ICT615 INFORMATION TECHNOLOGY RESEARCH METHODS
MURDOCH UNIVERSITY
ICT615 INFORMATION TECHNOLOGY RESEARCH METHODS
Assignment 2
Submission dates:
·
Week
13
· Written submission Sunday Week 14
Worth: This project is worth 30% of your final grade
Submission instructions: You should submit your assignment
from the ICT615 LMS site. You can receive email notification that your
assignment has been received. Late submissions will be penalised at the rate of
5 marks per day late or part thereof unless an extension has been obtained.
You should submit your assignment
as one word-processed document. So your work doesn't get mixed up
with others’, ensure that your name is on your assignment and use a filename
that clearly identifies it. If
you are working in pairs put both surnames in the filename, but submit a copy
of the assessment each, so that it is easier to provide feedback. You must keep a copy of
the final version of your assignment as submitted and be prepared to provide it
on request.
The University treats plagiarism,
collusion, theft of other students’ work and other forms of dishonesty in
assessment seriously. For guidelines on honesty in
assessment including avoiding plagiarism see http://our.murdoch.edu.au/Educational-technologies/Academic-integrity/
Behavioural Security Research Project
This assignment is intended to
provide you with the experience of undertaking and writing up a complete
research project. As you know from Assignment 1, whilst much has been written about behavioural
security, there is still more research needed. Many previous findings have been
inconclusive, and IT security continues to be a problem.
For this project you are provided with a set of data relating to users’ passwords and their perceptions of security threats. It has been collected from users of the Internet who have web accounts. The study was designed as an experiment where the treatment group were exposed to password security information and training.
Your first task is to formulate a research question or several related research questions that relate to this topic and can be answered using the set of data. You will be helped to analyse the data in order to answer your research question(s). You will give a brief presentation to the class outlining your proposed research (in class Week 13) this will allow you to get feedback on your research questions, hypotheses and preliminary results. You will also write up your results in the format of a conference paper (to be submitted Week 14).
Possible research questions might include:
Does exposure to password security information and exercises improve intention to comply with password guidelines?
- Does exposure to password security
information and exercises improve password strength?
- Does gender influence password
security?
- What factors influence intention to
comply with password guidelines?
- What factors influence password strength?
You need to work in the same groups where you finish assignment 1.
You will be given:
1.
Information
about how the data was collected (Appendix 1 in this document)
2.
A
list of all the variables included in the dataset (Appendix 2 in this document)
3.
A
data set containing the raw data (in both SPSS (.sav) and Excel format (.xls))
–download from the ICT615 LMS site
4.
A
copy of the survey used to collect the data - can be download from the ICT615 LMS
site
If you find that you need more information about the way in which the data was collected just ask me.
You need to:
1.
Undertake
background reading to review the relevant literature. You can use studies you
find for assignment 1, but you cannot just copy and paste the literature review
from assignment 1 to assignment 2. You need to rewrite and restructure the
writing based upon your work in assignment 2.
2.
Decide
exactly what research questions you want to answer (and generate hypotheses if
appropriate)
3.
Consider
how the data should be analysed in order to enable your research questions to
be answered
4.
Get
the data analysed (if the results you need aren’t included in the Topic 9 Data
Analysis Session, I can do it for you, or I can help you do it)
5.
Present
a brief outline of your research/paper in class
6.
Write
up your research in the form of a paper suitable for publication at a
conference.
Note: Stages 2 to 4 can be done in collaboration with the rest of the class, but the presentation and research paper should be created in group.
Presentation:
The presentations should be approximately 5 minutes in length (with a maximum of 10 minutes) and given during the Week 13 class. The presentation will be worth 10% of the mark for the Project.
The presentation should include:
1.
Background literature
2.
Justification for the research
3. Research questions (and hypotheses if
appropriate)
4. Any preliminary results you have
5. Discussions (e.g., implications for research and practice) (highly recommended if you have any results, though not listed in the rating sheet)
The tutor will evaluate the presentation in the lab tutorial.
Research Paper:
The research paper you submit should include
the following sections:
1.
Title
2.
Abstract
3.
Introduction
·
Provide
enough background
·
including
a brief statement of the problem you are investigating
4.
Literature
Review - brief review of the literature relevant to the problem
5.
Research
hypotheses – include your hypotheses in this section (and make sure that you
provide a justification for each of them)
6.
Research
design – you can copy as much as you like from Appendix 1.
7.
Results
- create your own tables – don’t just cut and paste the SPSS output, clearly
state what you found and whether each hypothesis is supported or not
8.
Discussion
(Implications
for theory, practice, limitations and opportunities for future studies)
9.
Conclusion
10. References (referencing should be in APA style)
Make sure that you cite previous work properly!
Length: Approximately 2500 - 3000 words
|
HD
(99%-80%) |
D
(79%-70%) |
C
(69%-60%) |
P
(59%-50%) |
N
(49%-1%) |
Title
and abstract (5%) |
Have
a clear title
The
abstract clearly describes the background, the overall aim, and the results
of the study. |
Has
a clear title
The
abstract includes some background, the overall aim, and the results of the
study.
|
Has
a clear title
The
abstract includes some background, and the brief description of the study.
|
Has
a title
The
abstract includes the brief description of the study.
|
No
title
The
abstract is confusing or no abstract. |
Introduction,
literature Review (10%)
(Please do not simply copy
assignment 1 to here; otherwise, at best 50% will be received. ) |
Include
15+ relevant articles (not any articles dealing with user security but those
closely related to the article)
Excellent
introduction: has external sources to strongly support the importance of user
security behaviours; clearly state the objective of the essay
Identified appropriate material
and synthesised the research findings well.
Critically evaluate the study,
and identify the gaps (the gap links to your study)
|
Include
15+ relevant articles (not any articles dealing with user security but those
closely related to the article)
Good
introduction: Discuss the importance of user security behaviours; clearly
state the objective of the essay
Identified appropriate material
and synthesised the research findings well.
|
Include
10+ relevant articles (not any articles dealing with user security but those
closely related to the article)
Reasonable
introduction: Discuss
some background; clearly
state the objective of the essay
Starting to synthesise research
results, but some sections still read like reporting the results of one study
after another
|
Include
10+ relevant articles (not any articles dealing with user security but those
closely related to the article)
Has
introduction: state
the objective of the essay
Simply reporting the results of
one study after another
|
Include
less than 10 relevant articles (not any articles dealing with user security
but those closely related to the article)
No
introduction
Reporting
some studies; hard to follow
|
Hypotheses
(30%) |
Provide strong justification
(using literature) to support all hypotheses with a certain theory (or
certain theories).
|
Provide some justification (using
literature) to support all hypotheses
|
Provide some justification (no
literature) to support t hypotheses
|
Provide very simple justification
(no literature) to support hypotheses
|
Just listing hypotheses but no
justification
|
Methods
(5%) |
All
necessary information needs to be included. |
||||
Results
(20%) |
Include
both descriptive statistics about the sample, and correct inferential
statistics.
Create
own tables; report results in a correct format (refer to tut 10)
|
Include
correct inferential statistics.
Create
own table; report results in a correct format (refer to tut 10)
|
Include
correct inferential statistics.
Create
own table; report results but miss some information
|
Include
correct inferential statistics.
Copy
table from SPSS; report results but miss some information
|
Include
incorrect statistics.
Copy
table from SPSS; no or little explanations. |
Discussion
(20%) |
Provide
clear discussion of the results
Discuss
the implication for theory, practice, limitations and recommendations for
future studies. Use some references to support your arguments.
|
Provide
clear discussion of the results
Discuss
the implication for theory, practice, limitations and recommendations for
future studies. |
Provide
some discussion of the results
Discuss
the implication of your study. |
Provide
some discussion of the results
|
No
or little discussions. |
Presentation
(10%) |
Clear
structure
Has
no grammar /spelling errors
Perfectly
follow APA format |
Clear
structure
Has
few grammar/ spelling errors
Mainly
follow APA format, not fully consistent but acceptable |
Clear
structure
Has
a few grammar/ spelling errors but does not impact reading
Follow APA format, have a few errors but acceptable |
Have
structure but not quite clear
Has
quite a few grammar / spelling errors, hard to follow sometime.
Follow
APA format a bit but has many inconsistencies (or the format of reference is
not consistent themselves)
|
Structure
is confusing
Has
many grammar / spelling errors, hard to follow
Cannot
identify the format
|
APPENDIX 1 - Information about how the data was collected
The
target population for this study was Internet users who hold at least one
online email account. To obtain a sample with a wide range of backgrounds a
third party recruiting company, Authentic Response Inc., was used and participants
were recruited through email invitations to their panel. A total of 3830 email
invitations were distributed.
Participants
were randomly allocated to two groups: a control group, and a treatment group
that received password security information and training. Each group undertook a separate data
collection session administered online using SurveyGizmo. The control group session
took approximately 15 minutes and collected the following information:
- A typical password (later
analysed for password length and password strength)
- Longest password ever voluntarily used
- Number of email accounts
currently held
- Whether have voluntarily
changed email passwords
- Whether have previously shared
email passwords
- Self-rated computer skill
- Self-rated security knowledge
- Whether have previously been
hacked
- Gender
- Age
- Highest level of education
- Perceived Severity
- Perceived Self-efficacy
- Perceived Effectiveness
- Perceived Cost
- Perceived Vulnerability
- Perceived Threat
- Intention to Comply (with
password guidelines).
- New Password (later analysed for password length and password strength)
The treatment group data collection session, completed in approximately 25 minutes, consisted of the same measures of the same variables, plus a password security information and exercise segment that was completed after the background information about participants and their practices was collected and before the main constructs were measured. The password security information and exercise were developed using material from NIST (Scarfone & Souppaya, 2009), US-CERT (McDowell, Rafail, & Hernan, 2009) and Certified Information Systems Security Professional (CISSP) (Stewart, Tittel, & Chapple, 2008).
In order to ensure validity and reliability of the items, previously validated items were adopted where possible. The sample survey shows the items used (note: not all items in the sample survey are included in the data set). With the exception of Intention to Comply, all the main constructs were measured on a 7-point Likert-type scale. The items to measure Perceived Severity and Perceived Vulnerability were adapted from Boss (2007) and Zhang and McDowell (2009). The items to measure Perceived Threat and Perceived Cost were adapted from Milne, Orbell and Sheeran (2002). Perceived Effectiveness was measured using items adapted from Zhang and McDowell (2009) and Perceived Self-efficacy with items from Compeau and Higgins (1995). The items to measure Intention to Comply were adapted from Bulgurcu, Cavusoglu and Benbasat (2010) and measured on a 7-point scale where (1) was labeled ‘not at all likely’ and (7) was labeled ‘very’.
Password strengths were analysed using an approach based on Shannon (2001) adapted to meet NIST guidelines (Burr, et al., 2006; Scarfone & Souppaya, 2009). Summary variables for each construct were calculated as the average of the items used to measure the construct (see sample survey). All constructs had Cronbach alphas of over 0.80 indicating acceptable reliability.
APPENDIX 2 – Variable definitions
Variable name |
Description |
Values |
ParticipantID
|
Unique
ID to identify participants |
|
Training |
Received
security information and training (determines if participant it in treatment
or control group) |
1=
no 2
= yes |
PasswordLength |
Longest password ever
voluntarily used |
Number of characters |
NumberEmailAccounts |
Number of email accounts
currently held |
|
VoluntaryChange |
Have
voluntarily changed email passwords |
1=no 2=yes |
SharedPasswords |
Have
previously shared email passwords |
1=no 2=yes |
ComputerSkill |
Self-rated
computer skill |
1
– 7 scale where 1 = poor and 7 = excellent |
SecurityKnowledge |
Self-rated
security knowledge |
1
– 7 scale where 1 = poor and 7 = excellent |
PrevHacked |
Previously
been hacked |
0
= no, 1 = yes |
Gender |
Gender |
1
= male, 2 = female |
Age |
Age |
Number
of years |
Education |
Highest
level of education |
5
point scale from 1=‘Less than high school’ to 5 = ‘Post-graduate’ |
PREPW_STR |
Pre-test
password strength |
|
PREPW_LEN |
Pre-test
password length |
|
POSTPW_STR |
Post-test
password strength |
|
POSTPW_LEN |
Post-test
password length |
|
PerceivedSeverity |
Degree
to which a user believes that the consequence of password related threats
would be severe |
1
– 7. Calculated as average of scores on
items to measure construct |
PerceivedSelfEfficacy
|
Degree
to which a user is confident in their ability to create a strong password |
|
PerceivedEffectiveness |
Degree
to which a user believes that recommended password guidelines will prevent
password threats |
|
PerceivedCost |
Degree
to which a user believes that remembering passwords would be difficult if
password guidelines were followed |
|
PerceivedVulnerability |
Degree
to which a user believes that they are likely to experience password related
threats |
|
PerceivedThreat |
Degree
to which a user is worried about password related threats |
|
IntentionComply |
Intention
to comply with password guidelines |
To View Complete Question See Below
Question Attachments
1 attachments —