Review the published literature on user security behaviour

Assignment Help Other Subject
Reference no: EM132637524

Assignment 1

PART 1

A literature review is an account of what has been published on a topic (in journal articles, conference proceedings, books and other relevant sources) by recognised researchers. Understanding the prior research on a particular topic is the basis of most new research. Researchers must know what has been studied, discussed and recommended by others in related areas.

Information technology security is an increasingly important research topic. Although organisations spend large amounts on technology that can help safeguard the security of their information and computing assets, increased attention is being focused on the role people play in maintaining a safe computing environment. This issue is important both for organisational and home computing

In this assignment you will review the published literature on user security behaviour and write a literature review that synthesizes what you have found into a summary of what is, and is not, known on the topic.

This assignment is intended to:
• Help you to understand the basics of a topic that we will explore for the remainder of the semester. It will serve as a starting point for the introduction section of your research project
• Provide you with practise finding peer reviewed, recent articles about one topic
• Allow you to organize your ideas about that topic in a meaningful way (including both synthesis and critical analysis).

To do
To successfully complete the assignment, you must begin searching for relevant literature immediately. The skills covered in Week 2 will be valuable.

This is a group assignment, and each group includes 3-4 students. Please form the group by week 2 with others attending the same lab session. You will work onassignment 2 with the same group.

Find at least 10 relevant articles. To qualify as a source of information that you can use for the assignment, these main articles must report results of empirical research (i.e. not just authors' opinions). The research results can be either qualitative or quantitative in nature. Each article must also:
• Have been published in a refereed journal or conference proceedings (though you may obtain the article through an online source)
• Have an extensive references section.
In addition you may choose to supplement these articles with a few articles from other sources or that do not present the authors' own results.

When you search articles, pay particular attention to the keywords below:
• Perceived Severity
• Perceived Self-efficacy
• Perceived Effectiveness
• Perceived Cost
• Perceived Vulnerability
• Perceived Threat
• Intention to Comply
and try to find user security behaviour studies related to these variables. In that way you can use your (part of) searched articles for assignment 2.

After reading each article, you should think about how they all fit together. Your review should be organized by concepts, such as findings,rather than by sources of information. Do not proceed through the articles one-by-one. Your literature review should include an introduction, a main body that reviews the literature (and which you may choose to subdivide further), and a conclusion (which includes your own evaluations and critiques).The Student Learning Centre has some resources that you might find useful if you are unsure as to how to write or structure an essay.

Format Guidelines
• Give your literature review a title that clearly reflects the content of your review.
• Include an introduction section that states the purpose of the review and a conclusion section. Include other sub-sections to help structure your work.
• Double-space your review and use 12-point font.
• Your review should be between 1000 and 2000 words in length.
• Include appropriate citations throughout the review and a list of references at the end. Referencing should be in APA style.
• Your review should include a minimum of 10 sources of information.

PART 2

The following recent research paper relates to an aspect of behavioural security:
• Arachchilage, N. A. G. and Love, S. (2014). Security awareness of computer users: A phishing threat avoidance. Computers in Human Behavior, 38, 304-312.

You should critically evaluate the research described in the paper using the evaluation guide for surveys on page 105 of the ICT615 textbook (by B. J. Oates) and answer each of the questions in the guide with respect to the paper. You are not expected to be able to evaluate the way statistical analysis was carried out in the projects, and should assume that the reported results of the analysis are correct.

Attachment:- computing awarenes.rar

Reference no: EM132637524

Questions Cloud

Describe a waiting line situation that you regularly face : Describe a waiting line situation that you regularly face in your daily life. Explain how you would improve the structure of that system by applying waiting
Make a algorithm that adds the value : Make a algorithm that adds the value valIn C++ to a queue object Q. The queue is represented using an array data of size s.
Develop an algorithm that removes : Develop an algorithm that removes the least recently added item from a queue Q.
Identify the reliability-access speed : Imagine that you have just acquired a new computer. You have a substantial amount of data on your old hard drive
Review the published literature on user security behaviour : Review the published literature on user security behaviour and write a literature review that synthesizes what you have found into a summary of what is
Construct an nfsa to accept languages : Construct an NFSA to accept each of the following languages. Make sure that your NFSA contains at least one nondeterministic state, but no -moves are allowed.
How voltaire attacks philosophical reasoning generally : After reading Candide, write a paper comparing the optimistic philosophy of Pangloss with the pessimism of Martin. Explain how Voltaire uses this contrast.
Search for a specific student by student id : Now search for a specific student by student id from you data.txt file. For example: search by student id 302, it should return result in the following manner:
Demonstrate the number of units transferred to assembly : Determine the number of units transferred to Assembly. During May, Cutting department completed a number of units of a product and transferred them to Assembly.

Reviews

Write a Review

Other Subject Questions & Answers

  What did willy believe was the key to successful selling

What did Willy believe was the key to successful selling? Do you agree? Does Willy Loman fit the typical profile of a successful salesman as presented.

  Perform a safety audit of a workplace

Perform a safety audit of a workplace that includes hazard recognition, risk assessment, and control of physical, chemical and biological agents

  Give main tenents of their theories strengths and weaknesses

For the first theorist: Give the main tenents of their theories, strengths and weaknesses. Then, how are they alike? (1-2 slides) How are they different?

  Write on the topic - American Government Class

Assignment - Write 400-500 words on the given topic. Topic- AMERICAN GOVERNMENT CLASS

  How you might alter your approach to your athletes

You have taken your first coaching and teaching position with a local high school. Describe how you might apply some of the principles and findings derived.

  Describe the importance of becoming a global citizen

View the Globalization: What is Happening to Us? video and read the article A Model of Global Citizenship: Antecedents and Outcomes by Stephen Reysen.

  Examining the type of cancer you selected

Select a type of cancer associated with women's or men's health such as breast, cervical, or ovarian cancer in women and prostate cancer in men.

  Discuss and define the pathophysiology

Who can in 3 hours down load an article about Scoliosis from NURSING JOURNAL for me?

  What are the implications for practice

What are your initial thoughts on the content that was presented - ethical issues should be considered when working with diverse populations

  What key principles of integrated mental health

What key principles of integrated mental health and addictions treatment should a counselor/therapist apply in the description

  What is the displacement of the cross-country team

Define what Displacement is. What is the displacement of the cross-country team if they begin at the school, run 10 miles and finish back at the school

  Describe what you consider to be the most important traits

MNG03217 - Explain the main organizing idea or issue in your leadership model? E.G. credibility, vision, traits, relationships, etc

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd