Research paper relates to aspect of behavioural security

Assignment Help Other Subject
Reference no: EM132584240

Assignment -

PART 1 - A literature review is an account of what has been published on a topic (in journal articles, conference proceedings, books and other relevant sources) by recognised researchers. Understanding the prior research on a particular topic is the basis of most new research. Researchers must know what has been studied, discussed and recommended by others in related areas.

Information technology security is an increasingly important research topic. Although organisations spend large amounts on technology that can help safeguard the security of their information and computing assets, increased attention is being focused on the role people play in maintaining a safe computing environment. This issue is important both for organisational and home computing

In this assignment you will review the published literature on user security behaviour and write a literature review that synthesizes what you have found into a summary of what is, and is not, known on the topic.

This assignment is intended to:

Help you to understand the basics of a topic that we will explore for the remainder of the semester. It will serve as a starting point for the introduction section of your research project

Provide you with practise finding peer reviewed, recent articles about one topic

Allow you to organize your ideas about that topic in a meaningful way (including both synthesis and critical analysis).

To do - To successfully complete the assignment, you must begin searching for relevant literature immediately. The skills covered in Week 2 will be valuable.

This is a group assignment, and each group includes 3-4 students. Please form the group by week 2 with others attending the same lab session. You will work on assignment 2 with the same group.

Find at least 10 relevant articles. To qualify as a source of information that you can use for the assignment, these main articles must report results of empirical research (i.e. not just authors' opinions). The research results can be either qualitative or quantitative in nature. Each article must also:

Have been published in a refereed journal or conference proceedings (though you may obtain the article through an online source)

Have an extensive references section.

In addition you may choose to supplement these articles with a few articles from other sources or that do not present the authors' own results.

When you search articles, pay particular attention to the keywords below:

- Perceived Severity

- Perceived Self-efficacy

- Perceived Effectiveness

- Perceived Cost

- Perceived Vulnerability

- Perceived Threat

- Intention to Comply

and try to find user security behaviour studies related to these variables. In that way you can use your (part of) searched articles for assignment 2.

After reading each article, you should think about how they all fit together. Your review should be organized by concepts, such as findings, rather than by sources of information. Do not proceed through the articles one-by-one. Your literature review should include an introduction, a main body that reviews the literature (and which you may choose to subdivide further), and a conclusion (which includes your own evaluations and critiques). The Student Learning Centre has some resources that you might find useful if you are unsure as to how to write or structure an essay.

PART 2 - The following recent research paper relates to an aspect of behavioural security: Arachchilage, N. A. G. and Love, S. (2014). Security awareness of computer users: A phishing threat avoidance. Computers in Human Behavior, 38, 304-312.

You should critically evaluate the research described in the paper using the evaluation guide for surveys on page 105 of the ICT615 textbook (by B. J. Oates) and answer each of the questions in the guide with respect to the paper. You are not expected to be able to evaluate the way statistical analysis was carried out in the projects, and should assume that the reported results of the analysis are correct.

Reference no: EM132584240

Questions Cloud

Prepare journal entries to record transactions for sweet ltd : Prepare the journal entries to record the transactions.Sweet Ltd. sold 9,600 common shares at $15/share on September 15, 2021.
WWII monetary system : In 1944, finance specialists and bankers from around the world met to discuss what the post-WWII monetary system would be.
How to prepare the entry to record the exercise : On January 1, 2020, when the fair value of its common shares, Using the book value method, prepare the entry to record the exercise of the conversion option.
Identify at least three productivity measures : Identify at least three productivity measures. What are some problems or issues that you might encounter as you attempt to change the processes?
Research paper relates to aspect of behavioural security : PART 2 - The following recent research paper relates to an aspect of behavioural security: Arachchilage, N. A. G. and Love, S. (2014)
Identify health concerns where medication is contraindicated : A client with migraines is prescribed sumatriptan. Identify two (2) health concerns where this medication is contraindicated. A 22-year-old client is hard.
How many shares were issued as a result of the conversion : How many shares were issued as a result of the conversion? Prepare the entry to record the original issuance of the convertible debentures.
Production-operations and strategy management and leadership : Research the type of leaders your strategic audit company is looking for. Do they hire from within and groom their future leaders,
Determine how much each class of shares should receive : Assuming that the directors decide to declare total dividends in the amount of $599,575, determine how much each class of shares should receive

Reviews

Write a Review

Other Subject Questions & Answers

  What are the arguments supporting or opposing this issue

What are the arguments supporting or opposing this issue? What are the broader environmental issues at play (e.g. climate change, habitat connectivity)

  You think are the pros and cons of this type of employment

Explain what you think are the pros and cons of this type of employment within a correctional setting.

  Create a single view iphone project using objective

Create a Single View iPhone project using Objective-C that contains two entry text fields with descriptive labels. These entry fields will allow the user.

  Write a post in the discussion stream

After reading Chapter Supporting Processes with ERP Systems, consider the following: The athletics director buys sports equipment from a supplier.

  Concepts and rapeutic process of existential therapy

Describe the key concepts and the rapeutic process of Adlerian theory and therapy. Describe the key concepts and therapeutic process of existential therapy. Compare and contrast the rationale of the two therapeutic approaches for explaining psycholog..

  Discuss background of the organisation under investigation

BSB10178 - 6 Managing and leading change - Briefly discuss the background of the organisation under investigation and analyse the situation or risk that needs

  Explain the difference in personality measures and interest

Explain the difference between personality measures and measures of interests.Explain the difference between personality measures and measures of attitudes

  Explain the current state of the issue in criminal justice

Explain the current state of the issue in criminal Justice that you identified. Explain what the trends are for this issue.

  Producing the female sex hormone

The layer of granulosa cells surrounding the oocyte within the ovary are responsible for producing the female sex hormone also known as?

  Law enforcement management-nature-scope of criminal activity

One of the most important aspects to law enforcement management is the anticipation of the resources required to perform police functions effectively. Manpower needs must be weighed, facilities and equipment purchased, and deployment and scheduling a..

  Describe the psychological motivational approach

Describe the psychological motivational approach to curriculum development you will use to shape the curriculum design, providing a rationale for your selected approach that is consistent with the core instructional goals of the planned curriculum

  Define academic and professional goals

describe your current commitment to helping others help themselves as well as your academic and professional goals once you graduate

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd