What factors influence password strength

Assignment Help Basic Computer Science
Reference no: EM132310994

Behavioural Security Research Project

This assignment is intended to provide you with the experience of undertaking and writing up a complete research project. As you know from Assignment 1, whilst much has been written about behavioural security, there is still more research needed. Many previous findings have been inconclusive, and IT security continues to be a problem.

For this project you are provided with a set of data relating to users' passwords and their perceptions of security threats. It has been collected from users of the Internet who have web accounts. The study was designed as an experiment where the treatment group were exposed to password security information and training.

Your first task is to formulate a research question or several related research questions that relate to this topic and can be answered using the set of data. You will be helped to analyse the data in order to answer your research question(s). You will give a brief presentation to the class outlining your proposed research (in class Week 13) this will allow you to get feedback on your research questions, hypotheses and preliminary results. You will also write up your results in the format of a conference paper (to be submitted Week 14).Possible research questions might include:

• Does exposure to password security information and exercises improve intention to comply with password guidelines?
• Does exposure to password security information and exercises improve password strength?
• Does gender influence password security?
• What factors influence intention to comply with password guidelines?
• What factors influence password strength?

You need to work in the same groups where you finish assignment 1.

You will be given:

1. Information about how the data was collected (Appendix 1 in this document)

2. A list of all the variables included in the dataset (Appendix 2 in this document)

3. A data set containing the raw data (in both SPSS (.sav) and Excel format (.xls)) -download from the ICT615 LMS site

4. A copy of the survey used to collect the data - can be download from the ICT615 LMS site
If you find that you need more information about the way in which the data was collected just ask me.

You need to:
1. Undertake background reading to review the relevant literature. You can use studies you find for assignment 1, but you cannot just copy and paste the literature review from assignment 1 to assignment 2. You need to rewrite and restructure the writing based upon your work in assignment 2.

2. Decide exactly what research questions you want to answer (and generate hypotheses if appropriate)

3. Consider how the data should be analysed in order to enable your research questions to be answered

4. Get the data analysed (if the results you need aren't included in the Topic 9 Data Analysis Session, I can do it for you, or I can help you do it)

5. Present a brief outline of your research/paper in class

6. Write up your research in the form of a paper suitable for publication at a conference.
Note: Stages 2 to 4 can be done in collaboration with the rest of the class, but the presentation and research paper should be created in group.

Presentation:

The presentations should be approximately 5 minutes in length (with a maximum of 10 minutes) and given during the Week 13 class. The presentation will be worth 10% of the mark for the Project.

The presentation should include:
1. Background literature
2. Justification for the research
3. Research questions (and hypotheses if appropriate)
4. Any preliminary results you have
5. Discussions (e.g., implications for research and practice) (highly recommended if you have any results, though not listed in the rating sheet)

Research Paper:
The research paper you submit should include the following sections:
1. Title
2. Abstract
3. Introduction
• Provide enough background
• including a brief statement of the problem you are investigating
4. Literature Review - brief review of the literature relevant to the problem
5. Research hypotheses - include your hypotheses in this section (and make sure that you provide a justification for each of them)
6. Research design - you can copy as much as you like from Appendix 1.
7. Results - create your own tables - don't just cut and paste the SPSS output, clearly state what you found and whether each hypothesis is supported or not
8. Discussion (Implications for theory, practice, limitations and opportunities for future studies)
9. Conclusion
10. References (referencing should be in APA or IEEE style)

Attachment:- Assignment Project.rar

Reference no: EM132310994

Questions Cloud

Stakeholders of an organization are shareholders : Stakeholders of an organization are shareholders, customers, suppliers, governments, and any other groups with a vested interest in the organization.
Most challenging for chosen business : Which of the e-commerce strategies do you think would be the most challenging for your chosen business? Why?
Social control contribute to negative-positive perception : Provide original example of social deviance that might be considered ‘negative.' How might concept of social control contribute to negative-positive perception?
What role collaborators play in the process : HI5004- Marketing Management-Holmes Institute Australia- Who is the company serving and what type of behaviour is ‘typical' from them?
What factors influence password strength : ICT615 - Information Technology Research Methods - Murdoch University - Does exposure to password security information and exercises improve intention
Describe the concept of deviance : Describe the concept of deviance. Describe how each sociological perspective explains deviance. Describe factors that contribute to social inequalities.
Create an organisation chart for the business : ISY00243 - Systems Analysis and Design - Case Study Assignment, Southern Cross University, Australia. Create an organisation chart for the business
What is meant by boundaries within family systems theories : Explain congruency of Anna's messages during the session. What is meant by boundaries within the family systems theories? Describe the family decision making,
Implement a nursing research project : Implement a nursing research project - This project will be subdivided into 4 different papers that will be submitted throughout the entire semester

Reviews

len2310994

5/24/2019 12:06:11 AM

The presentation should include: 1. Background literature 2. Justification for the research 3. Research questions (and hypotheses if appropriate) 4. Any preliminary results you have 5. Discussions (e.g., implications for research and practice) (highly recommended if you have any results, though not listed in the rating sheet) The mark for each presentation will be calculated as follows: • 50% unit coordinator assessment • 50% average of class assessment

len2310994

5/23/2019 11:50:26 PM

Submission instructions: You should submit your assignment from the ICT615 LMS site. You can receive email notification that your assignment has been received. Late submissions will be penalised at the rate of 5 marks per day late or part thereof unless an extension has been obtained. You should submit your assignment as one word-processed document. So your work doesn't get mixed up with others’, ensure that your name is on your assignment and use a filename that clearly identifies it. If you are working in pairs put both surnames in the filename, but submit a copy of the assessment each, so that it is easier to provide feedback. You must keep a copy of the final version of your assignment as submitted and be prepared to provide it on request.

Write a Review

Basic Computer Science Questions & Answers

  Application that prompts for and reads a double value

Write an application that prompts for and reads a double value representing a monetary amount.

  Define arbitrage-economic data and analyses

Define arbitrage. Economic data and analyses have failed to explain international asset arbitrage behaviour or condition with economic variables

  Scheduling schemes relative to the rate-monotonic

Find out their details and briefly describe how they work and co-exist with each other as well as the non-real-time mechanisms. What are the pros and cons of these scheduling schemes relative to the rate-monotonic realtime scheduling?

  Create a prototype part for you from an stl file

If you know of an additive manufacturing service provider in your area, request a demonstration of its system(s). Explore the possibility of having the company create a prototype part for you from an STL file.

  Discuss the primary job responsibilities of a dba

At a high-level, discuss the primary job responsibilities of a DBA?

  Physical architecture layer with cloud technologies

Identify the main challenges for provisioning the physical architecture layer with cloud technologies. Additionally, recommend methods to mitigate

  Experiences with using an electronic information system

What are your experiences with using an electronic information system (EHR)? Describe the components of an EHR, and using the assigned readings, any past experiences or observations, and your imagination,

  System protect patient privacy medical record

The length of the paper is 7 pages and I want to write on the areas of "Does computer system protect patient's privacy medical record?" Please follow this paper outline:

  What will be an account of a man that deposits

Is it possible to determine what will be an account of a man that deposits 100,000 today and goes to take it after three years if the bank

  Compute the required sample size first

Compute the required sample size first using .27 as a preliminary estimate of p and then using the conservative value of .5.

  Function should modify the list

Using python 3 design a function perfect_shuffle_in_place(a_list) which takes as argument a list and performs the perfect shuffle on the list.

  Computes the largest product of n

Write a function max_product that takes v a vector and n, a positive integer, as inputs and computes the largest product of n consecutive elements of v.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd