GREAT ICT615 ITRM ASSIGNMENT SAMPLE
Iryna Connolly et al presented the user security behavior for the employees in the US and Irish Organization.
The information security area highlights the emergence of providing security for the sensitive data of the client. They presented the conceptual framework using General Deterrence Theory with association of security features to increase the security standards for the user’s sensitive data.http://GREAT ICT615 ITRM ASSIGNMENT SAMPLE
This theory considers three important aspects such as severity, certainty and celerity of sanctions.
Prasanth Rajiv an et al proposed a study for focusing the specific factors that determine the security factors for computers. More technologies are increasing with the user-centric approach.
Creating security advancements and awareness programs requires tending to both security ability and PC expertise. Proper plan requires distinguishing proof and operationalization of substantial variables that comprise security ability in end customer.http://GREAT ICT615 ITRM ASSIGNMENT SAMPLE
They highlighted that there was no proper standard for security and analyzing customer behavior. They proposed security SRK model for the providing better security for the customer security.
Foroughi et al presented a user security behavior using observation measures. A user’s security conduct profile is a lot of organized information and data to portray a client in an intelligent domain between the client and the PC.
The initial step for conduct profiling is client conduct model advancement including information gathering. This information gathering must need transparent with less client interaction.http://GREAT ICT615 ITRM ASSIGNMENT SAMPLE
Observing individual activities to acquire specified training information that are not cost effective but more influenced in the make of user user’s profile. The most testing issue in PC client security can be recognizing reasonable information.
Serge Engelman et al proposed a novel method Security Behavior Intensions Scale(Seis) for constructing a security framework for the user. This method is used to produce the self-report for the information security based on the behavior of the user.
This framework consist four main aspects to process this method. First is, password generation for accessing the devices. Second is, securement for devices. Third is, focusing and taking into countable environment security cues, and updating the software in the user’s PC.http://GREAT ICT615 ITRM ASSIGNMENT SAMPLE
This method is used to identify the differentiation in the user behavior by using the particular PC. This framework helps the user to find the malignant attacks in the appropriate computer. With the help of this method, the user can use the highly secured system with low cost and an effective performance.
Funnel et al presented the enhancing method for proving better guidance for the computer security that supports user to maintain the personal and sensitive data. They presented their work with existing drawbacks and provide the suitable solution for the problem.http://GREAT ICT615 ITRM ASSIGNMENT SAMPLE
They highlighted that most of the users are not worrying about the malignant attacks and other possible attacks in their system. So they presented some guidance for password setup in their devices.
They also provided some suggestions of selecting passwords which secures the data from attacks. Their research provided active and passive support for the user security behavior. The passive support offers guidance regarding the password set-up.
The active support specifies the action feedback of the system usage. This active support helps the user to find out the behavior difference in the system access. This interactive feedback ensures the system security.http://GREAT ICT615 ITRM ASSIGNMENT SAMPLE
Gambogic et al highlighted the importance of the information security for personal data and analyze the user behavior. They focused on information security and making the user awareness of attacks for sensitive data.
They used four important aspects such as measuring the risk in the user access of the PC, conserving the scale for the user behavior, the offense scale exposure and Analyzing the risk scale.
These analyses were done with the help of user surveys. The data was collected from different kind of users with their security mechanisms. Using these four components they performed various examinations that user could choose for the information security.http://GREAT ICT615 ITRM ASSIGNMENT SAMPLE
They also analyzed different age group people and their method of accessing the system, their password selection and many other things. The general aspect they explained was, choosing password plays an important role for avoiding attacks in the user system.
The different behavior patterns of user were analyzed and evaluate the risk of such behavior in the system.
Hans et al  presented the importance of user awareness about the desktop security. General information security specifies all the aspects of security concerns for the personal and confidential data.http://GREAT ICT615 ITRM ASSIGNMENT SAMPLE
This desktop security one of the sub-area of the information security. For their implementation they selected the PMT model. PMT stands for Protection Motivation Theory. Using this model they examine the user behavior in the desktop computers in home. This work also provides user awareness for using the desktop.
These develops are presented as introduced as the components of adapting and hazard evaluation, separately. Since the two components of work area security mindfulness were tried through the hypothetical facial points of a develop hypothesis, it was important to inspect the impacts of each on the components of PMT.http://GREAT ICT615 ITRM ASSIGNMENT SAMPLE
Thus, the exploration model and its consequent speculations speck to tradeoff between model comprehensiveness and stinginess.
Crossfire et al presented the practices of safe computing habits for the user to maintain the secrecy of the data. The behavior analysis is more important to analyze the user actions to ensure the data safe in the organizations as well as in home. These analyses examined the personality actions, attitudes of the user and the intension of the access.
They also found the connection between these three aspects to make security. For these researches the data were collected and two step analysis methods were implemented. This method was used to ensure the validity and responsibility of measuring aspects that was used for testing the security mechanism.http://GREAT ICT615 ITRM ASSIGNMENT SAMPLE
They also used smarts package for implementing the research models and analyze the reflection from the results. They also used components based approach for analyzing and evaluating the behavior of the user to access the data.
The user intention of the system access should be clarified with the analysis they highlighted. They collected data samples form the US university students for analyzing the user behavior.
They also implemented the empirical test for their proposed novel model. Their research provides the positive outcomes to find out the user security and the differentiation in the user behavior of system access.http://GREAT ICT615 ITRM ASSIGNMENT SAMPLE
Merrill Warkentin et al proposed the study for examining the users behavior and the prediction model for the security issues. This also highlights the individual users performance in the placement of security in their system password generation of accessing the devices helps the user to avoid unauthorized access of the system.
they also considered enhanced PMT model for considering the security mechanisms and motivation for avoiding attacks in the system. With the help of this model, the user can ensure the data security in the system. Based on the user access the risk level of system attack is categorized.
With the association of this model, the user can effectively find the safe access behavior to maintain the security and avoid the malignant attacks.http://GREAT ICT615 ITRM ASSIGNMENT SAMPLE
Gratian et al presented the correlation of human characteristics and the intension of the security behavior. They also analyzed the risk level of the user behavior and style for making decisions and ensuring the security standards.
They focused four important components for user behaviors for quality standards in the security. Those are Securement of devices, setting highly secured passwords, proactive awareness and updating the software.
The device securement is more important because this provides locking system for the devices that avoids the unwanted access of the third persons. Their work provides demographic factors of user behavior and they suggested the guidance for generating the password for security.http://GREAT ICT615 ITRM ASSIGNMENT SAMPLE
Yuryna Connolly, L., Lang, M., Gathegi, J., &Tygar, D. J. (2017). Organisational culture, procedural countermeasures, and employee security behaviour.Information and Computer Security.
 Rajivan, P., Moriano, P., Kelley, T., & Camp, L. J. (2017). Factors in an end user security expertise instrument. Information and Computer Security, 25(2), 190–205. doi:10.1108/ics-04-2017-0020
 Foroughi, F., &Luksch, P. (2018). Observation Measures to Profile User Security Behaviour.2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security).
 Egelman, S., & Peer, E. (2015). Scaling the Security Wall.Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems – CHI ’15. doi:10.1145/2702123.2702249
 Furnell, S., Khern-am-nuai, W., Esmael, R., Yang, W., & Li, N. (2018). Enhancing security behaviour by supporting the user. Computers & Security, 75, 1–9. doi:10.1016/j.cose.2018.01.016.
 GizemOgutcu, OzlemMugeTestik, OumoutChouseinoglou (2016), Analysis of Personal Information Security Behavior and Awareness, Elsevier.
 Hanus, B., & Wu, Y. “Andy.” (2015). Impact of Users’ Security Awareness on Desktop Security Behavior: A Protection Motivation Theory Perspective. Information Systems Management, 33(1), 2–16.
 Shropshire, J., Warkentin, M., & Sharma, S. (2015). Personality, attitudes, and intentions: Predicting initial adoption of information security behavior. Computers & Security, 49, 177–191. doi:10.1016/j.cose.2015.01.002
 Warkentin, M., Johnston, A. C., Shropshire, J., & Barnett, W. D. (2016). Continuance of protective security behavior: A longitudinal study. Decision Support Systems, 92, 25–35. doi:10.1016/j.dss.2016.09.013.
 Gratian, M., Bandi, S., Cukier, M., Dykstra, J., &Ginther, A. (2018). Correlating human traits and cyber security behavior intentions. Computers & Security, 73, 345–358. doi:10.1016/j.cose.2017.11.015
Know more about UniqueSubmission’s other writing services: