Thursday, May 21, 2020

Identity Theft and Possible Risk in Technology - 1713 Words

Identity Theft and Possible Risk in Technology Identity theft has been a major issue of privacy and fraud. In the data breach analysis from the Identity Theft Resource Center (2013), the number of data breaches from the year 2005 to 2012 increased. In 2012, there had been 49% where the data breach exposed people Social Security Number. The data breach of 2012 has a rate of 27.4% caused by hackers. These breaches were commonly from 36.4% businesses and 34.7% health and medical (Identity Theft Resource Center 2013). The number of identity theft varies from physical possession to digital possession. At least one-fifth of trash cans contains papers listing people’s credit card number and personal information. People that throw away their†¦show more content†¦1) Credit card numbers, 2) CW2 numbers from the back of credit cards, 3) Credit reports, 4) Social Security numbers, 5) Driver’s license numbers, 6) ATM numbers, 7) Telephone Calling cards, 8) Mortgage details, 9) Date of Birth, 10) Passwords and PINs, 11) Home address, and 12) Phone numbers. These twelve most wanted personal information from thieves can be used for different kinds of identity theft. In the United States, approximately 90% of the population could be identified by using three pieces of information, birth date, gender, and postal code (CIPPIC, 2007). Method of Identity Theft In order for thieves to commit an identity crime, they must first obtain the personal information of an individual. However, simply assuming a certain individual’s personal information does not entail that it is enough to steal their identity. As we mentioned before, 90% of the U.S. population can be identified by using an individual’s birth date, gender, and postal code. Stealing their identity and use it, it will need more than just that. With a sufficient amount of personal information, the thieves can use the victims name for fraud, such as credit card fraud or medical service. The most simplistic way for an identity thief to acquire personal information would be breaking into private property, stealing mail, digging through trash, andShow MoreRelatedInformation Privacy1353 Words   |  6 Pagesinformation related to the business related which needs to be protected and keep it secured. Thus information privacy may also be called as data pri vacy. An important aspect of information sharing is information privacy. With the advancement in technology, there has been increase in vulnerabilities related to personal information. Thus to protect the personal data, information privacy can be applied in various ways like encrypting the data, data masking and authentication by which only the peopleRead Moreâ€Å"According to the Australian Bureau of Statistics Personal Fraud Survey 2010-11, an estimated total1500 Words   |  6 Pagesand over were victim of at least one incident of identity fraud in the 12 months prior to the survey interview..† (Afp.gov.au, 2014) Identity fraud is a type of fraud that involves illegally pretending to be somebody else for a beneficial gain. This can result in emotional and/or financial devastation. This is a very common legal issue facing Australian stakeholders, costing them a total of $1.4 billion AUD to date (Afp.gov.au, 2014). Identity theft has many consequences and issues that are involve dRead MorePreventive Measures For Smartphones.1512 Words   |  7 PagesPreventive Measures for Smartphones Today, approximately 15 million Americans has fallen victim to Identity Theft. It’s apparent the numbers continue to rise due to the advancement of technology as we enter what is known as the â€Å"Digital Ages†. With the number of devices on the market, who do we blame when people are not aware of risks involved? What tips or tools are established to educate the number of users and network providers of the potential dangers? Even though creators of smartphones doRead MoreIdentifying The Different Ways Online Identity Theft1462 Words   |  6 Pages Identify and discuss the different ways online identity theft can be achieved by a cybercriminal Identity theft is when your personal details are stolen. Identity theft occurs when someone steals your personal information with the intention to access bank accounts for example, or commit many other crimes in your name and at your expense. Identity theft is a growing threat in the uk which is increasing at a rapid rate. It is said that it could be one of the leading threats in the coming years. AnalysisRead MoreEthics in Technology Essay1555 Words   |  7 Pagescomputerized technology, computer engineers had to believe that their contribution to the development of computer technology would produce positive impacts on the people that would use it. During the infancy of computer technology, ethical issues concerning computer technology were almost nonexistent because computers back then were not as multifaceted as they are today. However, ethical issues relating to computer technology and cyber technology is undeniable in today’s society. Computer technology playsRead MoreThe New Transgression Of The Modern World : Cyber Crime1689 Words   |  7 Pagescyber crime we will be looking into a variety of specific types of online misconduct, beginning with Cyber bullying. We will also delve into Identity Theft, On line child sexual abuse material, and Sales and Investment Fraud. Along with looking into the wide array of different types of online crime, we will discuss different deterrents to try to avoid the risk of a cyber attack and tips to stop the malicious transfer of inappropriate materials. By the end of this paper I would like to call out on youRead MoreCyber Internet And Its Effects On The World Wide Web907 Words   |  4 PagesIn a majorly internet savvy society, there are more risks than benefits while using the internet and various ways to protect yourself in the World Wide Web. One of the most common disasters of the Internet in the 20th century would be identity theft. As the need for more technology and more efficient computers, your virtual identity is at stake. Almost 1 in 3 people who are surfing the web get their identities stole by hackers. However, 1 in 5 people know how to protect themselves on the web. InRead MoreThe Identity Theft and Assumption Deterrence Act1823 Wor ds   |  7 PagesInternet identity theft is a serious danger in our world today, victims of this crime have had their lives ruined and in some cases have ended up in jail because of crimes committed by an identity thief. Internet identity theft is â€Å"the criminal act of fraudulently obtaining the personal information belonging to another individual within the realm of a computer or electronic setting.†(1) Throughout the past several years there have been several laws passed to combat and keep up with this ever evolvingRead MoreIdentity Theft Or Identity Fraud1707 Words   |  7 PagesThe evolution of technology has enabled criminals a new form of prey. This problem is known as identity theft or identity fraud. The development and growth of the world wide web and personal computers being have made everyday things easier for everyone, but have also made it easier for criminals to gain access to information needed to steel someone’s identity. This is a crime which c ost people thousands of dollars and countless hours of time spent to regain their losses and the damages done by havingRead MoreAn Effective Information Security Program1289 Words   |  6 Pagesoutsourcing doesn’t come without its risks. In 2005 a MSSP was the victim of theft which resulted in 40 million credit cards stolen. Restaurants in the states of Louisiana and Mississippi sued a MSSP for not being compliant with current PCI DSS standards and poor business practices lead to several cases of identity theft. Studies have shown that although there are inherited risks with MSSPs, with implementation of stricter security requirements and larger clientele the risk could be offset (Hui, Hui,

Tuesday, May 19, 2020

The Things They Carried By Tim O Brien - 1194 Words

Rough Draft Death defines life; it has the ability to reinvent the living for better or worse. â€Å"The Things They Carried†, by Tim O’Brien, provides a non-linear, semi-fictitious account of the Vietnam War that poignantly depicts the complicated relationship between life and death. His account breathes subtle vitality and realism into the lingering presence of the dead, intimating that the memories they impart have as profound an impact as the living. In â€Å"Lives of the Dead†, O’Brien’s own innocence is preserved through the memory of Linda, a memory that remains untarnished by the inevitable corruption that results from life. O’Brien’s writings â€Å"save Linda’s life. Not her body--her life† (236). Storytelling and memories preserve the value of Linda’s existence while simultaneously allowing O’Brien to process death and destruction in a way that maintains a degree of optimism regarding his own life and future. Juxtaposing the images of body and life emphasizes his desire to save the idea of Linda while accepting the loss of her physical presence. O’Brien rejects the idea of death as absolute and final; instead he suggests that â€Å"once you are alive, you can never be dead† (244). Linda’s death solidifies her importance in O’Brien’s own development; she teaches him about life and real love as much as in death as in life. Oâ₠¬â„¢Brien’s paradoxical statement defines the lasting impact of Linda on him; her presence in his stories keeps her alive through memory; memories that even her deathShow MoreRelatedThe Things They Carried By Tim O Brien892 Words   |  4 PagesThe Vietnam War was a long, exhausting, and traumatic experience for all of the soldiers and those who came with them. The Things They Carried, by Tim O Brien illustrates the different affects the war had on a variety of people: Jacqueline Navarra Rhoads, a former nurse during the Vietnam war, demonstrates these effects within her own memoir in the book, The Forgotten Veterans. Both sources exemplify many tribulations, while sharing a common thread of suffering from mental unpredictability. DesensitizationRead MoreThe Things They Carried By Tim O Brien1377 Words   |  6 Pageslove to have it as good as we do. Tim O’Brien’s The Things They Carried discusses many veterans who experience the burden of shame and guilt da ily due to their heroic actions taken during the Vietnam War. The book shows you how such a war can change a man before, during, and after it’s over.     Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   As I reflect on the many conflicts America has been a part of, none can compare to the tragedies that occurred in The Vietnam war. As told in The Things They Carried (O’Brien), characters such as NormanRead MoreThe Things They Carried By Tim O Brien1457 Words   |  6 Pagesthe theme pertains to everyone regardless of their background. It conveys the same ideas to people from all across our society. Lastly, a classic is timeless, which means it has transcended the time in which it was written. In Tim O’Brien’s novel, The Things They Carried, he offers a new, intriguing way to view war or just life in general and also meets all of the crucial requirements mentioned above to qualify it as a book of literary canon. Though this book is technically a war novel, many peopleRead MoreThe Things They Carried By Tim O Brien1242 Words   |  5 Pagesâ€Å"Tim O’Brien is obsessed with telling a true war story. O Brien s fiction about the Vietnam experience suggest, lies not in realistic depictions or definitive accounts. As O’Brien argues, absolute occurrence is irrelevant because a true war story does not depend upon that kind of truth. Mary Ann’s induction into genuine experience is clearly destructive as well as empowering† (p.12) Tim O’s text, The Things they Carried, details his uses of word choice to portray his tone and bias. Tim O’BrienRead MoreThe Things They Carried By Tim O Brien1169 Words   |  5 Pagesbut are set in the past and borrows things from that time period. A story that fits this genre of literature is The Things They Carried. The story is about Tim O Brien, a Vietnam veteran from the Unite States, who tells stories about what had happ ened when he and his team were stationed in Vietnam. He also talks about what he felt about the war when he was drafted and what he tried to do to avoid going to fight in Vietnam. The Things They Carried by Tim O Brien was precise with its portrayal of settingRead MoreThe Things They Carried By Tim O Brien1004 Words   |  5 Pages Tim O’Brien is a veteran from of the Vietnam War, and after coming home from his duty he decided to be a writer. His work â€Å"The Things They Carried† is about a group of soldiers that are fighting in the Vietnam War. The first part of the story talks mostly about physical items that each soldier carries, and also mentions the weight of the items as well. Though, there is one exception to the list of physical things. Lieutenant Cross is a character of the story, and Tim O’ Brien quickly states theRead MoreThe Things They Carried By Tim O Brien896 Words   |  4 PagesTrouble without a doubt is what First Lieutenant Jimmy Cross c arried around his shoulders because he was out in war, where mistakes happen. Lost and unknown of his surroundings he had to lead his men into safety, while destroying anything they found. First Lieutenant Jimmy Cross only holds onto one thing for hope and that is Martha, the woman who he hopes is a virgin to come back to. Tim O’ Brien introduces symbolism by adding a character that has a meaning of purity and a pebble, which symbolizesRead MoreThe Things They Carried By Tim O Brien Essay832 Words   |  4 PagesSummary: â€Å"By and large they carried these things inside, maintaining the masks of composure† (21). In Tim O’brien’s The Things They Carried, the American soldiers of the Vietnam War carry much more than the weight of their equipment, much more than souvenirs or good-luck charms or letters from home. They carried within themselves the intransitive burdens—of fear, of cowardice, of love, of loneliness, of anger, of confusion. Most of all, they carry the truth of what happened to them in the war—aRead MoreThe Things They Carried By Tim O Brien1369 Words   |  6 PagesMany authors use storytelling as a vehicle to convey the immortality of past selves and those who have passed to not only in their piece of literature but in their life as an author. In Tim O’Brien’s work of fiction The Things They Carried, through his final chapter â€Å"The Lives of the Dead,† O Brien conveys that writing is a matter of survival since, the powers of s torytelling can ensure the immortality of all those who were significant in his life. Through their immortality, O’Brien has the abilityRead MoreThe Things They Carried By Tim O Brien1407 Words   |  6 Pages       Our introduction stated that in â€Å"The Things They Carried,† author Tim O’Brien tells us not directly of the soldiers of Vietnam, or the situations they find themselves in, but about the things they carry on their shoulders and in their pockets. These â€Å"things† identify the characters and bring them to life.   I find that to be true as the author unfolds the stories about war and the uncommon things one carries in to war both inadvertently and on purpose.  Ã‚  Ã‚  As it was noted: Stories about war –

Wednesday, May 6, 2020

Apology of Socrates Summart - 924 Words

Summary Platos The Apology is an account of the speech Socrates makes at the trial in which he is charged with not recognizing the gods recognized by the state, inventing new deities, and corrupting the youth of Athens. Socrates speech, however, is by no means an apology in our modern understanding of the word. The name of the dialogue derives from the Greek apologia, which translates as a defense, or a speech made in defense. Thus, in The Apology, Socrates attempts to defend himself and his conduct--certainly not to apologize for it. For the most part, Socrates speaks in a very plain, conversational manner. He explains that he has no experience with the law courts and that he will instead speak in the manner to which he is†¦show more content†¦Indeed, his wisdom is deeply humbling, as it casts all pretensions to human knowledge into question. With a smile, Socrates accepts that he is better off the less he thinks he knows, and passes this wisdom along with appropriate wit. This irony, then, deeply informs the elenchus, Socrates preferred mode of inquiry. It is important to note that almost all written accounts of Socrates are dialogues (The Apology is an exception)--Socrates never lectures on his beliefs in a one-sided manner. This supports the idea that Socrates has no knowledge of his own to put forward. His method of inquiry consists of identifying what his interlocutor thinks he knows, and then slowly dissecting those claims of knowledge. The Apology, however, is presented almost exclusively in the form of a monologue, because Socrates is not discussing and dismantling any one particular claim so much as he is laying out the method behind these dismantlings. As such, it is an invaluable commentary on the other dialogues. The elenchus acts to disabuse Socrates interlocutors of their pretensions and thereby deepens their wisdom. For Socrates, wisdom and virtue are closely connected, so his efforts serve to improve society as a whole. In Socrates view, if we are all wise, none of us will ever do wrong, and our self-knowledge will lead to healthier, more fulfilling lives. Thus, the philosopher, according to Socrates, does not merely follow abstract intellectual pursuits for the sake of

Factors That Affect The Holiday Choice Has Evolved Over...

In conclusion, most evidence is suggesting that tweens, a group of highly experienced tourists between the ages of 8-12, are increasingly becoming a major influence behind family holidays. This age group have usually taken a number of holidays and have visited many different destinations across the globe. As outlined earlier Argyle (1996) makes reference to how a number of factors, age being one of them, have an effect on the holiday-taking decision-making process. This directly links to how tweens are generally now more cultured and have experienced more of life compared to tweens several decades ago. Therefore, combined with McNeal’s (1991) guilt factor theory, evidence suggests that parents are becoming more and more reliant on their†¦show more content†¦These include the initiator, influencer, decider, buyer, user, etc. Although, the husband and wife are generally the family s chief decision-makers, the child s influence cannot be ignored. Assael (1995) noted that children play an important part in family decision-making and their influence varies by product categories and services at different decision stages. Howard and Madrigal (1990) stated that the relative influence of the husband, wife or child is likely to vary according to the type of purchase decision, the stage of the decision-making process; and the overall family characteristics (Kotler, Bowen, Makens, 1999). As shown by Gram (2005) as well as Thornton, Shaw and Williams (1997), differences in needs, wants and desires across family members often transform both the holiday itself and the decision-making process to holidays into an art of compromising, negotiating, attempts to reach consensus, conflict handling, or sometimes crisis management. As a result I think that it is justifiable to say that the change of perceptions of the nature of the tourism decision-making process, and spouses role in it have impacted the opinion on the children s participation within the practice. Lenient upbringing and guilt issues trigger parents to be more responsive to children s holiday preferences. In the tourism decision-making practice tweens are believed to exert active influence in the initial stages of

John Fitch Free Essays

John Fitch was a great inventor and his ideas helped us today. He also was a clockmaker and bronze smith. He invented the first steamboat and the steam locomotive railway. We will write a custom essay sample on John Fitch or any similar topic only for you Order Now Here are some facts on John Fitch inventions. John Fitch was born in Windsor, Connecticut on a farm. This farm is part of present day South Windsor, Connecticut. He had schooling from a clockmaker. Opened a brass and silversmith business in Trenton, New Jersey and succeeded until the American Revolution. In addition, he served the army for a short time and then started a gun factory. He also considered selling tobacco and beer to the continental army. After this he was surveying the Northwest Territories he was captured by Indians. Later was turned in to the British. British then released him and he started working designing steam powered ship. He was unable to get funds from the Continental Congress, so he found new investors and persuaded them. These investors gave him a 14 year monopoly. John Fitch saw some British steam engines drawings. But he had to build his own steam engine because he lacked money and was too difficult. John Fitch built many successful models with the help of Henry Voight. Henry Voight was a watchmaker; he constructed a 45 foot steamboat. The first trial run of this steamboat was in the Delaware River. The delegates of the Constitutional Convention were there to see the trial run. John Fitch constructed four different steamboats between 1785 and 1796 that successfully plied rivers and lakes. John Fitch demonstrated the feasibility of using steam for water locomotion. His models utilized various combinations of propulsive force, including ranked paddles, paddle wheels, and screw propellers. This steamboat was propelled by oars on the sides. The following years John Fitch build a 60 foot steamboat. It was powered by a steam engine that drove several stern mounted oars. This ship carried up to 30 passengers to round trip voyages. It went between Philadelphia and Burlington, New Jersey. After this invention John Fitch was granted a patent after the battle with James Rumsey. James Rumsey had an invention that was similar to John Fitch’s invention. Unfortunately the patent commission did not award the broad monopoly John Fitch asked for. But the patent did award James Rumsey and John Stevens for their Steamboat designs. This caused John Fitch to lose his monopoly and investors leaving his company. Although his steamboats still worked and run successfully. He did not focus on the construction and the operating cost. He did not have the chance to explain the economic benefits of steam navigation. Later on John Fitch’s ideas was turned profitable by Robert Fulton. Although, Robert Fulton got a patent from New York because of his partner’s powerful influence Robert Livingston, Robert Fulton was unable to get a patent from the US patent. He was unable to do this because one of John Fitch’s companies, William Thornton was the clerk of the patent office and bitterly opposed him. But John Fitch had a patent from France and was credited more than Robert Fulton for the invention of the steamboat. In addition, John Fitch invented the steam railroad locomotive in 1780. He showed a little of his model to the president George Washington and his cabinet in Philadelphia. In Ohio Historical Society Museum still has a model of the railroad locomotive. John Fitch was eager to work with rail locomotive, but soon his ideas were forgotten. Without John Fitch contributions to the steamboat and the steam railroad locomotive we would not have ships. John Fitch was a great American inventor that was ignored. He was ignored because the investors didn’t give him the patent he asked for. In 1802, the Englishman Richard Trevithick invented a full-size steam locomotive. This locomotive would soon haul the world’s first locomotive-hauled railway train, and within a short time the British invention led to the development of actual railways. Americans ignorance of John Fitch’s pioneering invention a quarter of a century earlier, began importing English locomotives and copying them. Many of John Fitch’s ideas were copied and they get all the credit, because he lacked money to pay for a company. A memorial to John Fitch stands in Bardstown, Kentucky’s Courthouse Square. Here he lies with complete replica of his first steamboat. John Fitch Monument also stands in Warminster Township, Pennsylvania at the spot he first developed the idea for a steamboat. John Fitch High School was built on Bloomfield Avenue in Windsor, Connecticut in the 1934. It became an elementary school in the 1950s. The building was converted to elderly housing in the 1990s, but its facade still bears John Fitch’s name and likeness carved in stone. It is listed on the National Register of Historic Places. Sources 1) Encyclopedia 2) About. com 3) Google 4) Ask. com 1. njlh 2. jjn How to cite John Fitch, Papers

Visual Methods in Educational Research †Free Samples to Students

Question: Discuss about the Visual Methods in Educational Research. Answer: Introduction Researching on a topic is based on the different angles and dimensions that are required to be perceived in different manners. Research involves a few steps that must be recognized and followed in order to make the outcome more favorable and to the point. A research methodology has been outlined in order to make use of the correct approach of the researcher in accordance to the research topic that the person chose (DUMI and BLAKAJ 2017). The chapter aims at understanding the different approaches of the reviews and the research and focuses on the outcome of the gradually. The research and the outcome of the research are being highlighted. Quantitative and the qualitative Methods The methodology of a research is the most important part before even undertaking the research as it clearly states the ways in which the research must be made. The systematic approach of undertaking a research is basically due to the practice of the methodology that clearly states the path which is required to be taken in order to investigate on the given topic and to make use of the findings to derive an outcome (Coleman, Lawrence and Childers 2016). The researcher might consider the Qualitative approach of researching adhering to the requirements of the research. All the information that is required by the researcher in undertaking the research is being gathered from the promising sources like the published data- papers, journals and books (WALKER 2016). The Quantitative approach deals with the statistics and figures, which helps in the better understanding of the situation of the researched objects. According to the requirements of this report the data is being obtained from the systematic review of the literature which focuses on the questions of the research through the proper identification of the needs and requirements of the research, proper selection and is taken after properly assessing the evidence for each objective that is required in the research work (). Methodology used in this research A literature review, in accordance to this report, is a type of research in which the research is being done in a particular subject, which has been published (Moss and Pini 2016). It may include a brief overview of the entire subject, classification of the contents of the subject and a comparison with the previous research studies and theoretical essays based on the same. There are different types of literature reviews, depending on the requirements of the research and the subject that has been chosen for the research (Machi and McEvoy 2016). traditional review systematic review meta-analysis meta-synthesis (Reynolds and Daniel 2017) Concept of systematic review A systematic literature review is a form of secondary review in which the researcher identifies the needs of the research topic and by evaluating and understanding the research type through the application of proper methodology (Christensen, Wildgaard and Wildgaard 2016). A systematic literature review can be undertaken for several reasons, which are being discussed in this section: Identification of gaps and recommendations Evaluation of the extent of the solution being delivered by the existing research Evaluation of the particular areas of interest, Summing up of the evidences in order to undertake the research effectively Identification of the gaps and the inconsistencies and develop the reason for the flaws Adhering to a framework or design for the recent research activity In order to examine theoretical hypotheses, improving existing models, or assist new hypotheses systematic literature reviews have been chosen. They are proved to be invaluable in citing the research which is being performed in a particular project and thereby evaluate the theories in a specific area of research. The researcher in this report concentrated on the understanding of the E-government in Saudi Arabia (Alshehri, Drew and Alfarraj 2012). Therefore, the researcher focused on the different databases as she identified and selected the data that will be required by her in researching on the subject. Choosing the subject of the research on which the research will be made Identifying the important keywords relating to the research Selection of the proper database (DB) Collection of the data from the variable sources that might would satisfy the requirements of the research Summarizing the data, evaluation as per the needs and the proper allocation of the sub parts Writing the report (Bryer 2016) The project involves a research of the academic and theoretical work, which is again professional as it uses different databases like: E-government, E-government in Saudi Arabia Saudi Arabia Vision 2030 It began with the findings on the E-government and thereby found documents from different sources like academic journals, magazines and the like (Creswell and Poth 2017). The researcher continued to identify the data for her research and analyzed them in order to find the most relevant document that would support her report (Brinkmann 2016). She recorded the the information based on the name of the author, the date of publication and the content and gradually classified them in accordance to the requirements of her report. Conclusion Therefore, from the above analysis it can be concluded that in order to undertake a research, the researcher must adhere to the methodology in order to make the research a systematic one, which will yield an outcome. References Alshehri, M., Drew, S. and Alfarraj, O., 2012. A Comprehensive Analysis of E-government services adoption in Saudi Arabia: Obstacles and Challenges.International Journal of Advanced Computer Science and Applications,3(2), pp.1-6. Booth, A., Sutton, A. and Papaioannou, D., 2016.Systematic approaches to a successful literature review. Sage. Brinkmann, S., 2016. Methodological breaching experiments: Steps toward theorizing the qualitative interview.Culture Psychology,22(4), pp.520-533. Bryer, T.A., 2016. Conclusion and Next Steps for Research and Practice.Social Media for Government: Theory and Practice, p.213. Christensen, L., Wildgaard, L. and Wildgaard, K., 2016. Permanent catheters for recurrent ascitesa critical and systematic review of study methodology.Supportive Care in Cancer,24(6), pp.2767-2779. Coleman, T.D., Lawrence, H.J. and Childers, W.L., 2016. Standardizing methodology for research with uneven terrains focused on dynamic balance during gait.Journal of applied biomechanics,32(6), pp.599-602. Creswell, J.W. and Poth, C.N., 2017.Qualitative inquiry and research design: Choosing among five approaches. Sage publications. DUMI, A.R. and BLAKAJ, K., 2017. METHODOLOGY AND RESEARCH.Vizione, (27). Machi, L.A. and McEvoy, B.T., 2016.The literature review: Six steps to success. Corwin Press. Moss, J. and Pini, B. eds., 2016.Visual research methods in educational research. Springer. Reynolds, D. and Daniel, S., 2017. Toward contingency in scaffolding reading comprehension: Next steps for research.Reading Research Quarterly. WALKER, H., 2016. Methods of Research.Qualitative Methods in Africana Studies: An Interdisciplinary Approach to Examining Africana Phenomena, p.1.