information on topic: Types of identity theft like Financial, Medical, Insurance and different types/methods of cyber-crime like Identity theft, Ransomware, Malware, Phishing should be included in the outline as well.
Abstract: The abstract includes the initial thoughts on the summary of the paper that quickly and clearly tells the reader the problem addressed, how the solution was approached, and the resulting solution. does not include any discussion of the results.120 words or less.
Background: introduction to the paper; basic information about the topic to explain the question or problem the paper examines and the position taken in the thesis statement. Tell audience why this topic has importance to the I.T field. Save most of the explanation for the literature review.
Any subheadings for the background would go below the main heading.
Approach: This section does not need to be long but must give the reader a clear idea of the steps taken to achieve the results (i.e., your analysis, case study, etc.). Do not predict or include your solution or recommendations in this section.
Literature Review: Each point included in the literature review builds the argument and includes appropriate academic and professional literature supporting the arguments. It may also include any other relevant evidence. Organize your points to build the argument: you will have an ordered list of points/topics and may break those down into subtopics for better planning and organization of your research.
Solution: What is your anticipated solution to the problem? What will you advise, change, implement, renew to address your problem?
Discussion: This section includes anticipated strengths and weakness of the solution.
Recommendations and Conclusion: This section provides your interpretation of the solution of the paper including:
Solution outcomes,success of the approach,What was learned,Contributions to the field, and Further recommendations.


