+1(978)310-4246 credencewriters@gmail.com
  

Description

You need to write a technical report and deliver a PowerPoint presentation.

You can read the file named, “CSCI 310 Project Guidelines and Instructions -01E (2).pdf” to understand the question.

While writing the technical report, you need to follow the guideline as linked in the filename acm_submission_template

.docx

I need the slides and the script to read while presenting those slides

You can read the sample file named “sample.docx” in order to understand how to write and what to write in the report. However, the topic you choose must be different.

it should include graphics(tables, graphs) or others that will support your explanation. If you see in the paper I attached as an example, you will see how many spaces cover the graphics or tables, So, take in count this too, please.

I would recommend you to write on 1.5 but write one page extra. So, in the final 15 pages with 1.5 spacing

I need the presentation, I only need the slides. I need the script for the recording. I think the script with 800 to 1000 words should be enough

CSCI 310, Cybersecurity
Spring 2021 – 01E
Term Project Guidelines
Topics:
1. Topics have been chosen and confirmed via proposals
Deliverables:
You will be graded on two deliverables. You are expected to:
1) write and submit a technical report in paper format (in Microsoft word (or latex)
and pdf final format)
2) prepare and deliver a presentation recording
Report Requirements:
ï‚·
To help prepare you for writing technical documents in the future, you will write your
project paper in a simplified ACM format with one column, fully justified text. The
simplified ACM template is provided on myleoonline in the project module. Your report
should be approximately 14 pages (not including references). Include references
to these resources in the references section with proper citation where needed.
ï‚·
Your report will basically contain the following sections (which can be adjusted
depending on your research topic)1:
o
o
1
Abstract or executive summary: 100-200 words describing the main points in your
report and mainly concisely summarizing core research questions, approach and main
observations/findings.
Introduction: This section should establish a context (background and related work)
around the topic for the reader, highlighting the challenges, significant related incidents,
significance of existing research. It should summarize what has been done on the topic,
the main research questions you aim to answer through your report, and the approach
that you would follow to answer those questions. The report introduction should briefly
discuss how the used approach is different (what additional value does your report
provide) from previous work on the topic. The last paragraph of the introduction should
outline the flow of the report describing the logical progression from ones section to the
next.
 Background/Related work: This section includes summaries of previous
related work including references to the papers and other resources you needed
http://www.ann.ece.ufl.edu/courses/eel5764_10fal/project.html
o
o
o
o
ï‚·
ï‚·
ï‚·
to explore to fully understand the topic you are reporting on. In this section, you
should aim to describe how the work you are reporting on is different and how it
improves and/or extends previous methods. This section could be included in the
introduction.
Main report sections: This part of the report may include 2-3 sections expanding on
the problem statement and main research, approach/hypothesis/methodology and main
findings/observations. This part of the report is directly related to the topic you are
working on, and is the core of your report. It could include sections such as:
 Problem statement: and this could include a system architecture and current
state of the art articulation of the research question you aim to answer.
 Approach/Methodology/hypothesis: Describe your understanding of the
main contributions of the topic you are reporting on: what was done, how it was
done, how it works, etc. Provide architectural diagrams, charts and figures where
necessary with proper citation.
 Findings/ Observations: Depending on the topic you are reporting on, you
will need to include a description of the experimental setup (if included in the
original paper you are reviewing). Aim to be concise and utilize graphs to show
any improvements. Include a summary of results analysis: what the results mean
and the trends that are revealed.
Conclusions and Future Work: Include here a brief summary of the work and results.
Include any future work that is expected or could be done.
Acknowledgments (Optional): Acknowledge any person that helped with your
research that is not listed as an author.
References: List of papers and resources cited throughout your report.
You should compose the report using your own words: do not directly copy from the
material of the paper you are reporting on. In the case that you quote the words of the
original authors, use quotation marks “” and add a reference number.
If you cite any work other than the provided paper, you should use a standard citation
format.
Please maintain the template format in terms of font type, size, line spacing and page
margins.
Report & Presentation Deadlines:
Before midnight on Thursday May 6th, you need to submit the following on
myleoonline D2L platform:
1- Presentation slides: prepare and upload a presentation (10-15 slides) for your project
presentation. Please upload in power point and in PDF formats.
2- Presentations Recordings: prepare and record a 10-minutes presentation on your
project using zoom and upload the recording.
3- Reports: finalize and submitted your report as an MS word and PDF.
** For implementation projects the report deliverable will follow a user-manual flow, and the
presentation would best be a demo of the built environment.
Grading Criteria:
The grade for you project will comprise of the following components:
10%
70%
20%
Report format (template is provided).
Report content showcasing your understanding of the
original author’s ideas. How do explain the paper’s
ideas clearly (You do not have to explain every detail).
Quality of your presentation (content, style and
delivery).
Useful Resources:
1. HOW TO GIVE A GOOD PRESENTATION,
https://www.princeton.edu/~archss/webpdfs08/BaharMartonosi.pdf
2. How
to
give
a
technical
presentation,
https://homes.cs.washington.edu/~mernst/advice/giving-talk.html
Simplified Submission Template for ACM Papers*
Insert Your Subtitle Here
First A. Author
First Department Name, First Institution/University Name, City, State, Country,
email@email.com
Executive Summary/Abstract
100-200 words describing what has been done, main observations and results.
KEYWORDS
Insert comma delimited author-supplied keyword list, Keyword number 2, Keyword number 3,
Keyword number 4
1 Introduction:
This section includes a longer summary of what has been done, main observations and
results. The report introduction should briefly discuss how the used techniques are
different from previous work on the topic.
1.1 Background/Related Work
This submission version of your paper should not have headers or footers, Baldassare
(2000). It should remain in a one-column format—please do not alter any of the styles or
margins.1
2 Main Section 1
This section could be your problem statement including system the core research questions
and recent articulation of such questions.
3 Main Section 2
Describe your understanding of the main contributions of the topic you are reporting on: what
was done, how it was done, how it works, etc. Provide architectural diagrams, charts and
figures where necessary with proper citation.
1
Footnote when needed.
1
Figure 3: Example of the “Large Float” feature.
Figure 4: Large figure spanning in both the columns in final version.
4 Main Section 3 Findings/Results/Observations
Include here a brief summary of the work and results. Include any future work that is
expected or could be done.
5 Conclusions and Future Work
Include here a brief summary of the work and results. Include any future work that is
expected or could be done.
REFERENCES
[1] Patricia S. Abril and Robert Plant. 2007. The patent holder’s dilemma: Buy, sell, or troll?
Commun. ACM 50, 1 (Jan. 2007), 36-44. DOI: https://doi.org/10.1145/1188913.1188915
[2] Sarah Cohen, Werner Nutt, and Yehoshua Sagic. 2007. Deciding equivalences among
conjunctive aggregate queries. J. ACM 54, 2, Article 5 (April 2007), 50 pages. DOI:
https://doi.org/10.1145/1219092.1219093.
[3] David Kosiur. 2001. Understanding Policy-Based Networking (2nd. ed.). Wiley, New York,
NY.
[4] Sten Andler. 1979. Predicate path expressions. In Proceedings of the 6th. ACM SIGACTSIGPLAN Symposium on Principles of Programming Languages (POPL ’79). ACM Press,
New York, NY, 226-236. DOI: https://doi.org/10.1145/567752.567774.
2
1
Digital Identity
Asish Thapa, Shashank Pudasaini
CSCI-310, Texas A&M University-Commerce, Commerce, Tx, USA
athapa9@leomail.tamuc.edu,
Executive Summary/Abstract
The increase in the usage of resources on the world wide web led to the spread of
on-line cyber maladministration, mischaracterization and cybercrime. Cyber swindlers and
offenders conceal their digital personas from the consumers of the web services as well as
other possessions. We will consider the main identity channels presently used for the
identification and identification forms for the different programs available in cyber as well
as real-world areas. The strategies include the methods of data processing, data gathering
and quantitative models. The participants consisted of banks (14%), churches (12%),
hospitals (16%), insurance (10,7%), mobile-phone companies (2%), and less than one% of
pensions. Other businesses included schools (21%), college groups (16%) and utilities (1.3
percent). Usability, trust, usability, image and user satisfaction are the main paradigms
studied. The findings helped to create a research-oriented system.
KEYWORDS
Structures, Supervision, Identity, Attributes, Metrics, Modeling, Digital, Real Space,
Authentication.
1
2
Digital Identity Verification Framework
1 Introduction:
People need to be identified and identified in their societies and governments
through processes. While this may be evident, for the health of the individual, it is
extremely necessary. In small, intimate groups, simple mechanisms like familiarity,
presence, and, perhaps, an elder’s support are adequate. More formal and formally
physical instruments such as the recorded identity (ID) card, which contains the
signatures or depictions of its owners and checked for documents stored in a central
register, are needed in broader economic systems (Zhu, & Badr, 2018). However, in the
developing world, these formal structures fail.
The issues of authentication, identification, and connectivity are challenging
individually. Identification involves verification of authenticity; access to the information
must also be followed by authentication.1. The issues are further compounded by the
complexities of identification, identification and submission to law enforcement due to
privacy considerations unique to judicial matters. Identification is an essential component
of digital governance centred on transactions. Although people are increasingly remote in
contact with and access administration and computer-controlled, citizens’ identity
systems are firmly rooted in the print age. One of the fundamental challenges of our times
would be how to classify individuals efficiently and safely online and to empower them
to carry out digital tasks in a convenient and private way. The first problem is that the
digital identity contains many meanings. The market is complicated and decentralized
with the incorporation of several competitive products to address some of the problems
that our sustainable development face. Even NIST struggles with meaning in its Digital
Identity Guidelines that states: “On a fixed dimension that suits all, it is hard to reach
through context.”
In particular, it is either the first or the second process, as part of the final digital
identity-checking operation, according to its workflow. The use of an identification of an
1
Kabwe, Felix & Phiri, Jackson. (2019). A Framework for Digital Identity Management.
2
3
image given to governments for biometric authentication follows the rules of AML/KYC.
It is usually done under the guidance of a competent individual in a specific office or
retail shop, for example, in a banking branch, while opening an account. Document
capturing and authentication moves to digital, as digital platforms are growing and
physical banks and retail stores are no longer in place. Identity and document verification
(eIDV) services digitally (electronic) address an immediate concern as regards the
identification of the individual for accessing (remote) online services. Document
authentication services mitigate interest between service providers and their customers in
the presence of universal digital identities, which can be utilized throughout services and
cross-border data security.
1.1 Background/Related Work
We do not need to prove our identity too much with constant discussions, essays
and foreign identification incidents. Rare times when we open or seek employment for a
bank account. One example is how we depend on trustworthy paperwork, like
government permits and identity cards. These details from the financial sector, from the
rules on knowledge of your client (KYC) to the checks by employers when they provide
jobs, is supported by the government-assured data on all of us. These paper-based
methods are not working very successfully when we try to demonstrate who we are
online. It would be pleasant for us to prove ourselves in a safe digital manner and to
represent what we do face to face with pieces of paper.
In the interview with the Goode Intelligence analyst report, Digital Institute, VP
Industry Solutions of Experian has just stated that we are in a charge transfer where a
fusion of the existing physical identification documents with a different beginning and
identity management. According to Britton, VP Industry Solutions of Experian is now in
a transition (Goode, 2019). This is where an urgent problem is solved with electronic
digital verification. Digital ID would be used to build or damage value, much like other
technological advances such as nuclear power and even the omnipresent GPS. Digital ID
security professionals will have access and data management without adequate
safeguards, either for private sector companies or governments. History offers vague
examples of abuse of educational environments to monitor or persecute racial and
3
4
religious groups. If poorly crafted, digital ID may be used by an individual or
organizations in far more coordinated ways against people’s or groups’ concerns.
Potential motives may comprise financial profit from private data collection and storage,
political coercion by a voter or social regulation by monitoring and restricting access to
uses such as purchases, travel and social media.
However, the threats of two big kinds must still be addressed even if digital
identities are explicitly used to generate value and promote inclusive development. First,
digital identification is potentially exposed to threats already established in the largescale use of digital technology. In fact, networking and knowledge exchange lead to
possible risks, which generate digital ID’s value. Whether data violations in the credit
agencies or on social media, technological systems failures or questions about control and
abuse of personal information, policymakers worldwide are currently facing several
possible new risks related to the digital environment. Technological failure could involve
physical or virtual connectivity problems linked with an electronic Exchange and
complications with the infrastructure prohibiting general and efficient system operation
(Wadhwa, 2019).
Identity includes all the fundamental features that make every human being
singular and all the features that allow membership of a certain community or culture and
defined status within a certain group (Maler and Reed, 2019). The personality blocks of
an individual contain identification elements that we might call attributes. Each
identification is distinct from other identifiers, which we would say is special. A person’s
identification includes several specific properties. All subsections of the buildings reflect
the individual’s partial identity and can relate to the roles of a person. The individual may
have several provisional identities based on the circumstances. A sample of the entity
identifier is indicated in the image below.
4
5
Entity diagram2
Furthermore, digital ID will unlock no financial value and theoretically advance
towards values that cannot be captured by quantitative analyses, including those
concerning equality, rights security and transparency. Digital ID will encourage enhanced
and more equitable access to education, health care and labour markets, help safe
migration, and lead to greater citizen engagement. Digital ID may also assist in the
enforcement of the law-nominal rights. Digital ID may help to eliminate child labour and
help implement child marriage legislation through enhanced legal security. Another
advantage of digital ID is transparency. The majority of developed nations have some
digital identification system linked to particular roles and serves a demographic subset.
Still, very few states have a multifunctional framework that serves the whole population.
18% of developed nations have a system that is used exclusively for verification
purposes3. Even though the definition of Digital ID is common, based on the location, it
does play a unique perspective. Digital ID reflects a modernization of existing, stable
existing physical ID systems, all of which have operated fairly well during the old days in
greater countries.
2
Kabwe, Felix & Phiri, Jackson. (2019). A Framework for Digital Identity Management
3
Kabwe, Felix & Phiri, Jackson. (2019). A Framework for Digital Identity Management
5
6
Identifying Elements Digital identity is described as “a distinctive identity or
concept of a participant in a global identity management effort. An identity consists of
attributes; online services, protection and privacy have to do with digital identity
management” (Manohar and Briggs, 2018). The features of digital identity must be
regarded if a person is to log in, checked and allowed to service. Identity token
descriptions, testing, permission and plays a key role in managing the digital identity. The
earlier papers examined identification, technologies that could be processed to create a
multiplexing verification, and ways to exploit the qualities which can be used to quantify
metric models. In this case, a body may be recognized by unique identifying attributes
such as username, items such as electronic cards, biometrics such as speech etc. The
intensity of features or identifiers that could be used to define the quantitative analysis of
metric models will allow defining the individual in a specific way. In comparison, lowincome countries often lack comprehensive civil registry structures and physical IDs and
digitally construct their identification systems, leaping into the more conventional
physically-based scheme. The key immediate objective is classification, not e-services.
Source:( World Bank ID4D database)
Framework Influencing Research
6
7
Soneka and Phiri’s work (2019) has shown that the variables affecting the level of
e-tax adoption and implementation in Zambia using the TAM are helpful, easy to use and
safe. The model was constructed upon the proven and well-used TAM system.
( Soneka and Phiri, 2019)
From this study, the TAM model was shown to be important in this work. In the
industries of this study, the participants’ expectations consolidated on the three structures
which influenced the research. The model concludes that if a person perceives that the
business has some value of a certain innovation, the user will look forward to accepting
it. Simultaneously, people won’t hesitate to accept it if the new technology is seen as easy
to apply.
2 Problem Statement
This article discusses how we target individuals digitally efficiently and safely and allow
them to carry out digital tasks in a perfect as well as in a timely and safe way. We think this is one
of the key issues of our era. The increase in the usage of resources on the Internet has resulted in
the spread of online cyber mismanagement, mischaracterization and cybercrime. Cyber criminals
conceal their identities on the Internet to steal services and other useful products or damage users
of innocent online services. The paper reflects the main identity sources that are presently used in
transaction and application forms for the different services, both in cyberspace and in real space.
The study would also review the information of a system model, which will answer the
question on the factors which affect the choice of users who use these tokens when using these
7
8
certificates and why authentication tokens are being used. This research ruminates concepts of
identification and their significance. The study further examines how key identity features such as
identity papers, application and registration documents for different services provided in
cyberspace and real-world space are extracted from identification symbols.
3 Approach/Methodology/hypothesis
Digital identity usually allows the identification of applicant to be on the
database. The organization must have sent a request to be registered. You may fill in a
form where personal identity details are collected in a database. A token of identity is
given, and the petitioner is subscribed. The user then becomes an applicant before the
applicant can make a clear recognition when encryption is required. A session will be
held, and the information provided by the subscriber will be reviewed thoroughly.
The subscriber must be identified as a validation of the subscriber’s personal data;
it should be a safe verifier process.4 The validation of the attributes of the subscriber is
given. Therefore, much attention had to be paid to authentication characteristics because
they are the key elements of a subscriber’s identification protection. The research
examined the application types and defined attributes that we use in our research that will
further improve the recognition process. The study covers a wide range of industries,
including businesses, insurance firms, governmental agencies, ministries, organizations,
colleges, schools, hospitals, mobiles, utilities and churches. In order to determine
information users’ interpretation of these documents concerning: utility, confidence, easy
use, image (user’s status), and usage performance, documentation were regarded as the
source of identification in the respective industries. The other area was the characteristics
of identification related to the value of each of these characteristics, from the smallest
towards the most significant, that these documentations are concerned with.
Based on several findings concerning the model influencing this analysis. I also
note that we have defined paradigms closely associated based on empirical information
4
Kabwe, Felix & Phiri, Jackson. (2019). A Framework for Digital Identity Management
8
9
analysis, so I suggest that the model of the analysis relevant to this study is that shown in
the image below5.
(Kabwe and Jackson, 2019)
4
Findings/Results/Observations
The first section is on the results of the tokens that represent the mean score of
identities.
Table 1
Institution and Tokens
Constructs
Usefulness
Trust
Ease of Use
Image
User Satisfaction
Banks
4.59
4.41
4.18
3.80
4.09
insurance
4.06
4.06
3.88
3.49
4.11
Churches
4.91
4.91
4.97
4.69
4.69
Government
4.94
4.82
4.80
4.50
4.71
Hospital
4.64
4.40
4.53
4.25
4.59
5
Kabwe & Jackson. 2019
9
10
Mobile Phone
4.83
3.58
3.50
3.50
4.83
Schools
4.80
4.66
4.80
4.56
4.49
Universities
4.60
4.00
3.50
4.00
4.50
University Bills
5.00
Companies
(Kabwe and Jackson, 2019)
In the bank sector, usefulness was the highest (mean score 4,59), preceded by trust (4,41)
& usage convenience (4,18), user satisfaction (4,09) while the least being user image
at (3.80)6.
Considering the results of the analysis for that table, we have the buildings chosen
to influence respondents very strongly. It must be noted that it has been considered very
relevant to be “useful” with identity tokens. The next step was “Trust.” Confidence is a
safety factor. This means that safety is extremely important for the use of identity tokens.
The “facilitated use” of an identity token falls third in the hierarchy. The simpler it is to
use an identification token, the better it is for the users. In terms of significance, “User
satisfaction” emerged. Tokens that satisfy them while achieving their goals react very
well with the consumers of identification tokens.
Ranking Constructs for Various Industries
The study was to consider the industry that we have sampled and recognized the
extremely important use of identification tokens by government, institutions, financial
firms, insurance firms, colleges and utility companies.
Mean scores for the Industries in Five Regions are7:
6
Kabwe, Felix & Phiri, Jackson. (2019). A Framework for Digital Identity Management
7
Kabwe & Jackson, 2019
10
11
Top Important Attributes
(Kabwe & Jackson, 2019). A Framework for Digital Identity Management)
It was noted that the most important attributes of the top ten were: last name, first
name, ID number, date of birth, home address, gender, middle name, telephone number,
place of birth and the authorizing body8.
8
Kabwe, Felix & Phiri, Jackson. (2019). A Framework for Digital Identity Management
11
12
Token of Identity Mean scores
The average score on five given structures for the banking sector was specified as
described in the graph.
Performance Constraints of Various Industries
(Kabwe & Jackson, 2019)
The chart illustrates the views the participants have on the identification cards in
the banking industry on five different paradigms. In this study, the banking industry
focused on considering the views of participants on five different frameworks. Included
in the report were: banks, insurance firms, churches, public administrations, health
institutions, mobile telephone companies, schools, universities and utility firms. The
statistics for five constructs (usability, confidence, usability, image and user satisfaction)
were retrograded in the analysis. The results of this analysis revealed that the major
structures in all these industries were very similar to each other. The following constructs
include usability, utility and confidence. This data was tabulated in the table below:
12
13
Model R
R
Adjusted Std
Square R
Square
Change Statistics
Error of
the
R
Estimate Square
F
dff
df2
Change
Sig F
Change
Change
1
.274* .075
.054
.39392
.075
3.469
3
128
.018
a. Predictors (Constant), Ease of use, Usefulness, Trust
b. Department Variable: Often1
Research Model Summary (Kabwe, & Jackson, 2019)
In general terms, the analysis found that in the listed companies for the sequence
of significance was: Utility, confidence, user friendliness and then identity or status.
Constructs Ranking (Kabwe, & Jackson, 2019).
Average Score of all Attributes
The sampled respondents were key men (53%), and approximately 40% were
single men. Nearly 50% were under 30 years of age. Just 10 per cent had a 12-degree or a
smaller degree – with a college degree of 37 percent, the second degree of 35 percent had
13
14
a Masters’ degrees or a PhD. Less than 2% were not working, and about 5% were public
sector workers or self-employed. Nearly 88% of the workers were salaried.9.
Attributes Mean scores(Source: Kabwe and Jackson, 2019)
In the development of identity systems from attributes, developing industries have
become ever more involved. Many of the systems examined in National Identity use
biometric data from a rapidly emerging industry in developing countries. It was
concluded that in developed industries, the identification attribute grew by more than
28%, at a pace that was 34%10. Taking growth agendas, need for more performance and
enforcement controls, such as Know the customer, as the drivers for implementing such
systems. Such programmes ability to encourage equity and participation is also
celebrated.
Studies have shown that identification schemes for disadvantaged minorities are
becoming more restrictive when it has been implemented, rendering access to legal
documents more difficult. In other instances, States may rely on paperwork to obtain key
services, thus ruining current unofficial support systems. The capacity of behavioural
attributes that enables users to reinforce and validate their identification in the developing
nations is relatively untapped. Still, a great deal can be learned from the achievements
and shortcomings of international identity systems. These contributions contributed to
9
Kabwe, Felix & Phiri, Jackson. (2019). A Framework for Digital Identity Management
10
Kabwe, Felix & Phiri, Jackson. (2019). A Framework for Digital Identity Management
14
15
discussions that we have generally understood to focus on the introduction of
identification systems and the conditions required to implement them successfully.
5 Conclusions and Future Work
I have been able to raise questions on the essence of ‘legal’ identification in
investigating the importance of behavioural characteristics for the various people who
support identity, which is actually poorly, with an emphasis on the moral, educational and
cultural rights-based element of identification delivery. The study seeks to recognize how
important it is to look at the structural aspects of vulnerability organization, integrity and
resilience. It is felt that the key policy tools of the Agenda have a greater emphasis on
user interaction.
Although we have noticed that the use of behavioural attributes is not sufficient to
consider independent from conventional factual information and biometric data, the need
to put people at the center of the layout, deployment and regulation of identity
management schemes has been recognized. It’s worth remembering that behavioural traits
have played a significant role in corporate strategies in organizations, which are currently
seeking expansion in trade markets while performing a role in the international
identification environment.
The use of authentication certificates affects the use of identity tokens. There are
various paradigms that comprise utility, confidence and usability. The way they
manipulate people who use identity tokens is classified as these paradigms. Digital
identity attributes may also be classified as per their significance. In terms of
implementation between one sector to the other, identity certificates vary in
responsiveness. To add value to access control, it should be taken into account the effect
of paradigms on identification in selecting identity tokens for organizations. Finally, we
noticed that in development and planning experience, the role played by behavioural
traits in data security systems is highly underexplored, although used to a certain degree
in private companies. With the current momentum of emerging technologies and their
introduction into the culture, how these trends shape what we do, think and do, it is clear
that in established as well as in evolving situations, these qualities will play a more
15
16
prominent substantial role. In order to encourage effective creativity, identity-related
policies must be kept up with these innovations.
I also discussed the growth and advancement of environments, but the goals are
different while the technological problems are identical. In developed markets, robust
governance and the wide availability of traditionally verifiable identity characteristics
leave behavioural characteristics to increase convenience as a relatively low-risk path.
The lack of verified identity characteristics in emerging markets can affect the person on
personality traits collected diligently. In addition to unconfirmed marketing strategies,
however, low concentrations of sustainable development and spending power can
currently hinder innovation here. Frameworks and regulations are urgently needed in
order to secure stable and ethical control structure and uphold confidentiality, integrity,
independence and agency in the light of the weak government identity systems, poor
governmental regulation and facilities.
16
17
REFERENCES
Alan Goode. “Digital Identity & Document Verification Market & Technology Analysis
Adoption Strategies & Forecasts 2019-2024″(2019).
https://www.goodeintelligence.com/report/digital-identity-document-verificationmarket-technology-analysis-adoption-strategies-forecasts-2019-2024/.
Kabwe, F., Lusaka, Z., & Phiri, J. A Framework For Digital Identity Management.
Maler, Eve, and Drummond Reed. “The Venn of identity: Options and issues in federated
identity management.” IEEE Security & privacy 6, no. 2 (2008): 16-23.
Manohar, Arthi, and Jo Briggs. “Identity management in the age of Blockchain 3.0.”
(2018).
Soneka, Patience Njina, and Jackson Phiri. “A Model for Improving E-Tax Systems
Adoption in Rural Zambia Based on the TAM Model.” Open Journal of Business
and Management 7, no. 2 (2019): 908-918.
Wadhwa, Sourabh. “Decentralized digital identity management using blockchain and its
implication on the public sector.” PhD diss., Dublin Business School, 2019.
World Bank. (2019) http://bit.do/WDR2016-FigS4_1.
Zhu, X., & Badr, Y. (2018). Identity management systems for the Internet of things: a
survey towards blockchain solutions. Sensors, 18(12), 4215.
17

Purchase answer to see full
attachment

  
error: Content is protected !!