Critically evaluate the research described in the paper

Assignment Help Other Subject
Reference no: EM132680757

PART 1

A literature review is an account of what has been published on a topic (in journal articles, conference proceedings, books and other relevant sources) by recognised researchers. Understanding the prior research on a particular topic is the basis of most new research. Researchers must know what has been studied, discussed and recommended by others in related areas.

Information technology security is an increasingly important research topic. Although organisations spend large amounts on technology that can help safeguard the security of their information and computing assets, increased attention is being focused on the role people play in maintaining a safe computing environment. This issue is important both for organisational and home computing

In this assignment you will review the published literature on user security behaviour and write a literature review that synthesizes what you have found into a summary of what is, and is not, known on the topic.

This assignment is intended to:
• Help you to understand the basics of a topic that we will explore for the remainder of the semester. It will serve as a starting point for the introduction section of your research project
• Provide you with practise finding peer reviewed, recent articles about one topic
• Allow you to organize your ideas about that topic in a meaningful way (including both synthesis and critical analysis).

To do
To successfully complete the assignment, you must begin searching for relevant literature immediately. The skills covered in Week 2 will be valuable.

This is a group assignment, and each group includes 3-4 students. Please form the group by week 2 with others attending the same lab session. You will work on assignment 2 with the same group.

Find at least 10 relevant articles. To qualify as a source of information that you can use for the assignment, these main articles must report results of empirical research (i.e. not just authors' opinions). The research results can be either qualitative or quantitative in nature. Each article must also:
• Have been published in a refereed journal or conference proceedings (though you may obtain the article through an online source)
• Have an extensive references section.
In addition you may choose to supplement these articles with a few articles from other sources or that do not present the authors' own results.

When you search articles, pay particular attention to the keywords below:
• Perceived Severity
• Perceived Self-efficacy
• Perceived Effectiveness
• Perceived Cost
• Perceived Vulnerability
• Perceived Threat
• Intention to Comply
and try to find user security behaviour studies related to these variables. In that way you can use your (part of) searched articles for assignment 2.

After reading each article, you should think about how they all fit together. Your review should be organized by concepts, such as findings, rather than by sources of information. Do not proceed through the articles one-by-one. Your literature review should include an introduction, a main body that reviews the literature (and which you may choose to subdivide further), and a conclusion (which includes your own evaluations and critiques).

PART 2

The following recent research paper relates to an aspect of behavioural security:
• Arachchilage, N. A. G. and Love, S. (2014). Security awareness of computer users: A phishing threat avoidance. Computers in Human Behavior, 38, 304-312.

You should critically evaluate the research described in the paper using the evaluation guide for surveys on page 105 of the ICT615 textbook (by B. J. Oates) and answer each of the questions in the guide with respect to the paper. You are not expected to be able to evaluate the way statistical analysis was carried out in the projects, and should assume that the reported results of the analysis are correct.

Attachment:- the role of users in maintaining a safe computing environment.rar

Reference no: EM132680757

Questions Cloud

Which is true for alfred owned a term life insurance policy : Paid an additional $10,000 of premiums. When Alfred died 28 months later, the company collected the face value of the policy of $150,000. Which is true?
What are your thoughts in strategies that unions utilize : Post a summary of the top three factors that you feel have led to the decline in union membership over past few decades. For your top 3 comment on any ties.
Prepare the appropriate journal entries through the maturity : Jan. 13 Negotiated a revolving credit agreement with Parish Bank that can be renewed annually upon bank approval. Prepare the appropriate journal entries
Which is true related to ted works for suburu motors : Servicing fee for the time spent preparing the car for pick-up but Ted does not pay the "dealer prep fee". Which of the following is true?
Critically evaluate the research described in the paper : You should critically evaluate the research described in the paper using the evaluation guide for surveys - You are not expected to be able to evaluate the way
Which items are taxable as income : Vera receives the following income. Which items are taxable as income? Interest income from Hong Kong bonds $1000 Interest income from Philadelphia Bonds $2000
Problems faced by employees under work-life balance policy : What are the issues and problems faced by the employees under work-life balance policies in Wyndham Hotels and Resorts based in US?
Complete the retained earnings statement : Question - Complete the retained earnings statement, filling in the missing amounts. Beginning retained earnings, Jan 1 $55,300
Which is true regarding paul : The customer might have mistaken a $100 bill for a $10 bill. Paul was so gratified that he gave $15 to the cashier. Which of the following is true?

Reviews

Write a Review

Other Subject Questions & Answers

  Describe safe use of aids and equipment

Level 2 Diploma Health and Social Care-Undertake agreed pressure area care-Describe how incorrect handling and moving techniques can damage the skin.

  Utilitarian or deontological ethical theory

Each paragraph in the body should start with a topic sentence that clearly identifies the main idea of the paragraph. Each paragraph should have at least four sentences.

  Discuss the various schedules of reinforcement

This assignment allows you to interact with schedules of reinforcement in a way that discriminates between example and non-examples.

  Dispute settlement mechanism work

How does the World Trade Organization's Dispute Settlement Mechanism work?

  Plan an elaborate event

Desire to completely plan out a wedding with all of its details -- pre-wedding activities as well.

  How do values of evaluation conflict adhere to social works

You consider the assertion that the evaluation of specific policies is often strongly influenced by values. You also examine and evaluate ways to mitigate.

  Provide an example of action that is legal but not ethical

How would you define ethical? How would you define legal? Provide an example of an action that is legal, but not ethical.

  Compare and contrast automatic and controlled thinking

What are some aspects of nonverbal behavior? Give some common examples of nonverbal behavior and how you interpret the meaning behind each one.

  Accommodations and interventions tried for students

What are the benefits of document accommodations and interventions tried for students?

  Discuss the advantage and disadvantage of social conformity

Discuss the advantages and disadvantages of social conformity. Then, provide an example of social conformity in your own life.

  How was the Constitution applied to protect defendant rights

Assess the historical context of the case - how was the Constitution applied to protect defendant rights and how does this ruling affect society

  What is your stance on the problem of payoffs

As a manager in a foreign subsidiary, how can you reconcile local expectations of questionable payments with the corporate code of ethics and the Foreign.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd