What factors influence password strength

Assignment Help Basic Computer Science
Reference no: EM132310994

Behavioural Security Research Project

This assignment is intended to provide you with the experience of undertaking and writing up a complete research project. As you know from Assignment 1, whilst much has been written about behavioural security, there is still more research needed. Many previous findings have been inconclusive, and IT security continues to be a problem.

For this project you are provided with a set of data relating to users' passwords and their perceptions of security threats. It has been collected from users of the Internet who have web accounts. The study was designed as an experiment where the treatment group were exposed to password security information and training.

Your first task is to formulate a research question or several related research questions that relate to this topic and can be answered using the set of data. You will be helped to analyse the data in order to answer your research question(s). You will give a brief presentation to the class outlining your proposed research (in class Week 13) this will allow you to get feedback on your research questions, hypotheses and preliminary results. You will also write up your results in the format of a conference paper (to be submitted Week 14).Possible research questions might include:

• Does exposure to password security information and exercises improve intention to comply with password guidelines?
• Does exposure to password security information and exercises improve password strength?
• Does gender influence password security?
• What factors influence intention to comply with password guidelines?
• What factors influence password strength?

You need to work in the same groups where you finish assignment 1.

You will be given:

1. Information about how the data was collected (Appendix 1 in this document)

2. A list of all the variables included in the dataset (Appendix 2 in this document)

3. A data set containing the raw data (in both SPSS (.sav) and Excel format (.xls)) -download from the ICT615 LMS site

4. A copy of the survey used to collect the data - can be download from the ICT615 LMS site
If you find that you need more information about the way in which the data was collected just ask me.

You need to:
1. Undertake background reading to review the relevant literature. You can use studies you find for assignment 1, but you cannot just copy and paste the literature review from assignment 1 to assignment 2. You need to rewrite and restructure the writing based upon your work in assignment 2.

2. Decide exactly what research questions you want to answer (and generate hypotheses if appropriate)

3. Consider how the data should be analysed in order to enable your research questions to be answered

4. Get the data analysed (if the results you need aren't included in the Topic 9 Data Analysis Session, I can do it for you, or I can help you do it)

5. Present a brief outline of your research/paper in class

6. Write up your research in the form of a paper suitable for publication at a conference.
Note: Stages 2 to 4 can be done in collaboration with the rest of the class, but the presentation and research paper should be created in group.

Presentation:

The presentations should be approximately 5 minutes in length (with a maximum of 10 minutes) and given during the Week 13 class. The presentation will be worth 10% of the mark for the Project.

The presentation should include:
1. Background literature
2. Justification for the research
3. Research questions (and hypotheses if appropriate)
4. Any preliminary results you have
5. Discussions (e.g., implications for research and practice) (highly recommended if you have any results, though not listed in the rating sheet)

Research Paper:
The research paper you submit should include the following sections:
1. Title
2. Abstract
3. Introduction
• Provide enough background
• including a brief statement of the problem you are investigating
4. Literature Review - brief review of the literature relevant to the problem
5. Research hypotheses - include your hypotheses in this section (and make sure that you provide a justification for each of them)
6. Research design - you can copy as much as you like from Appendix 1.
7. Results - create your own tables - don't just cut and paste the SPSS output, clearly state what you found and whether each hypothesis is supported or not
8. Discussion (Implications for theory, practice, limitations and opportunities for future studies)
9. Conclusion
10. References (referencing should be in APA or IEEE style)

Attachment:- Assignment Project.rar

Reference no: EM132310994

Questions Cloud

Stakeholders of an organization are shareholders : Stakeholders of an organization are shareholders, customers, suppliers, governments, and any other groups with a vested interest in the organization.
Most challenging for chosen business : Which of the e-commerce strategies do you think would be the most challenging for your chosen business? Why?
Social control contribute to negative-positive perception : Provide original example of social deviance that might be considered ‘negative.' How might concept of social control contribute to negative-positive perception?
What role collaborators play in the process : HI5004- Marketing Management-Holmes Institute Australia- Who is the company serving and what type of behaviour is ‘typical' from them?
What factors influence password strength : ICT615 - Information Technology Research Methods - Murdoch University - Does exposure to password security information and exercises improve intention
Describe the concept of deviance : Describe the concept of deviance. Describe how each sociological perspective explains deviance. Describe factors that contribute to social inequalities.
Create an organisation chart for the business : ISY00243 - Systems Analysis and Design - Case Study Assignment, Southern Cross University, Australia. Create an organisation chart for the business
What is meant by boundaries within family systems theories : Explain congruency of Anna's messages during the session. What is meant by boundaries within the family systems theories? Describe the family decision making,
Implement a nursing research project : Implement a nursing research project - This project will be subdivided into 4 different papers that will be submitted throughout the entire semester

Reviews

len2310994

5/24/2019 12:06:11 AM

The presentation should include: 1. Background literature 2. Justification for the research 3. Research questions (and hypotheses if appropriate) 4. Any preliminary results you have 5. Discussions (e.g., implications for research and practice) (highly recommended if you have any results, though not listed in the rating sheet) The mark for each presentation will be calculated as follows: • 50% unit coordinator assessment • 50% average of class assessment

len2310994

5/23/2019 11:50:26 PM

Submission instructions: You should submit your assignment from the ICT615 LMS site. You can receive email notification that your assignment has been received. Late submissions will be penalised at the rate of 5 marks per day late or part thereof unless an extension has been obtained. You should submit your assignment as one word-processed document. So your work doesn't get mixed up with others’, ensure that your name is on your assignment and use a filename that clearly identifies it. If you are working in pairs put both surnames in the filename, but submit a copy of the assessment each, so that it is easier to provide feedback. You must keep a copy of the final version of your assignment as submitted and be prepared to provide it on request.

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd