
your argument together.
search(es) with number of results and inclusion/exclusion
criteria resulting in the f inal sample of
evidence f or review.
You need to present the evidence (data) published in quality
academic sources. You need to
analyse in-depth the evidence (data) and present the f indings
clearly.
For systematic review and comparative analysis methods a table
is usef ul to illustrate the
f indings.
Word count f or this section will depend on the topic of your
project and may vary widely between
projects
Discussion In the discussion, you will need to interpret your f
indings with ref erence to theories introduced in
the literature review. Apply the theory to the data, critically
analyse and evaluate in -depth the
ef f ectiveness of theory in applied in practice. What is the
unique insight f rom your research?
Conclusions This section should initially answer the report aim
and objectives and draw together the main
points f rom your analysis. It summarises what has been learned
f rom undertaking this project
concerning the application of theory into practice. What are
the main conclusions f rom your
project? No new inf ormation should be presented in the
conclusions.
Recommendations Make recommendations f or improvement
based upon your conclusions, clearly stating how they
can add value. Recommendations should be f ully f easible and
justif ied considering costs, priority
level, timescale, resources, who is responsible, benef its and
any f urther implications. Proposals
should be actionable (‘immediately implementable’) not just a
list of ideas.
Ref erence List A list of all sources cited directly in the text
using Harvard ref erencing style
Ref erences/Bibliography – NOT OPTIONAL
The ref erences/bibliography should comprise a variety of
sources used in the text, most of
which should be academic journal articles. Other sources could
include books, trade
publications, news articles, industry reports, company websites
etc.
Harvard ref erencing style is expected
How does assignment relate to what we are doing in scheduled
sessions?
The first sessions will provide an insight into the tools that can
be used to develop a proposal. Further help will be provided by
local tutors during workshops to develop a bespoken approach.
4
How will my assignment be marked?
Your assignment will be marked according to the threshold
expectations and the criteria on the following page .
You can use them to evaluate your own work and consider your
grade before you submit.
Criteria Pass Good Pass Commendation Distinction
Introduction
Weight 10%
40 to 49 %
A rea sonable
introduction with
objectives mentioned,
but not clea rly stated a nd
not put in context.
50 to 59 %
A good introduction with
clea r ba ckground
information a nd sta tement
of objectives which link to
resea rch questions.
60 to 69 %
A well-presented
introduction with clea r
ba ckground information
a nd clea r statement of
objectives with ra tionale,
linked to purpose a nd scope
of the work.
70 to 100 %
A complete a nd thorough
introduction with clea r
ba ckground information
a nd sta tement of objectives
with a comprehensive a nd
persua sive ra tionale.
Literature Review
Weight 25%
40 to 49 %
Evidence of a limited
knowledge of the
releva nt litera ture. Some
critica l a rea s a re
included.
50 to 59 %
Evidence of a satisfactory
review of releva nt
litera ture, containing
a ca demically sound
sources.
60 to 69 %
Evidence of a
comprehensive review of
releva nt litera ture with a
ra tionale. The review
contains a good variety of
a ca demically va lid sources.
70 to 100 %
Evidence of critica l
eva luation of relevant
litera ture a nd a convincing
ra tionale. The review
contains a rea sonably wide
va riety of a cademically
va lid sources.
Research
Methodology
Weight 20%
40 to 49 %
Evidence of some
understanding of the
resea rch methodology
used, but la cking cla rity
a nd purpose.
50 to 59 %
Evidence of some
understanding of
methodology used a nd how
a re a ppropriate to the
resea rch question.
60 to 69 %
Evidence of a sound
understanding of the
possibilities a nd limita tions
of the methodology used
a nd a pply it rea sonably well
for da ta collection a nd
a na lysis.
70 to 100 %
Evidence of a n a dvanced
a wa reness of the
possibilities a nd limita tions
of the methodologies used
a nd a pply it soundly for
robust da ta collection a nd
a na lysis.
Analysis/Discussions
of findings and
conclusions
Weight 25%
40 to 49 %
Discussion is not so
releva nce to the research
question. Some evidence
of a nalysis support
reported findings.
50 to 59 %
Evidence of sa tisfactory
a na lysis a nd judgement.
Rea sonable a rguments
ba sed on a firm foundation
from the question through
to the conclusions
constructed.
60 to 69 %
Evidence of sound a nalysis
a nd judgement. Persuasive
a rguments based on a firm
foundation from the
question through to the
conclusions constructed.
70 to 100 %
Evidence of robust a nalysis
a nd judgement. Precise a nd
persua sive arguments
ba sed on a firm foundation
from the question through
to the conclusions
constructed
Coherence
Weight 10%
40 to 49 %
Evidence of
prepa redness to state a
position on a n issue but
with a limited use of
supporting evidence.
50 to 59 %
Evidence of a bility to sta te,
on the ba sis of evidence a
personal position on a n
issue, a selection of
a ppropria te materia l with a
60 to 69 %
Evidence of a bility to sta te
a nd defend on the basis of
evidence a personal position
on a n issue. Clea r evidence
of a selection of a ppropriate
70 to 100 %
As for commendation with
a n a dditional fla ir a nd
ima gina tion. Cogent and
clea r sta tements reflecting
5
Where a n a rgument is
not presented in a
coherent or critica l form.
logica l structure a nd
coherent argument.
ma terial with a logica l
structure a nd coherent
a rgument, which displa y
high levels of critica lity.
findings a nd a statement of
future direction.
Structure, format,
language and
referencing
Weight 10%
40 to 49 %
Rea sonable structure,
a ca demically sound
la ngua ge a nd formatting,
a nd rea sonable
referencing.
50 to 59 %
Rea sonably well-structured
a nd proofread report,
linking to the question
through to da ta collection
to findings. Good use of
references.
60 to 69 %
Well-structured and
proofread report which is
linked to the research
question and findings.
Appropriate use of
references.
70 to 100 %
Very well-structured report
which is strongly linked to
the research question and
findings. Very well
presented supporting
references.
3rd Class – 40-49% Lower 2nd – 50-59% Upper 2nd – 60-69%
1st Class – 70%+
Feedback from Lee Smith-Dennis250320 1941You have produced .docx

More Related Content

Similar to Feedback from Lee Smith-Dennis250320 1941You have produced .docx

1972 article text-3761-1-10-20200307 (1)
1972 article text-3761-1-10-20200307 (1)1972 article text-3761-1-10-20200307 (1)
1972 article text-3761-1-10-20200307 (1)college
 
Study on Internet banking security.pdf
Study on Internet banking security.pdfStudy on Internet banking security.pdf
Study on Internet banking security.pdfMeenakshiSankar7
 
IMPACT OF MOBILE BANKING ON CUSTOMER’S SATISFACTION IN TIRUCHIRAPPALLI TOWN
IMPACT OF MOBILE BANKING ON CUSTOMER’S  SATISFACTION IN TIRUCHIRAPPALLI TOWNIMPACT OF MOBILE BANKING ON CUSTOMER’S  SATISFACTION IN TIRUCHIRAPPALLI TOWN
IMPACT OF MOBILE BANKING ON CUSTOMER’S SATISFACTION IN TIRUCHIRAPPALLI TOWNPARAMASIVANCHELLIAH
 
ENMG 602 Homework Assignment 1 Problem 1 Observation.docx
ENMG 602 Homework Assignment 1 Problem 1  Observation.docxENMG 602 Homework Assignment 1 Problem 1  Observation.docx
ENMG 602 Homework Assignment 1 Problem 1 Observation.docxkhanpaulita
 
DIGITAL BANKING MADE TRANSACTION MORE TRUSTED AND SECURED?
DIGITAL BANKING MADE TRANSACTION MORE TRUSTED AND SECURED?DIGITAL BANKING MADE TRANSACTION MORE TRUSTED AND SECURED?
DIGITAL BANKING MADE TRANSACTION MORE TRUSTED AND SECURED?IAEME Publication
 
Perceptions of-uk-based-customers-toward-internet-banking-in-the-united-kingdom
Perceptions of-uk-based-customers-toward-internet-banking-in-the-united-kingdomPerceptions of-uk-based-customers-toward-internet-banking-in-the-united-kingdom
Perceptions of-uk-based-customers-toward-internet-banking-in-the-united-kingdomMashood Mukhtar
 
IJAMR200714.pdf
IJAMR200714.pdfIJAMR200714.pdf
IJAMR200714.pdfahaduint
 
M310106115
M310106115M310106115
M310106115aijbm
 
E banking factors of adoption in india 2-3-4
E banking  factors of adoption in india 2-3-4E banking  factors of adoption in india 2-3-4
E banking factors of adoption in india 2-3-4IAEME Publication
 
A Study on Factors of E Banking Challenges in India
A Study on Factors of E Banking Challenges in IndiaA Study on Factors of E Banking Challenges in India
A Study on Factors of E Banking Challenges in Indiaijtsrd
 
08_chapter 2.pdf
08_chapter 2.pdf08_chapter 2.pdf
08_chapter 2.pdfhamidpasha6
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
Journal of Internet Banking and Commerce An open acce.docx
Journal of Internet Banking and Commerce  An open acce.docxJournal of Internet Banking and Commerce  An open acce.docx
Journal of Internet Banking and Commerce An open acce.docxpriestmanmable
 
THE INFLUENCE OF MOBILE BANKING SERVICES ON CUSTOMER SATISFACTION
	 THE INFLUENCE OF MOBILE BANKING SERVICES ON CUSTOMER SATISFACTION	 THE INFLUENCE OF MOBILE BANKING SERVICES ON CUSTOMER SATISFACTION
THE INFLUENCE OF MOBILE BANKING SERVICES ON CUSTOMER SATISFACTIONNzabirinda Etienne
 
10-1108_XJM-07-2020-0039.pdf
10-1108_XJM-07-2020-0039.pdf10-1108_XJM-07-2020-0039.pdf
10-1108_XJM-07-2020-0039.pdfTayyaba Fatima
 
10-1108_IJBM-10-2018-0271 (Số 4 bằng TA).pdf
10-1108_IJBM-10-2018-0271 (Số 4 bằng TA).pdf10-1108_IJBM-10-2018-0271 (Số 4 bằng TA).pdf
10-1108_IJBM-10-2018-0271 (Số 4 bằng TA).pdfmyNguyen530
 
ONLINE POLICIES TO ENSURE CUSTOMER PRIVACY IN ONLI.docx
ONLINE POLICIES TO ENSURE CUSTOMER PRIVACY IN ONLI.docxONLINE POLICIES TO ENSURE CUSTOMER PRIVACY IN ONLI.docx
ONLINE POLICIES TO ENSURE CUSTOMER PRIVACY IN ONLI.docxvannagoforth
 
Customers perception of m banking adoption in of bahrain an empirical assess...
Customers perception of m banking adoption in of bahrain  an empirical assess...Customers perception of m banking adoption in of bahrain  an empirical assess...
Customers perception of m banking adoption in of bahrain an empirical assess...IJMIT JOURNAL
 
Customers perception of m banking adoption in kingdom of bahrain
Customers perception of m banking adoption in kingdom of bahrainCustomers perception of m banking adoption in kingdom of bahrain
Customers perception of m banking adoption in kingdom of bahrainIJMIT JOURNAL
 
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docx
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docxOral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docx
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docxgerardkortney
 

Similar to Feedback from Lee Smith-Dennis250320 1941You have produced .docx (20)

1972 article text-3761-1-10-20200307 (1)
1972 article text-3761-1-10-20200307 (1)1972 article text-3761-1-10-20200307 (1)
1972 article text-3761-1-10-20200307 (1)
 
Study on Internet banking security.pdf
Study on Internet banking security.pdfStudy on Internet banking security.pdf
Study on Internet banking security.pdf
 
IMPACT OF MOBILE BANKING ON CUSTOMER’S SATISFACTION IN TIRUCHIRAPPALLI TOWN
IMPACT OF MOBILE BANKING ON CUSTOMER’S  SATISFACTION IN TIRUCHIRAPPALLI TOWNIMPACT OF MOBILE BANKING ON CUSTOMER’S  SATISFACTION IN TIRUCHIRAPPALLI TOWN
IMPACT OF MOBILE BANKING ON CUSTOMER’S SATISFACTION IN TIRUCHIRAPPALLI TOWN
 
ENMG 602 Homework Assignment 1 Problem 1 Observation.docx
ENMG 602 Homework Assignment 1 Problem 1  Observation.docxENMG 602 Homework Assignment 1 Problem 1  Observation.docx
ENMG 602 Homework Assignment 1 Problem 1 Observation.docx
 
DIGITAL BANKING MADE TRANSACTION MORE TRUSTED AND SECURED?
DIGITAL BANKING MADE TRANSACTION MORE TRUSTED AND SECURED?DIGITAL BANKING MADE TRANSACTION MORE TRUSTED AND SECURED?
DIGITAL BANKING MADE TRANSACTION MORE TRUSTED AND SECURED?
 
Perceptions of-uk-based-customers-toward-internet-banking-in-the-united-kingdom
Perceptions of-uk-based-customers-toward-internet-banking-in-the-united-kingdomPerceptions of-uk-based-customers-toward-internet-banking-in-the-united-kingdom
Perceptions of-uk-based-customers-toward-internet-banking-in-the-united-kingdom
 
IJAMR200714.pdf
IJAMR200714.pdfIJAMR200714.pdf
IJAMR200714.pdf
 
M310106115
M310106115M310106115
M310106115
 
E banking factors of adoption in india 2-3-4
E banking  factors of adoption in india 2-3-4E banking  factors of adoption in india 2-3-4
E banking factors of adoption in india 2-3-4
 
A Study on Factors of E Banking Challenges in India
A Study on Factors of E Banking Challenges in IndiaA Study on Factors of E Banking Challenges in India
A Study on Factors of E Banking Challenges in India
 
08_chapter 2.pdf
08_chapter 2.pdf08_chapter 2.pdf
08_chapter 2.pdf
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
Journal of Internet Banking and Commerce An open acce.docx
Journal of Internet Banking and Commerce  An open acce.docxJournal of Internet Banking and Commerce  An open acce.docx
Journal of Internet Banking and Commerce An open acce.docx
 
THE INFLUENCE OF MOBILE BANKING SERVICES ON CUSTOMER SATISFACTION
	 THE INFLUENCE OF MOBILE BANKING SERVICES ON CUSTOMER SATISFACTION	 THE INFLUENCE OF MOBILE BANKING SERVICES ON CUSTOMER SATISFACTION
THE INFLUENCE OF MOBILE BANKING SERVICES ON CUSTOMER SATISFACTION
 
10-1108_XJM-07-2020-0039.pdf
10-1108_XJM-07-2020-0039.pdf10-1108_XJM-07-2020-0039.pdf
10-1108_XJM-07-2020-0039.pdf
 
10-1108_IJBM-10-2018-0271 (Số 4 bằng TA).pdf
10-1108_IJBM-10-2018-0271 (Số 4 bằng TA).pdf10-1108_IJBM-10-2018-0271 (Số 4 bằng TA).pdf
10-1108_IJBM-10-2018-0271 (Số 4 bằng TA).pdf
 
ONLINE POLICIES TO ENSURE CUSTOMER PRIVACY IN ONLI.docx
ONLINE POLICIES TO ENSURE CUSTOMER PRIVACY IN ONLI.docxONLINE POLICIES TO ENSURE CUSTOMER PRIVACY IN ONLI.docx
ONLINE POLICIES TO ENSURE CUSTOMER PRIVACY IN ONLI.docx
 
Customers perception of m banking adoption in of bahrain an empirical assess...
Customers perception of m banking adoption in of bahrain  an empirical assess...Customers perception of m banking adoption in of bahrain  an empirical assess...
Customers perception of m banking adoption in of bahrain an empirical assess...
 
Customers perception of m banking adoption in kingdom of bahrain
Customers perception of m banking adoption in kingdom of bahrainCustomers perception of m banking adoption in kingdom of bahrain
Customers perception of m banking adoption in kingdom of bahrain
 
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docx
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docxOral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docx
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docx
 

More from mglenn3

Feedback Assignment Set 4Great job on this assignment. I know yo.docx
Feedback Assignment Set 4Great job on this assignment. I know yo.docxFeedback Assignment Set 4Great job on this assignment. I know yo.docx
Feedback Assignment Set 4Great job on this assignment. I know yo.docxmglenn3
 
Feedback Financial Research Report Part 1Thank you for redoing a.docx
Feedback Financial Research Report Part 1Thank you for redoing a.docxFeedback Financial Research Report Part 1Thank you for redoing a.docx
Feedback Financial Research Report Part 1Thank you for redoing a.docxmglenn3
 
Feedback analysis, limitations of project approach, and conclusions .docx
Feedback analysis, limitations of project approach, and conclusions .docxFeedback analysis, limitations of project approach, and conclusions .docx
Feedback analysis, limitations of project approach, and conclusions .docxmglenn3
 
Federated Mutual InsuranceCompany121 East Park Square, O.docx
Federated Mutual InsuranceCompany121 East Park Square, O.docxFederated Mutual InsuranceCompany121 East Park Square, O.docx
Federated Mutual InsuranceCompany121 East Park Square, O.docxmglenn3
 
Federalist 51To the People of the State of New YorkHow shall .docx
Federalist 51To the People of the State of New YorkHow shall .docxFederalist 51To the People of the State of New YorkHow shall .docx
Federalist 51To the People of the State of New YorkHow shall .docxmglenn3
 
Federalism Comparing Government Response in Hurricane Katrina v.docx
Federalism Comparing Government Response in Hurricane Katrina v.docxFederalism Comparing Government Response in Hurricane Katrina v.docx
Federalism Comparing Government Response in Hurricane Katrina v.docxmglenn3
 
Federalism is the structure where two or more levels of government.docx
Federalism is the structure where two or more levels of government.docxFederalism is the structure where two or more levels of government.docx
Federalism is the structure where two or more levels of government.docxmglenn3
 
Federalism is the sharing of powers between the federal and state go.docx
Federalism is the sharing of powers between the federal and state go.docxFederalism is the sharing of powers between the federal and state go.docx
Federalism is the sharing of powers between the federal and state go.docxmglenn3
 
Federal judges do not have a mandatory retirement age, yet Arizona a.docx
Federal judges do not have a mandatory retirement age, yet Arizona a.docxFederal judges do not have a mandatory retirement age, yet Arizona a.docx
Federal judges do not have a mandatory retirement age, yet Arizona a.docxmglenn3
 
Federal Budget SpeechDo you want to know who you are Dont.docx
Federal Budget SpeechDo you want to know who you are Dont.docxFederal Budget SpeechDo you want to know who you are Dont.docx
Federal Budget SpeechDo you want to know who you are Dont.docxmglenn3
 
Federal Budget SpeechDo you want to know who you are Don.docx
Federal Budget SpeechDo you want to know who you are Don.docxFederal Budget SpeechDo you want to know who you are Don.docx
Federal Budget SpeechDo you want to know who you are Don.docxmglenn3
 
February is known as Black History Month. For 30 extra credit points.docx
February is known as Black History Month. For 30 extra credit points.docxFebruary is known as Black History Month. For 30 extra credit points.docx
February is known as Black History Month. For 30 extra credit points.docxmglenn3
 
FEATURE ARTICLE Creating and Capturing Value Through Susta.docx
FEATURE ARTICLE Creating and Capturing Value Through Susta.docxFEATURE ARTICLE Creating and Capturing Value Through Susta.docx
FEATURE ARTICLE Creating and Capturing Value Through Susta.docxmglenn3
 
FEATUREASSOCIATION FORUMHiring tiie Very BestHow to in.docx
FEATUREASSOCIATION FORUMHiring tiie Very BestHow to in.docxFEATUREASSOCIATION FORUMHiring tiie Very BestHow to in.docx
FEATUREASSOCIATION FORUMHiring tiie Very BestHow to in.docxmglenn3
 
FEATURED ESSAYThe Ecstatic Edge of Politics Sociology and.docx
FEATURED ESSAYThe Ecstatic Edge of Politics Sociology and.docxFEATURED ESSAYThe Ecstatic Edge of Politics Sociology and.docx
FEATURED ESSAYThe Ecstatic Edge of Politics Sociology and.docxmglenn3
 
Fears and Health Needs of Patients with Diabetes A Qualitative Re.docx
Fears and Health Needs of Patients with Diabetes A Qualitative Re.docxFears and Health Needs of Patients with Diabetes A Qualitative Re.docx
Fears and Health Needs of Patients with Diabetes A Qualitative Re.docxmglenn3
 
Featherfall has recently violated several government regulations.docx
Featherfall has recently violated several government regulations.docxFeatherfall has recently violated several government regulations.docx
Featherfall has recently violated several government regulations.docxmglenn3
 
Feasibility of International Trade Global Value Chain .docx
Feasibility of International Trade Global Value Chain     .docxFeasibility of International Trade Global Value Chain     .docx
Feasibility of International Trade Global Value Chain .docxmglenn3
 
FEATURE - ‘Overtourism’ Worries Europe. How Much Did Technol.docx
FEATURE - ‘Overtourism’ Worries Europe. How Much Did Technol.docxFEATURE - ‘Overtourism’ Worries Europe. How Much Did Technol.docx
FEATURE - ‘Overtourism’ Worries Europe. How Much Did Technol.docxmglenn3
 
FEASIBILITY REPORT1FEASIBILITY REPORT6Fe.docx
FEASIBILITY REPORT1FEASIBILITY REPORT6Fe.docxFEASIBILITY REPORT1FEASIBILITY REPORT6Fe.docx
FEASIBILITY REPORT1FEASIBILITY REPORT6Fe.docxmglenn3
 

More from mglenn3 (20)

Feedback Assignment Set 4Great job on this assignment. I know yo.docx
Feedback Assignment Set 4Great job on this assignment. I know yo.docxFeedback Assignment Set 4Great job on this assignment. I know yo.docx
Feedback Assignment Set 4Great job on this assignment. I know yo.docx
 
Feedback Financial Research Report Part 1Thank you for redoing a.docx
Feedback Financial Research Report Part 1Thank you for redoing a.docxFeedback Financial Research Report Part 1Thank you for redoing a.docx
Feedback Financial Research Report Part 1Thank you for redoing a.docx
 
Feedback analysis, limitations of project approach, and conclusions .docx
Feedback analysis, limitations of project approach, and conclusions .docxFeedback analysis, limitations of project approach, and conclusions .docx
Feedback analysis, limitations of project approach, and conclusions .docx
 
Federated Mutual InsuranceCompany121 East Park Square, O.docx
Federated Mutual InsuranceCompany121 East Park Square, O.docxFederated Mutual InsuranceCompany121 East Park Square, O.docx
Federated Mutual InsuranceCompany121 East Park Square, O.docx
 
Federalist 51To the People of the State of New YorkHow shall .docx
Federalist 51To the People of the State of New YorkHow shall .docxFederalist 51To the People of the State of New YorkHow shall .docx
Federalist 51To the People of the State of New YorkHow shall .docx
 
Federalism Comparing Government Response in Hurricane Katrina v.docx
Federalism Comparing Government Response in Hurricane Katrina v.docxFederalism Comparing Government Response in Hurricane Katrina v.docx
Federalism Comparing Government Response in Hurricane Katrina v.docx
 
Federalism is the structure where two or more levels of government.docx
Federalism is the structure where two or more levels of government.docxFederalism is the structure where two or more levels of government.docx
Federalism is the structure where two or more levels of government.docx
 
Federalism is the sharing of powers between the federal and state go.docx
Federalism is the sharing of powers between the federal and state go.docxFederalism is the sharing of powers between the federal and state go.docx
Federalism is the sharing of powers between the federal and state go.docx
 
Federal judges do not have a mandatory retirement age, yet Arizona a.docx
Federal judges do not have a mandatory retirement age, yet Arizona a.docxFederal judges do not have a mandatory retirement age, yet Arizona a.docx
Federal judges do not have a mandatory retirement age, yet Arizona a.docx
 
Federal Budget SpeechDo you want to know who you are Dont.docx
Federal Budget SpeechDo you want to know who you are Dont.docxFederal Budget SpeechDo you want to know who you are Dont.docx
Federal Budget SpeechDo you want to know who you are Dont.docx
 
Federal Budget SpeechDo you want to know who you are Don.docx
Federal Budget SpeechDo you want to know who you are Don.docxFederal Budget SpeechDo you want to know who you are Don.docx
Federal Budget SpeechDo you want to know who you are Don.docx
 
February is known as Black History Month. For 30 extra credit points.docx
February is known as Black History Month. For 30 extra credit points.docxFebruary is known as Black History Month. For 30 extra credit points.docx
February is known as Black History Month. For 30 extra credit points.docx
 
FEATURE ARTICLE Creating and Capturing Value Through Susta.docx
FEATURE ARTICLE Creating and Capturing Value Through Susta.docxFEATURE ARTICLE Creating and Capturing Value Through Susta.docx
FEATURE ARTICLE Creating and Capturing Value Through Susta.docx
 
FEATUREASSOCIATION FORUMHiring tiie Very BestHow to in.docx
FEATUREASSOCIATION FORUMHiring tiie Very BestHow to in.docxFEATUREASSOCIATION FORUMHiring tiie Very BestHow to in.docx
FEATUREASSOCIATION FORUMHiring tiie Very BestHow to in.docx
 
FEATURED ESSAYThe Ecstatic Edge of Politics Sociology and.docx
FEATURED ESSAYThe Ecstatic Edge of Politics Sociology and.docxFEATURED ESSAYThe Ecstatic Edge of Politics Sociology and.docx
FEATURED ESSAYThe Ecstatic Edge of Politics Sociology and.docx
 
Fears and Health Needs of Patients with Diabetes A Qualitative Re.docx
Fears and Health Needs of Patients with Diabetes A Qualitative Re.docxFears and Health Needs of Patients with Diabetes A Qualitative Re.docx
Fears and Health Needs of Patients with Diabetes A Qualitative Re.docx
 
Featherfall has recently violated several government regulations.docx
Featherfall has recently violated several government regulations.docxFeatherfall has recently violated several government regulations.docx
Featherfall has recently violated several government regulations.docx
 
Feasibility of International Trade Global Value Chain .docx
Feasibility of International Trade Global Value Chain     .docxFeasibility of International Trade Global Value Chain     .docx
Feasibility of International Trade Global Value Chain .docx
 
FEATURE - ‘Overtourism’ Worries Europe. How Much Did Technol.docx
FEATURE - ‘Overtourism’ Worries Europe. How Much Did Technol.docxFEATURE - ‘Overtourism’ Worries Europe. How Much Did Technol.docx
FEATURE - ‘Overtourism’ Worries Europe. How Much Did Technol.docx
 
FEASIBILITY REPORT1FEASIBILITY REPORT6Fe.docx
FEASIBILITY REPORT1FEASIBILITY REPORT6Fe.docxFEASIBILITY REPORT1FEASIBILITY REPORT6Fe.docx
FEASIBILITY REPORT1FEASIBILITY REPORT6Fe.docx
 

Recently uploaded

Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIShubhangi Sonawane
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxNikitaBankoti2
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 

Recently uploaded (20)

INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 

Feedback from Lee Smith-Dennis250320 1941You have produced .docx

  • 1. Feedback from Lee Smith-Dennis 25/03/20 19:41 You have produced a reasonable rationale for conducting the study, but must be clearer with your research questions as two are very similar. Your literature review is reasonable, but includes some very dated references which are now irrelevant. Your methodology could be more detailed as you must explain why you are choosing the methods that you are. Your potential outcomes are reasonably clear. Overall, a reasonable attempt but failing to show a current research gap. Feedback from Ali Rasel 27/03/20 14:14 The proposal shows a good study background with a clear aim and objectives. The rationale and significance of the study are not clear. You need to use a specific theory to understand the subject matter. The review seems to be done on mobile banking in general. It should include ideas about security issues with mobile banking. The review needs to be more critical. Research methodology needs to be connected to the research questions. You need to show the number of studies you are going to systematically review. If Meta-analysis is the main method to answer the research questions, you need to review studies on the same topic and show how you are going to do Meta-analysis with an appropriate analysis tool. Potential outcomes need to be explained with good evidence of analysis. The writing structure is fine but you need to improve your English with good grammar and academic writing. Referencing follows the Harvard style despite a few journal references have been used in the proposal.
  • 2. MBA Managerial Project Proposal Security Issues in Mobile Banking System of the Maldives and Its Effect on Customers Executive Summary Mobile Banking revolutionized the way people do banking. Technology has brought the ease of doing a financial transaction to the finger-tips. However, this radical developmental has also lead to great negative impacts on the customers due to security issues. This study seeks to investigate the Security Issues in Mobile Banking System of the Maldives and its Effect on Customers. With the existing literature that demonstrates the Mobile Banking and security issues and measures to counter, the study will use Meta-analysis to bring a statistical solution to fill the knowledge gap in the context of the research. Moreover, existing models will be critically reviewed to find solutions to the research questions and achieve objectives of the study. Contents Executive Summary 2 List of Figures 4 List of Table 4 1.0 Introduction 5
  • 3. 1.1 Area of Research 5 1.2 Research context 5 1.3 Scope of the study 6 1.3.1Research Question 6 1.3.2Research aim 7 1.3.3Research Objectives 7 1.4 Rationale of the Study 7 2.0 Literature Review 8 2.1 Model of E-Fraud 8 2.2 Bio-metrics model for authentication 9 2.3 Literature Review Summary 9 3.0 Research Methodologies 10 3.1 Research Philosophy 10 3.2 Research Approach 10 3.3 Research Design 11 3.4 Research Instruments Data Collection Methods 11 3.5 Data Analysis Method 11 3.6 Ethical Issues 11 3.7 Expected Sources of Information 12 4.0 Potential Outcomes 13 4.1 Research Plan 13 5.0 Reference Cited 14 6.0 Bibliography 15 List of Figures Figure 1. E-Fraud Model …………………………………………………… 8 Figure 2. Bio-Metric Model for Authentication …………………………………… 9 Figure 3: Research Approach ……………………………………………………………10 Figure 4: Research Design …………………………………………………………….11 List of Table Figure 4: Gantt Chart
  • 4. ………………………..………………………………………… 13 Security Issues in Mobile Banking System of the Maldives and Its Effect on Customers 1.0 Introduction The technological advancement and the innovative trends that endures to coerce the way of banking is perhaps convenient and bringing customers more nearer to the banks. These groundbreaking innovations has led to the establishment of Mobile Banking where services have been brought to the finger- tips of the customers all over the world in a very short span of time. The advantage of technology is also abused by various hackers and other cyber criminals. Thus, bringing the security issue as a threat in using Mobile Banking Systems that have a direct impact on customers. 1.1 Area of Research The chosen area for research for this study is “Security Issues in Mobile Banking System of the Maldives and Its Effect on
  • 5. Customers”. 1.2 Research context At this age of technology, robbing banks by using weapons and physical force has almost become fictional. Cyber fraud or E- frauds, Identity theft and phishing are common crimes committed in stealing funds from bank accounts (Belcher, 2004). Furnell and Evangelatos (2007) has argued that degree of trust among the mobile banking customers diminishes as E- fraud usage occurs due to unauthorized transactions. Similarly, they have also argued reliability is an important factor determining the trust between the mobile banking system and communication between the mobile device during transaction (Furnell and Evangelatos, 2007). In this context, the Maldives is not detached from the identified problem and the Maldives Police has reported more than 65 cases and theft of more than half a Million Ruffiya (Maldives Independent, 2017). Thus, security threats posing a significant threat on customers. Maldives, even though have a population less than a mere 400,000 people dispersed into over 200 islands, adapting to the revolutionizing technology is fast and quick. According to the Communications Authority of Maldives (CAM, 2019), total mobile subscribers in the Maldives amounts to 839,528 depicting 1:2 in mobile subscription. In addition, CAM (2019) also has published that there are 90,237 fixed broadband subscribers and 266,495 mobile broadband subscribers. Bank of Maldives or the national bank in the Maldives introduced the vital service of Mobile Banking service to its customers in July 2015, with the launch of its new Mobile Banking Application available for use on Apple and Android smartphones (Aramudhan, 2008). However, with the growing trend of technology many individuals are still not using Mobile banking and opt to go for the traditional retail branch banking. The reasons are unknown to the banks as to why people do not want to adopt internet
  • 6. banking. This remains the case in many other countries as well. With the increase in technology currently Bank of Maldives (BML), HSBC, State Bank of India (SBI), Maldives Islamic Bank (MIB) and Bank of Ceylon (BOC) has adopted Mobile banking in the Maldives. According to Harb, Farahat and Ezz (2008) Banking via mobile is changing lives of people all over the world whereby they can make banking transaction 24 hours a day wherever they are. It has added up to the convenience of adapting to new technologies. Furthermore, it has helped many people who are too busy and have no time to visit traditional bank branches and make transactions. Using mobile banking has many advantages for users such as saving time and the accuracy of information flow. This study intends to study the Security Issues in Mobile Banking System of the Maldives and its Effect on Customers. 1.3 Scope of the study This study will focus on the security issues in the Mobile Banking System in the Maldives on the one hand and its impact on customers on the other hand.Security issues describes the existing cybercrime techniques like phishing attacks, E-fraud, virus attacks, spoofing and etc. 1.3.1Research Question What are the Security Issues in Mobile Banking System of the Maldives and its Effects on Customers? The study will further try to investigate the following; · What are the security issues in Mobile Banking System in the Maldives? · How reliable is the current Mobile Banking System with reference to security in the Maldives? · What are the effects of security issues on customers? 1.3.2Research aim Through various models based on the literature, this study will
  • 7. insist to find out the most fragile area in Mobile Banking and how that threat could be minimized to increase the trust and reliability to the Mobile Banking System in the Maldives. 1.3.3Research Objectives The objectives are subjected to change as the research progresses. · To analyze the current Mobile Banking System. · To identify the security issues in Mobile Banking System. · To assess the reliability of the current Mobile Banking System with reference to security. · To examine the effect of security on customers. 1.4 Rationale of the Study Literature survey reveals that there are models that would allow to understand the context and mechanics of E-fraud. Therefore the basis of this study will be to examine one of the models that will help to build the trust in Mobile Banking and minimize risks and effects on the prevailing security issues. 2.0 Literature Review Various literature and models are available on the security issues of Mobile Banking and its effect on customers. Aramudhan (2008) has revealed that User Assigned Security Policy Framework for m-commerce Applications increases its security levels from both the user and server side to increase the reliability. Similarly, Bangdao and Rosco (2010) has argued that increasing the Mobile Electronic Identity through biometrics secures payment on Mobile phones. In 2016, A.S. Bhatt has identified the factors Affecting Customer’s Adoption of Mobile Banking Services. Furthermore, Lee and Chung (2009) argued that a Developed Information System model would increase customer satisfaction and reliability on the Mobile Banking services as payment transactions are made without any human contact.
  • 8. A study conducted Amola (2016) to analyze the factors affecting customer’s adoption of Mobile Banking Services revealed demographic, attitudinal, and behavioral characteristics of mobile bank users are interconnected, but security issues were not addressed. In another study by Palani (2012) to examine customers perception towards Mobile Banking in Indian Overseas Bank Chennai identified the causative factors so that mobile banking can be used by more people to make banking operations more cost effective. However, one of the compelling model on E-fraud which is relevant to this study was formulated by Malakedsuwan and Stevens (2003) identifying key elements that describes E-fraud and effective counter measures to increase customers trust. 2.1 Model of E-Fraud E-Fraud Model ofMalakedsuwan and Stevens (2003) focuses on five key elements to exhibit a reliable model to identify and examine e-fraud and its impact. The model is illustrated below with the key elements. Perpetrator Mode of Attack Target System Target Entity Impact Figure 1. E-Fraud Model Key element one is the Perpetrator or the attacker. According to Malakedsuwan and Stevens (2003) the perpetrator will be either
  • 9. internal or external to the entity committing the fraud. Secondly, the Mode of Attack describes the technique used to execute the fraud. Malakedsuwan and Stevens (2003) states that the fraudulent activity can be conducted through technical modes like IP spoofing or malicious codes and non-technical modes like identity stealing. The third element of Target System describes the system through which the fraudulent activity is conducted or perpetrated. Fourthly, Target Entity features individuals or organizations by identifying the weaknesses in the systems. The last element explains the Impact, whetherthe perpetration has incurred financial losses or non-financial losses like loss of competitive advantage and reputation. 2.2 Bio-metrics model for authentication In 2011, Bilal and Sankar proposed a Bio-Metrics model for Mobile Banking Authentication, where finger-print is the mechanism to counter-measure the existing security issue. Their study through literature review and study of existing systems using login, password and SMS mechanisms showed that only the authorized user will be able to use particular account. Mobile Device Bio-Metric Device Bank System Figure 2. Bio-Metric Model for Authentication Bilal and Sankar (2011) in their study of Trust and Security Issues in Mobile Banking and its effect on Customers showed that 90% of the respondents strongly agreed that such a model will increase the ease of use of Mobile Banking and 70% agreed that this model will increase customer satisfaction while 60% agreed it will reduce fraud, thus increasing trust and safety.
  • 10. 2.3 Literature Review Summary The literature review revealed that there are pros and cons of using Mobile Banking in the evolving technological phenomenon (Chandran, 2014). It is also evident as Bilal and Sankar (2011) has suggested that invalidating security issues to 0% is not possible. However, with many security measures, it can only be reduced and prevented (Chandran, 2014). Despite the literature demonstrated in this section, upon analysis on the context of this study, it will viable and suitable to use the E- fraud Model by Malakedsuwan and Stevens (2003). 3.0 Research Methodologies As Saunders, Lewis and Thornhill (2009) suggests, a research can be classified into perspectives of (i) application of research study (ii) objectives in undertaking the research and (iii) inquiry mode employed. From these perspectives, in practice, most studies are a combination of descriptive, correlational and exploratory researches which is categorized under the second perspective of objectives in undertaking the research. 3.1 Research Philosophy The research philosophy intended to use in this study will be Pragmatism in order to emphasize and use both positivist and interpretivist elements of epistemology (Saunders, Lewis and Thornhill, 2009). In this way, to adapt pragmatism Systematic literature review will be conducted as the study will focus on studying issues to bring out positive consequences by examining the existing secondary sources to be synthesized and evidence compared (Saunders, Lewis and Thornhill, 2009). 3.2 Research Approach The Secondary data required for the research will be collected with the help of the analysis of the historical records and analysis of the documents. The Historical record presents the data about the mobile banking which have been collected by the various researchers in mobile banking field (Bloor et al, 2000). The Secondary data will help in finding out the process of adoption for any kind of new innovation among the users. Thus, the research approach will be divided into the following four
  • 11. phases. PHASE 1 Research Design PHASE 2 Conduct PHASE 3 Analysis PHASE 4 Structure and writing Figure 3: Research Approach 3.3 Research Design The research will designed as follows; RESEARCH DESIGN 1. Contribution to the existing knowledge gap 2. Potential Audience 3. Purpose of the Research 4. Appropriate Method 5. Search Strategy
  • 12. Figure 4: Research Design 3.4 Research Instruments Data Collection Methods For collecting this data various news articles, magazines, journal articles and data bases would be searched in order to present the relative data about the research. 3.5 Data Analysis Method After collection and reviewing of literature, Meta–analysis will be used to answer the formulated research questions. Meta- analysis enables to bring out a statistical solution by weighing the reviewed literature into classification by codes (Saunders, Lewis and Thornhill, 2009). This analysis method would therefore enable the researcher to assess the impact of excluding or down weighing unpublished studies, low quality studies and out-of-date studies. 3.6 Ethical Issues There will be no ethical issues, since this study will consist of secondary research which will be fully cited and referenced. 3.7 Expected Sources of Information The expected sources of information includes i) Annual Reports of the Banks in the Maldives. ii) Online Libraries for journal articles. iii) Books. iv) Online news articles. 4.0 Potential Outcomes From this study, the author will be able to identify the security issues that pertains in the Mobile Banking System in the Maldives. In the light of the literature, the author will also be
  • 13. able to find the gap in the existing literature on security issues. In addition, identifying perpetrators, mode of attack, target system, target entity and impact will help to find the answers for the research questions and formulate counter measures. 4.1 Research Plan Table 1: Gantt Chart 5.0 Reference Cited Aramudhan M 2008, User Assigned Security Policy Framework for m-commerce Applications, International Conference Computer and Communication Engineering, ICCCE 2008, pp. 148-150. Bangdao C and Rosco A W 2010, Mobile Electronic Identity: Securing Payment on Mobile Phones, pp.1-15 Bhatt A S B 2016, Factors Affecting Customer’s Adoption of Mobile Banking Services, Journal of Internet Banking and Commerce, Vol.3, pp 8-13. CAM (2019). Telecom Statistics – November 2019. [online]. Communications Authority of Maldives. [Viewed 2 March
  • 14. 2020]. Available from http://www.cam.gov.mv/Statistics.htm Chandran R 2014, Pros and Cons of Mobile Banking, International Journal of Scientific and Research Publications, Vol. 4, Issue 10, pp. 1-5 Furnell S and Evangelatos K 2007, Public awareness and perceptions of biometrics, Journal of Computer Fraud & Security, vol. 2007, pp. 8-13. Harb H, Farahat H, and Ezz M 2008, SecureSMSPay: Secure SMS Mobile Payment Model, 2nd International Conference on Anti-counterfeiting, Security and Identification, 2008. ASID 2008, pp. 11-17. Lee K C and Chung N 2009, Understanding Factors Affecting Trust in and Satisfaction With Mobile Banking in Korea: A Modified DeLone and McLean's Model Perspective, Journal of Interacting with Computers, Vol. 21, pp. 385-392. Maldives Independent (2017). More than half a Million Ruffiya Stolen in phone scams. [online]. [Viewed 2 March 2020]. Available from https://maldivesindependent.com/society/more- than-half-a-million-rufiyaa-stolen-in-phone-scams-120943 Palani P 2012, A Study On Customer Perception Towards Mobile Banking In Indian Overseas Bank Chennai, International Journal of Trend in Scientific Research and Development (IJTSRD) International Open Access Journal, Vol. 2, pp. 259.6.0 Bibliography Chuchen C 2016, The Perception of Mobile Banking Adoption: The Study of Behavioral, Security, and Trust in Thailand, Behavioral, Security, and Trust in Thailand, International Journal of Social Science and Humanity, Vol. 6, No. 7, pp. 547- 550. Coface.com. 2020. Risk Analyses And Evaluations / Our Economic Studies / Our Business - Coface. [online] Available at: <https://www.coface.com/Our-business/Our-economic- studies/Risk-analyses-and-evaluations> [Accessed 22 February 2020]. Devaraj, S., Krajewski, L. and Wei, J., 2007. Impact of eBusiness technologies on operational performance: The role of
  • 15. production information integration in the supply chain. Journal of Operations Management, 25(6), pp.1199-1216. My New Desk (2014). Phishing Fraud (Maldives Mobile Banking) [online] Bank of Maldives. [Viewed 11 March 2020]. Available from http://www.mynewsdesk.com/mv/bankofmaldives/pressreleases/ phishing-fraud-maldives-mobile-banking-1043407 Mallat N, Rossi M and Tuunainen V. K 2004, Mobile Banking Services, Communications of the ACM, Vol. 47, May. 2004, pp. 42–46. Nie J and Hu X 2008, Mobile Banking Information Security and Protection Methods, International Conference on Computer Science and Software Engineering, 2008, pp. 587-590. Peng L and Lai L 2009, A Study on Service Quality Assurance in Mobile Commerce, Journal of Computer Science and Engineering, pp. 207-211. Pfitzmann A, Pfitzmann B, Schunter M and Waidner M 1997, Trusting Mobile User Devices and Security Modules, Computer, Vol. 30, pp. 61-68. Wei D and Yanling T 2010, Research on Security Payment Technology Based on Mobile E-Commerce, 2nd International Conference on e-Business and Information System Security (EBISS), 2010, pp. 1-4. Ying L and Can Z 2010, Customer's Adoption Decision Analysis of Mobile Banking Service, Journal of Management and Service Science (MASS), pp. 1-4. Zhuo Q Y and Li Y 2010, Chinese Mobile Banking Service Evaluation Based on AHP Method, International Conference on E-Product E-Service and E-Entertainment (ICEEE), 2010, pp. 1- 5. 14 | Page
  • 16. What am I required to do in this assignment? You should complete and submit the final dissertation to the relevant submission link via Assessment & Feedback on BREO by the deadline. Note: Turnitin will be used for all submissions to check for plagiarism. We also reserve the right to initiate a viva voce examination if we have concerns regarding the originality of your submission. Dates of the Viva will be provided during the induction week. You need to be available for such an event following the submission of your dissertation. • Your f inal assessment will be an individual managerial dissertation which will be a considered and comprehensive response to your research objectives agreed with your supervisor. • Your dissertation will encapsulate your approach to the research, the research methods that you have deployed, an analysis of the knowledge generated as part of the investigative process and a ref lection on your personal development as a consequence of this research p roject experience.
  • 17. Submission Deadline Marks and Feedback Before 10am on: Click or tap to enter a date. 20 working days after deadline (L4, 5 and 7) 15 working days after deadline (L6) 10 working days after deadline (block delivery) Click or tap to enter a date. Unit title & code MBA Managerial Project; APO017-6 Assignment number and title 2 Dissertation Assessment type Individual Written Report Weighting of assessment 80% Size or length of assessment 10000 words (+/- 10%) Unit learning outcomes 1 Demonstrate the f ollowing knowledge and understanding • Demonstrate a systematic understanding and critical appreciation of the interrelationship of diverse theories in the MBA toolkit to challenge existing preconceptions and develop positive and enquiring approaches to global management and enterprise. Demonstrate an aptitude and ability to solve a def ined
  • 18. business problem through enquiry having drawn upon your MBA studies and appreciating the interrelated nature of organisations. 2 Demonstrate the f ollowing skills and abilities Demonstrate intelligent practice by imaginative and critical integration of theory and practice to create a tangible deliverable through critical insightf ul evaluation stipulating areas of excellence and ref lecting on areas f or development to improve perf ormance in contemporary organisations. 2 • It will need to demonstrate your understanding of the topic area in the context of contemporary academic theory, models and debate. Your dissertation will comprise a number of integrative elements all of which will contribute to the achievement of the learning outcomes f or this unit. • You will receive supervision and guidance through the process by regular communication and f eedback on your progress by the tutor. • Please see the “Guided Learning” section of the BREO unit site f or detailed guidelines f or writing each section of a
  • 19. dissertation. • The main assessment and marking criteria are listed at the end of this assignment brief . What do I need to do to pass? (Threshold Expectations from UIF) In order to PASS Assessment 2, you will need to: • Demonstrate critical assessment of theories underpinning the aim and objectives of the project and integrate this understanding into a coherent f ramework f or analysing case studies or other data/evidence. • Develop a research design to identif y and assemble sources of data and evidence and carry our data analysis as appropriate to achieve the aim and objectives. • Demonstrate critical analysis and evaluation of case studies/evidence, debate the implications of the analysis and develop a tangible deliverable. How do I produce high quality work that merits a good grade? We will be filling this section in together in class on Click or tap to enter a date. make sure you have downloaded/printed out the Assignment Brief and bring it to the session with you.
  • 20. We suggest that you avoid writing in the f irst person (“I”); rather the third person is recommended (e.g. it can theref ore be suggested that...). You may include headings and subtitles and a contents page if you f eel this will help you to stay f ocused and create clearer sign - posting f or the reader. Guide to writing the Project Report Section / Title Details / Guidance Title page Title of your report. Executive Summary Concise summary of your report, including aim, analysis, key conclusions and recommendations (comes f irst, written last) Contents Page Include page numbers. Introduction Introduction to the report setting out what the aims and objectives of the report are, the context, what the report will cover, why and your method of analysis. Must be supported by the ideas of inf luential contributors using in text citations.
  • 21. Methodology Justif y the choice of your research methodology (e.g. primary or secondary) f or data collection and analysis and design the approaches that best f it your research project. Consider any ethical issues considered and explain clearly your sources of inf ormation Literature Review You will need to draw on a wide range of recent (2008-2018) quality academic sources, including peer-reviewed material, combined with practical examples to support your arguments. You will need to critically evaluate the sources in relation to the application of theory to practice. Analysis You need to state and justif y the method of analysis as appropriate to the aim and objectives of your project. If using systematic literature review you will need to present f ull details of the 3 Literature: Use academic source, i.e. books, journal articles etc. Ref er to respected industry sources DO NOT overuse the Internet, do not use and / or quote from Wikipedia.
  • 22. Reminder: You are required to use proper in-text ref erence and the ref erence list in the end using the Harvard Referencing System. The writing: Try to approach this assignment in a logical and systematic way. Make sure you have a logical structure, a convincing argument, clear description of the situations which ‘set the scene’, and clear explanation which relate to theories, and a conclusion that draws your argument together. search(es) with number of results and inclusion/exclusion criteria resulting in the f inal sample of evidence f or review. You need to present the evidence (data) published in quality academic sources. You need to analyse in-depth the evidence (data) and present the f indings clearly. For systematic review and comparative analysis methods a table is usef ul to illustrate the f indings. Word count f or this section will depend on the topic of your project and may vary widely between
  • 23. projects Discussion In the discussion, you will need to interpret your f indings with ref erence to theories introduced in the literature review. Apply the theory to the data, critically analyse and evaluate in -depth the ef f ectiveness of theory in applied in practice. What is the unique insight f rom your research? Conclusions This section should initially answer the report aim and objectives and draw together the main points f rom your analysis. It summarises what has been learned f rom undertaking this project concerning the application of theory into practice. What are the main conclusions f rom your project? No new inf ormation should be presented in the conclusions. Recommendations Make recommendations f or improvement based upon your conclusions, clearly stating how they can add value. Recommendations should be f ully f easible and justif ied considering costs, priority level, timescale, resources, who is responsible, benef its and any f urther implications. Proposals should be actionable (‘immediately implementable’) not just a list of ideas. Ref erence List A list of all sources cited directly in the text using Harvard ref erencing style
  • 24. Ref erences/Bibliography – NOT OPTIONAL The ref erences/bibliography should comprise a variety of sources used in the text, most of which should be academic journal articles. Other sources could include books, trade publications, news articles, industry reports, company websites etc. Harvard ref erencing style is expected How does assignment relate to what we are doing in scheduled sessions? The first sessions will provide an insight into the tools that can be used to develop a proposal. Further help will be provided by local tutors during workshops to develop a bespoken approach. 4 How will my assignment be marked?
  • 25. Your assignment will be marked according to the threshold expectations and the criteria on the following page . You can use them to evaluate your own work and consider your grade before you submit. Criteria Pass Good Pass Commendation Distinction Introduction Weight 10% 40 to 49 % A rea sonable introduction with objectives mentioned, but not clea rly stated a nd not put in context. 50 to 59 % A good introduction with clea r ba ckground information a nd sta tement of objectives which link to resea rch questions.
  • 26. 60 to 69 % A well-presented introduction with clea r ba ckground information a nd clea r statement of objectives with ra tionale, linked to purpose a nd scope of the work. 70 to 100 % A complete a nd thorough introduction with clea r ba ckground information a nd sta tement of objectives with a comprehensive a nd persua sive ra tionale. Literature Review Weight 25% 40 to 49 % Evidence of a limited knowledge of the
  • 27. releva nt litera ture. Some critica l a rea s a re included. 50 to 59 % Evidence of a satisfactory review of releva nt litera ture, containing a ca demically sound sources. 60 to 69 % Evidence of a comprehensive review of releva nt litera ture with a ra tionale. The review contains a good variety of a ca demically va lid sources. 70 to 100 % Evidence of critica l eva luation of relevant litera ture a nd a convincing ra tionale. The review contains a rea sonably wide
  • 28. va riety of a cademically va lid sources. Research Methodology Weight 20% 40 to 49 % Evidence of some understanding of the resea rch methodology used, but la cking cla rity a nd purpose. 50 to 59 % Evidence of some understanding of methodology used a nd how a re a ppropriate to the resea rch question. 60 to 69 % Evidence of a sound
  • 29. understanding of the possibilities a nd limita tions of the methodology used a nd a pply it rea sonably well for da ta collection a nd a na lysis. 70 to 100 % Evidence of a n a dvanced a wa reness of the possibilities a nd limita tions of the methodologies used a nd a pply it soundly for robust da ta collection a nd a na lysis. Analysis/Discussions of findings and conclusions Weight 25% 40 to 49 % Discussion is not so releva nce to the research
  • 30. question. Some evidence of a nalysis support reported findings. 50 to 59 % Evidence of sa tisfactory a na lysis a nd judgement. Rea sonable a rguments ba sed on a firm foundation from the question through to the conclusions constructed. 60 to 69 % Evidence of sound a nalysis a nd judgement. Persuasive a rguments based on a firm foundation from the question through to the conclusions constructed. 70 to 100 % Evidence of robust a nalysis a nd judgement. Precise a nd
  • 31. persua sive arguments ba sed on a firm foundation from the question through to the conclusions constructed Coherence Weight 10% 40 to 49 % Evidence of prepa redness to state a position on a n issue but with a limited use of supporting evidence. 50 to 59 % Evidence of a bility to sta te, on the ba sis of evidence a personal position on a n issue, a selection of a ppropria te materia l with a 60 to 69 %
  • 32. Evidence of a bility to sta te a nd defend on the basis of evidence a personal position on a n issue. Clea r evidence of a selection of a ppropriate 70 to 100 % As for commendation with a n a dditional fla ir a nd ima gina tion. Cogent and clea r sta tements reflecting 5 Where a n a rgument is not presented in a coherent or critica l form. logica l structure a nd coherent argument. ma terial with a logica l structure a nd coherent a rgument, which displa y
  • 33. high levels of critica lity. findings a nd a statement of future direction. Structure, format, language and referencing Weight 10% 40 to 49 % Rea sonable structure, a ca demically sound la ngua ge a nd formatting, a nd rea sonable referencing. 50 to 59 % Rea sonably well-structured a nd proofread report, linking to the question through to da ta collection to findings. Good use of
  • 34. references. 60 to 69 % Well-structured and proofread report which is linked to the research question and findings. Appropriate use of references. 70 to 100 % Very well-structured report which is strongly linked to the research question and findings. Very well presented supporting references. 3rd Class – 40-49% Lower 2nd – 50-59% Upper 2nd – 60-69% 1st Class – 70%+