Review should be organized by concepts

Assignment Help Other Subject
Reference no: EM132734088 , Length: 2200 Words

PART 1

A literature review is an account of what has been published on a topic (in journal articles, conference proceedings, books and other relevant sources) by recognised researchers. Understanding the prior research on a particular topic is the basis of most new research. Researchers must know what has been studied, discussed and recommended by others in related areas.

Information technology security is an increasingly important research topic. Although organisations spend large amounts on technology that can help safeguard the security of their information and computing assets, increased attention is being focused on the role people play in maintaining a safe computing environment. This issue is important both for organisational and home computing

In this assignment you will review the published literature on user security behaviour and write a literature review that synthesizes what you have found into a summary of what is, and is not, known on the topic.

This assignment is intended to:
• Help you to understand the basics of a topic that we will explore for the remainder of the semester. It will serve as a starting point for the introduction section of your research project
• Provide you with practise finding peer reviewed, recent articles about one topic
• Allow you to organize your ideas about that topic in a meaningful way (including both synthesis and critical analysis).

To do
To successfully complete the assignment, you must begin searching for relevant literature immediately. The skills covered in Week 2 will be valuable.

This is a group assignment, and each group includes 3-4 students. Please form the group by week 2 with others attending the same lab session. You will work on assignment 2 with the same group.

Find at least 10 relevant articles. To qualify as a source of information that you can use for the assignment, these main articles must report results of empirical research (i.e. not just authors' opinions). The research results can be either qualitative or quantitative in nature. Each article must also:
• Have been published in a refereed journal or conference proceedings (though you may obtain the article through an online source)
• Have an extensive references section.
In addition you may choose to supplement these articles with a few articles from other sources or that do not present the authors' own results.

When you search articles, pay particular attention to the keywords below:
• Perceived Severity
• Perceived Self-efficacy
• Perceived Effectiveness
• Perceived Cost
• Perceived Vulnerability
• Perceived Threat
• Intention to Comply
and try to find user security behaviour studies related to these variables. In that way you can use your (part of) searched articles for assignment 2.

After reading each article, you should think about how they all fit together. Your review should be organized by concepts, such as findings, rather than by sources of information. Do not proceed through the articles one-by-one. Your literature review should include an introduction, a main body that reviews the literature (and which you may choose to subdivide further), and a conclusion (which includes your own evaluations and critiques).

PART 2

The following recent research paper relates to an aspect of behavioural security:
• Arachchilage, N. A. G. and Love, S. (2014). Security awareness of computer users: A phishing threat avoidance. Computers in Human Behavior, 38, 304-312.

You should critically evaluate the research described in the paper using the evaluation guide for surveys on page 105 of the ICT615 textbook (by B. J. Oates) and answer each of the questions in the guide with respect to the paper. You are not expected to be able to evaluate the way statistical analysis was carried out in the projects, and should assume that the reported results of the analysis are correct.

Attachment:- the role of users in maintaining a safe computing environment.rar

Reference no: EM132734088

Questions Cloud

How do legislatures control the courts : What are the sources of law (other than the courts)? How do government executives exercise control over the courts? How do legislatures control the courts?
International strategic management module : International Strategic Management module in Semester 1 at Bangor and has asked for your advice - She wishes to understand what strategy is and what it involves
What critical issue for juvenile corrections is : You have recently been appointed to a statewide panel formulated to examine various juvenile corrections problems. Using all of your knowledge from this course.
Overview of the companys e-commerce operations : Overview of the company's e-Commerce operations which summarizes information obtained from its annual report, the Hoovers profile for the company
Review should be organized by concepts : Critically evaluate the research described in the paper using the evaluation guide for surveys - how they all fit together. Your review should be organized
Develop a creative artefact which will be comprised : Develop a creative artefact which will be comprised as a word document with a variety of graphs, charts, figures and critical paragraphs
What is the rain-shadow effect : Compare vegetation, rainfall, and humidity for Waianae, Manoa, Kaneohe, and Diamondhead
Result of having plasmids in cytoplasm : Describe some of the known advantages that bacteria enjoy as a result of having plasmids in their cytoplasm.
Analyze the functions of government during the gilded age : Analyze the functions of Government during the Gilded Age? Include a discussion of laissez faire, social Darwinism, the boss system, and court actions

Reviews

Write a Review

Other Subject Questions & Answers

  Case-control study of childhood leukemia

You are interested in conducting a case-control study of childhood leukemia and exposure to environmental toxins in uteri. Describe how you would select cases and controls for this study and how you would define exposure and outcome factors. How coul..

  What other strategic processes are closely tied to erm

What other strategic processes are closely tied to ERM? What three kinds of risks are identified within the City of Edmonton? As part of this assignment.

  Explores the potential challenges-advantages of forecasted

You are tasked with developing a PowerPoint presentation that explores the potential changes (i.e., challenges and advantages) that could impact community policing in the future. You are expected to explore this topic from the perspective of a cri..

  Describe the protocol in the prosecution of antitrust cases

Describe the roll of the grand jury in prosecuting white collar crime cases. Describe the protocol in the prosecution of antitrust cases. Explain the nuances of defending suspects in white collar crime cases as stated in the powerpoint

  Calculate and graph the cell means

Professor Hyde studies the effects that two or more drugs have on animal activity when the drugs are administered simultaneously. Calculate and graph the cell means

  How you would allocate a year budget to the assets

Write a 1 page paper on how you would allocate a year's budget to the assets in your network. Include at least three assets

  Fundamentals of belief perseverance

Belief perseverance can be described as being the phenomenon in which individuals or groups believe in their theories despite the existence of contrary evidence (Bonabeau, 2009).

  Discuss the pros and cons of professional certifications

Discuss the pros and cons of professional certifications. Are they worth the time and effort to obtain and maintain? Are they an enhancement to career.

  Legal claims could patty make against cash mart

What types of legal claims could Patty make against Cash Mart, Gerry, and Acme Corporation? What are possible tort claims that Patty can make against Cash Mart

  Advantages of an in-house advertising department

Advantages of an in-house advertising department include all of the following EXCEPT a. lower costs b. the CEO and upper managment can work closely with marketing team.

  Describe and define which ethical system

Describe how personal values and professional values are different, and how they are similar. Describe and define which ethical system(s) and its theory(s) that relate to your chosen business ethics issue and give your reasons for choosing them.

  Why is this person considered a leader

There is no argument that leadership is essential to any movement, organization, community or nation.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd