Reference no: EM133286809
Information Systems Security
Learning Outcome 1: Critique the application of theoretical models and key concepts to information system security.
Learning Outcome 2: Appraise approaches to information system security based on given information
Learning Outcome 3: Ability to analyse and evaluate a range of theoretical models and frameworks used too underpin and understand IS security threats.
Assessment Task and Purpose:
The attached case study investigates victimization by phishing using the Heuristic Systematic theory.
Read the case study and other references associated with it and write a report to:
1. Appraise and evaluate the merits of this theoretical model used in the case study.
2. Select one of the theories listed below and demonstrate its applicability to improve the investigation outcome.
List of theoretical models:
1. Grounded theory: A systematic and qualitative methodology of developing theories based on the systematically collected and analysed data.
2. Self-Efficacy: "People's judgments of their capabilities to organize and execute courses of action required to attain designated types of performances."
3. Computer Security Model: A multilayer model which shows the steps in computer security including the measures and the next actions of the security abusers after being successful against a security measure.
4. Activity Theory: An approach which proposes that human activity aims at accomplishing certain outcomes through the help of artifacts and other resources.
5. General Deterrence Theory: A term adopted from the discipline of criminology, which is about the disincentives and sanctions to prevent a criminal act in security.
Attachment:- Information Systems Security.rar