Review the published literature on user security behaviour

Assignment Help Other Subject
Reference no: EM132580629 , Length: 1900 Words

Assignment -

PART 1 -

A literature review is an account of what has been published on a topic (in journal articles, conference proceedings, books and other relevant sources) by recognised researchers. Understanding the prior research on a particular topic is the basis of most new research. Researchers must know what has been studied, discussed and recommended by others in related areas.

Information technology security is an increasingly important research topic. Although organisations spend large amounts on technology that can help safeguard the security of their information and computing assets, increased attention is being focused on the role people play in maintaining a safe computing environment. This issue is important both for organisational and home computing

In this assignment you will review the published literature on user security behaviour and write a literature review that synthesizes what you have found into a summary of what is, and is not, known on the topic.

This assignment is intended to:

Help you to understand the basics of a topic that we will explore for the remainder of the semester. It will serve as a starting point for the introduction section of your research project.

Provide you with practise finding peer reviewed, recent articles about one topic.

Allow you to organize your ideas about that topic in a meaningful way (including both synthesis and critical analysis).

To do -

To successfully complete the assignment, you must begin searching for relevant literature immediately. The skills covered in Week 2 will be valuable.

This is a group assignment, and each group includes 3-4 students. Please form the group by week 2 with others attending the same lab session. You will work on assignment 2 with the same group.

Find at least 10 relevant articles. To qualify as a source of information that you can use for the assignment, these main articles must report results of empirical research (i.e. not just authors' opinions). The research results can be either qualitative or quantitative in nature. Each article must also:

Have been published in a refereed journal or conference proceedings (though you may obtain the article through an online source)

Have an extensive references section.

In addition you may choose to supplement these articles with a few articles from other sources or that do not present the authors' own results.

When you search articles, pay particular attention to the keywords below:

Perceived Severity

Perceived Self-efficacy

Perceived Effectiveness

Perceived Cost

Perceived Vulnerability

Perceived Threat

Intention to Comply

and try to find user security behaviour studies related to these variables. In that way you can use your (part of) searched articles for assignment 2.

After reading each article, you should think about how they all fit together. Your review should be organized by concepts, such as findings, rather than by sources of information. Do not proceed through the articles one-by-one. Your literature review should include an introduction, a main body that reviews the literature (and which you may choose to subdivide further), and a conclusion (which includes your own evaluations and critiques). The Student Learning Centre has some resources that you might find useful if you are unsure as to how to write or structure an essay.

Format Guidelines -

Give your literature review a title that clearly reflects the content of your review.

Include an introduction section that states the purpose of the review and a conclusion section. Include other sub-sections to help structure your work.

Double-space your review and use 12-point font.

Your review should be between 1000 and 2000 words in length.

Include appropriate citations throughout the review and a list of references at the end. Referencing should be in APA style.

Your review should include a minimum of 10 sources of information.

PART 2 -

The following recent research paper relates to an aspect of behavioural security:

Arachchilage, N. A. G. and Love, S. (2014). Security awareness of computer users: A phishing threat avoidance. Computers in Human Behavior, 38, 304-312.

You should critically evaluate the research described in the paper using the evaluation guide for surveys on page 105 of the ICT615 textbook (by B. J. Oates) and answer each of the questions in the guide with respect to the paper. You are not expected to be able to evaluate the way statistical analysis was carried out in the projects, and should assume that the reported results of the analysis are correct.

You should submit your answers to each of the questions in the evaluation guide.

Reference no: EM132580629

Questions Cloud

Demonstrate the interrelationship of working of TPS : Demonstrate the interrelationship of working of TPS, MIS, DSS and ESS using a real-life example of a firm. Only one example of a real-life firm
Advantages and disadvantages of nonparametric statistics : Discuss the difference between parametric statistics and nonparametric statistics. Discuss the advantages and disadvantages of nonparametric statistics.
Analysis determine the root cause : For the case study identify 2 key problems and identify the risk factors. From this analysis determine the root cause.
Influence preterm and low-birthweight deliveries : Identify and describe some factors affecting the mother's health that can influence preterm and low-birthweight deliveries,
Review the published literature on user security behaviour : Review the published literature on user security behaviour and write a literature review that synthesizes what you have found into a summary of what is
Ongoing criminal activity : Do you think that attorneys should maintain confidentiality if their clients are involved in ongoing criminal activity that is not inherently dangerous?
Result of poor ethical decisions in organization : Explains that many crisis situations are the result of poor ethical decisions in an organization
Forensic science is application of science to criminal : Forensic science is the application of science to criminal and civil laws that are enforced by police agencies in a criminal justice system.
Value of good time-management skills : Write a three-paragraph essay on the value of good time-management skills.

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd