Question: 1. Here The sample for the framework Literature Review I want you to follow? Here the instruction you have to do it for LR (
1. Here The sample for the framework Literature Review I want you to follow?

Here the instruction you have to do it for LR ( framework )

In this section , you must explain each item you need to described the process how it will work
Literature Review Human Factors Technological Controls Organizational Aspects Environmental Factors Guideline Policy Defence-in- depth SETA Situational Awareness forthreat . Employee profiling Crime prevention in employee Insider threats Smart card RFID QR code .IoT . Physical protection system Knowledge Gap Identified Factors Proposed Physical Security Guideline CHAPTER 2 LITERATURE REVIEW 2.1 Introduction 2.2 Physical Access Control 2.3Types of Physical Access control 2.3.1 Discretionary access control (DAC) 2.3.2 Mandatory access control (MAC) 2.3.3 Role-Based Access Control (RBAC) 2.3.4 Attribute-Based Access Control (ABAC) 2.4 The architecture of Access Control 2.5 Technical Challenges Biometric Applications Access controls 2.6 Access Control Architecture 2.7 Vulnerable or Weak points of an electronic lock system 2.8 Development of Access Control Policies 2.9 Current Works on Access Control 2.10 Building Knowledge Models (BIM) 2.11 Limitation 2.12 Definitions of terms 2.13 Research Gap Factors of physical access control Literature Review Human Factors Technological Controls Organizational Aspects Environmental Factors Guideline Policy Defence-in- depth SETA Situational Awareness forthreat . Employee profiling Crime prevention in employee Insider threats Smart card RFID QR code .IoT . Physical protection system Knowledge Gap Identified Factors Proposed Physical Security Guideline CHAPTER 2 LITERATURE REVIEW 2.1 Introduction 2.2 Physical Access Control 2.3Types of Physical Access control 2.3.1 Discretionary access control (DAC) 2.3.2 Mandatory access control (MAC) 2.3.3 Role-Based Access Control (RBAC) 2.3.4 Attribute-Based Access Control (ABAC) 2.4 The architecture of Access Control 2.5 Technical Challenges Biometric Applications Access controls 2.6 Access Control Architecture 2.7 Vulnerable or Weak points of an electronic lock system 2.8 Development of Access Control Policies 2.9 Current Works on Access Control 2.10 Building Knowledge Models (BIM) 2.11 Limitation 2.12 Definitions of terms 2.13 Research Gap Factors of physical access control
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
