Critically evaluate the research described in the paper

Assignment Help Other Subject
Reference no: EM132582389

Assignment -

PART 1 -

A literature review is an account of what has been published on a topic (in journal articles, conference proceedings, books and other relevant sources) by recognised researchers. Understanding the prior research on a particular topic is the basis of most new research. Researchers must know what has been studied, discussed and recommended by others in related areas.

Information technology security is an increasingly important research topic. Although organisations spend large amounts on technology that can help safeguard the security of their information and computing assets, increased attention is being focused on the role people play in maintaining a safe computing environment. This issue is important both for organisational and home computing

In this assignment you will review the published literature on user security behaviour and write a literature review that synthesizes what you have found into a summary of what is, and is not, known on the topic.

This assignment is intended to:

Help you to understand the basics of a topic that we will explore for the remainder of the semester. It will serve as a starting point for the introduction section of your research project

Provide you with practise finding peer reviewed, recent articles about one topic

Allow you to organize your ideas about that topic in a meaningful way (including both synthesis and critical analysis).

To do -

To successfully complete the assignment, you must begin searching for relevant literature immediately. The skills covered in Week 2 will be valuable.

This is a group assignment, and each group includes 3-4 students. Please form the group by week 2 with others attending the same lab session. You will work on assignment 2 with the same group.

Find at least 10 relevant articles. To qualify as a source of information that you can use for the assignment, these main articles must report results of empirical research (i.e. not just authors' opinions). The research results can be either qualitative or quantitative in nature. Each article must also:

Have been published in a refereed journal or conference proceedings (though you may obtain the article through an online source)

Have an extensive references section.

In addition you may choose to supplement these articles with a few articles from other sources or that do not present the authors' own results.

When you search articles, pay particular attention to the keywords below:

Perceived Severity

Perceived Self-efficacy

Perceived Effectiveness

Perceived Cost

Perceived Vulnerability

Perceived Threat

Intention to Comply

and try to find user security behaviour studies related to these variables. In that way you can use your (part of) searched articles for assignment 2.

After reading each article, you should think about how they all fit together. Your review should be organized by concepts, such as findings, rather than by sources of information. Do not proceed through the articles one-by-one. Your literature review should include an introduction, a main body that reviews the literature (and which you may choose to subdivide further), and a conclusion (which includes your own evaluations and critiques).

Format Guidelines - Give your literature review a title that clearly reflects the content of your review. Include an introduction section that states the purpose of the review and a conclusion section. Include other sub-sections to help structure your work. Your review should be between 1000 and 2000 words in length. Include appropriate citations throughout the review and a list of references at the end. Referencing should be in APA style.

PART 2 -

The following recent research paper relates to an aspect of behavioural security: Arachchilage, N. A. G. and Love, S. (2014). Security awareness of computer users: A phishing threat avoidance. Computers in Human Behavior, 38, 304-312.

You should critically evaluate the research described in the paper using the evaluation guide for surveys on page 105 of the ICT615 textbook (by B. J. Oates) and answer each of the questions in the guide with respect to the paper. You are not expected to be able to evaluate the way statistical analysis was carried out in the projects, and should assume that the reported results of the analysis are correct.

Reference no: EM132582389

Questions Cloud

How much should be recorded on december : It was sold for $5,000 cash. Using this information, how much should be recorded on December 31 for the Gain or (Loss)? Round to whole dollars
Creating ecommerce business : Prepare a mission statement that encompasses the purpose of the business and considers its target market.
Describe the montessori approach in brief : "Every environment implies a set of values or beliefs about the people who use the space and the activities that take place there.
Describes the benefits of program management : Describes the benefits of program management in an integration project as it relates to project management and a standardized implementation.
Critically evaluate the research described in the paper : You should critically evaluate the research described in the paper using the evaluation guide for surveys. Provide you with practise finding peer reviewed
What is auditor independence : Consult PCAOB Ethics and independence Rule 3520. What is auditor independence, and what is its significance to the audit profession?
What is the definition of program management : What is the definition of program management as it relates to project management? What are the benefits of program management in organizations?
Identify the services provided by arthur andersen : Identify the services provided by Arthur Andersen that are no longer allowed to be performed. Do you believe that Section 201 was needed? Why or Why not?
What is journal entry with regard to the hedging instrument : What is journal entries with regard to the hedging instrument, the purchase of silver inventory and the sale of the finished products.

Reviews

Write a Review

Other Subject Questions & Answers

  Prepare a political briefing and assessment on for a us firm

Assume you are a consultant hired to prepare a political briefing and assessment on for a US manufacturing firm desiring to do business in that country.

  What do you see as the most positive social change

Question 1: What do you see as the most positive social change in your lifetime? The most negative?

  Fundamental differences in active and reserve military

Explain the fundamental differences between active and reserve military. Explain how selected reserves have changed since the Gulf War (1990-1991).

  Explain the four physiographic regions of europe

Be sure to save an electronic copy of your answer before submitting it to Ashworth College for grading. Unless otherwise stated, answer in complete sentences.

  Brief explanation of the philosophy

Post a brief explanation of the philosophy behind teamwork in health care settings. Briefly describe different types of teams and their functions

  Explain osha enforcement statistics

Search OSHA enforcement statistics to find out the top three most frequently cited standards during most recent government reporting period (October-September).

  Recognize complaints by stakeholders for cellphone towers

Use the Internet search engine to recognize the different complaints posed by stakeholders regarding cell phone towers.

  Test-retest reliability with inter-rater reliability

What components differentiate experiments from the non-experimental methods discussed in Modules 2 and 3? How do experiments do a better job of assessing causality? test-retest reliability with inter-rater reliability. Internal validity with extern..

  What are some contemporary theories of motivation

What are some contemporary theories of motivation? Is your employer responsible for motivating you? Why?

  Discuss how adorno concepts of standardization are affirmed

Read the following excerpt on the nature and social character of popular music and discuss how Adorno's concepts of standardization, identification, and pseudo- individualization are affirmed in The Merchants of Cool by Douglas Rushkoff:

  Read the wk kellogg foundation logic model development

Counselors can use logic models to communicate about counseling program development and evaluation.

  Identify the significant genres of the postwar period

What factors lay behind the "upscaling" of Hollywood film genres during the 1950s? Identify the significant genres of the postwar period, and explain how each was affected by enhanced production values and increased thematic complexity

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd