1. Multi-factor Authentication (2016) Accessed date: 01 Dec 2016.
http://searchsecurity.techtarget.com/definition/multifactor-authentication-MFA
2. Multifactor authentication examples and business case scenarios (2016) Accessed date: 01 Dec 2016. URL:
http://searchsecurity.techtarget.com/feature/The-fundamentals-of-MFA-The-business-case-for-multifactor-authentication
3. Anderson T (2014) Why multi-factor authentication is a security best practice. Access date: 01 Dec 2016. URL:
http://www.scmagazineuk.com/why-multi-factor-authentication-is-a-security-best-practice/article/373462/
4. Pascual A, Miller S (2015) 2015 Identity fraud: protecting vulnerable populations. Accessed Date: 01 Dec 2016. URL:
https://www.javelinstrategy.com/brochure/347
5. Identity Theft and Cybercrime (2015) Access date: 01 Dec 2016. URL:
http://www.iii.org/fact-statistic/identity-theft-and-cybercrime