Literature review on user security behaviour

Assignment Help Computer Network Security
Reference no: EM132657089 , Length: word count:2000

Assignment 1

PART 1

A literature review is an account of what has been published on a topic (in journal articles, conference proceedings, books and other relevant sources) by recognised researchers. Understanding the prior research on a particular topic is the basis of most new research. Researchers must know what has been studied, discussed and recommended by others in related areas.

Information technology security is an increasingly important research topic. Although organisations spend large amounts on technology that can help safeguard the security of their information and computing assets, increased attention is being focused on the role people play in maintaining a safe computing environment.This issue is important both for organisational and home computing

In this assignment you will review the published literature on user security behaviour and write a literature review that synthesizes what you have found into a summary of what is, and is not, known on the topic.

This assignment is intended to:

• Help you to understand the basics of a topic that we will explore for the remainder of the semester. It will serve as a starting point for the introduction section of your research project
• Provide you withpractise finding peer reviewed, recent articles about one topic
• Allow you to organize your ideas about that topic in a meaningful way (including both synthesis and critical analysis).

To do
To successfully complete the assignment, you must begin searching for relevant literature immediately. The skills covered in Week 2 will be valuable.

This is a group assignment, and each group includes 3-4 students. Please form the group by week 2 with others attending the same lab session. You will work onassignment 2 with the same group.

Find at least 10 relevant articles. To qualify as a source of information that you can use for the assignment, these main articles must report results of empirical research (i.e. not just authors' opinions). The research results can be either qualitative or quantitative in nature. Each article must also:
• Have been published in a refereed journal or conference proceedings (though you may obtain the article through an online source)
• Have an extensive references section.
In addition you may choose to supplement these articles with a few articles from other sources or that do not present the authors' own results.

When you search articles, pay particular attention to the keywords below:
• Perceived Severity
• Perceived Self-efficacy
• Perceived Effectiveness
• Perceived Cost
• Perceived Vulnerability
• Perceived Threat
• Intention to Comply
and try to find user security behaviour studies related to these variables. In that way you can use your (part of) searched articles for assignment 2.

After reading each article, you should think about how they all fit together. Your review should be organized by concepts, such as findings,rather than by sources of information. Do not proceed through the articles one-by-one. Your literature review should include an introduction, a main body that reviews the literature (and which you may choose to subdivide further), and a conclusion (which includes your own evaluations and critiques).The Student Learning Centre has some resources that you might find useful if you are unsure as to how to write or structure an essay

Format Guidelines
• Give your literature review a title that clearly reflects the content of your review.
• Include an introduction section that states the purpose of the review and a conclusion section. Include other sub-sections to help structure your work.
• Double-space your review and use 12-point font.
• Your review should be between 1000 and 2000 words in length.
• Include appropriate citations throughout the review and a list of references at the end. Referencing should be in APA style.
• Your review should include a minimum of 10 sources of information.

Attachment:- IT safe Assignment.rar

Reference no: EM132657089

Questions Cloud

Border security and immigration : Describe how border protection philosophy changed as a result of 9/11. Summarize border security issues.
Explain hr best workforce management practices audit : What are the HR Best Workforce Management Practices Audit? Can you provide some examples? Can you provide 2-3 references to support your claim?
What the total overhead assigned to product x would be : What the total overhead assigned to product X5 would be? Pawn Corp has identified two activities in its activity based costing system
Immunity- prosecution for bribery against a high government : Assume you are a lawyer defending someone in a prosecution for bribery against a high government official.
Literature review on user security behaviour : Find user security behaviour studies related to these variables. In that way you can use your (part of) searched articles for assignment
Determine the amount of Olaf and Anna loss : In 2019, their return shows AGI of $300,000 and taxable income (exclusive of casualty loss deduction) of $220,000. Determine the amount of Olaf and Anna's loss
Can you establish a compensation and benefit plan : Can you establish a compensation and benefit plan? Can you provide detailed examples? Can you provide some examples? Can you provide 2-3 references to support y
What is the vat shouldered by claire classified : The VAT-inclusive price reflected on the official receipt is PhP2,500. What is the VAT shouldered by Claire classified as input or output VAT
Describe key campaign strategies : describe key campaign strategies that a U.S. presidential candidate can use in order to ascend to presidency in today's political environment.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd