Wednesday, May 6, 2020

Project Outline for Social Life and Security-myassignmenthelp

Question: Discuss about theProject Outline for Social Life and Financial Security. Answer: Topic Title: Role of social media on identity theft and its impact on social life and financial security of individuals Introduction Identity theft has become a major concerning issue in the modern world. As the internet has introduced a huge revolution and transformed the digital world, the dependency on the internet has grown ever since. Now-a-days, people are performing almost every activity of the daily life by using the internet, including highly confidential banking and money transactions. Social media is another revolutionary invention of the technology, which has changed the dimensions of social life and the relations. People divulge their personal information in the social media sites and from there, the data is hacked and misused. Taylor, Fritsch Liederbach (2014) state that when a person steals someone elses identity and misuses that information to get illegal benefits, it is known as identity theft, which can land an individual into serious trouble. Problem statement: The problem statement of this research project is to find out the role of the social media in the instances of identity theft and how it affects the social life and financial security of the individuals. Research aim and objectives The aim of the research is to evaluate the significance of social media and identity theft in the life of the individuals in terms of social and financial security. The objectives of the research project are: To evaluate the term identity theft and its consequences To examine the role of social media in identity theft Methodology Research methodology refers to the approach and strategy of the researcher to address the research aim and objectives. This consists of research philosophy, approach, strategy, design, data collection, sampling and data analysis process. The project will start with an introduction with the topic, followed by a comprehensive literature review, methodology, data analysis and discussion and conclusion. The researcher will follow the pragmatism philosophy, which enables the researcher to analyze the data using both qualitative and quantitative method. Qualitative method helps in analyzing the observations by applying interpretation ability and quantitative method helps in obtaining scientifically proved results (Morgan, 2014). The researcher will adopt deductive and explanatory research approach. Deductive approach allows the researcher to explain the research phenomenon based on established theories and this also follows the norms of explanatory research (Nardi, 2018). Data analysis wil l include both the qualitative and quantitative method. The researcher will collect primary data through a survey, which would focus on the impact of social media, perceptions about identity theft and impact of identity theft on social and financial security. The survey responses will be analyzed using quantitative methods. Qualitative analysis of secondary data will be performed. Secondary data will be collected from various official websites, newspaper articles, peer-reviewed journals, books, and online publications. Under qualitative analysis, the researcher will apply the thematic analysis tool for data analysis. Various relevant themes on the research topic will be chosen and the data will be analyzed and presented in that structure (Clarke Braun, 2014). Secondary data sources Secondary data will be collected from various authentic sources. The following are 10 peer-reviewed journal articles, which will be followed during the research. Kahn, C. M., Liares-Zegarra, J. M. (2016). Identity theft and consumer payment choice: Does security really matter?.Journal of Financial Services Research,50(1), 121-159. DOI: https://doi.org/10.1007/s10693-015-0218-x Holtfreter, K., Reisig, M. D., Pratt, T. C., Holtfreter, R. E. (2015). Risky remote purchasing and identity theft victimization among older Internet users.Psychology, Crime Law,21(7), 681-698. DOI: https://doi.org/10.1080/1068316X.2015.1028545 Hille, P., Walsh, G., Cleveland, M. (2015). Consumer fear of online identity theft: Scale development and validation.Journal of Interactive Marketing,30, 1-19. DOI: https://doi.org/10.1016/j.intmar.2014.10.001 Vieraitis, L. M., Copes, H., Powell, Z. A., Pike, A. (2015). A little information goes a long way: Expertise and identity theft.Aggression and Violent Behavior,20, 10-18. DOI: https://doi.org/10.1016/j.avb.2014.12.008 Tsikerdekis, M., Zeadally, S. (2014). Online deception in social media.Communications of the ACM,57(9), 72-80. DOI:1145/2629612 Tsay-Vogel, M., Shanahan, J., Signorielli, N. (2018). Social media cultivating perceptions of privacy: A 5-year analysis of privacy attitudes and self-disclosure behaviors among Facebook users.new media society,20(1), 141-161. DOI: https://doi.org/10.1177/1461444816660731 Tsikerdekis, M., Zeadally, S. (2015). Detecting and preventing online identity deception in social networking services.IEEE Internet Computing,19(3), 41-49. DOI:1109/MIC.2015.21 Saridakis, G., Benson, V., Ezingeard, J. N., Tennakoon, H. (2016). Individual information security, user behaviour and cyber victimisation: An empirical study of social networking users.Technological Forecasting and Social Change,102, 320-330. DOI: https://doi.org/10.1016/j.techfore.2015.08.012 Golladay, K., Holtfreter, K. (2017). The consequences of identity theft victimization: An examination of emotional and physical health outcomes.Victims Offenders,12(5), 741-760. DOI: https://doi.org/10.1080/15564886.2016.1177766 Martin, K. D., Borah, A., Palmatier, R. W. (2017). Data privacy: Effects on customer and firm performance.Journal of Marketing,81(1), 36-58. DOI: https://doi.org/10.1509/jm.15.0497 References Clarke, V., Braun, V. (2014). Thematic analysis. InEncyclopedia of critical psychology(pp. 1947-1952). Springer New York. Morgan, D. L. (2014). Pragmatism as a paradigm for social research.Qualitative Inquiry,20(8), 1045-1053. Nardi, P. M. (2018).Doing survey research: A guide to quantitative methods. Routledge. Taylor, R. W., Fritsch, E. J., Liederbach, J. (2014).Digital crime and digital terrorism. Prentice Hall Press.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.