logo

Information Technology Research Methods

   

Added on  2022-09-13

7 Pages1090 Words22 Views
IT 0
Information Technology
Research Methods
Information Technology Research   Methods_1
IT 1
Table of Contents
Article name............................................................................................................... 2
Evaluation of the article............................................................................................. 2
References................................................................................................................. 6
Information Technology Research   Methods_2
IT 2
Article name
Security awareness of computer users: A phishing threat avoidance
perspective
Evaluation of the article
Research aim
The selected paper was written by Nalin and Steve in the year 2014.
The aim of the paper is to evaluate the security threats and vulnerabilities
associated with the computing networks and describe the concept behind a
phishing attack (Arachchilage, & Love, 2014). It is found that the research
aim was at the wide and inclusive coverage of people in regards to the
security threats. The researchers provided a way to describe the cyber-
crimes as phishing occurred in the computers.
Data generation method
It is found that the writers adopted both primary and secondary data
gathering methods that helped to obtain fresh and reviewed information in
regards to the phishing attack. The included data generation methods were
through the internet. Moreover, the internet survey was not appropriate for
which the writers included a close-ended survey through questionnaire and
obtained viewpoints of the writers. Therefore, it is reported that using both
primary and secondary data the aims and goals of the research were
achieved effectively and the research concerns were addressed using
viewpoints of the previous writers and participants.
Sampling frame and technique
After reviewing the chosen paper it is found that the writers provided
information about the sampling frame and reported that it is beneficial for
an investigation that helps the writers to obtain effective participants in the
Information Technology Research   Methods_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Article Review Question | Assignment
|3
|339
|24

The Impact of Cyber Crime: Research Paper
|19
|3188
|156

Cyber Security Article 2022
|5
|1172
|24

Cyber Crime in Pakistan: Issues, Challenges, and Countermeasures
|10
|1948
|284

Analysis of e-crime in Crowd-sourced Labor Markets: Mechanical Turk vs. Freelancer
|3
|1102
|228

Document on Examples of Cyber Crime
|5
|611
|487