Evaluation of Research Article on Information Technology Security

Verified

Added on  2022/09/13

|7
|1090
|22
Report
AI Summary
This report provides an evaluation of an IT research article titled "Security awareness of computer users: A phishing threat avoidance perspective" by Arachchilage and Love (2014). The report analyzes the research aim, which focuses on security threats and vulnerabilities associated with computing networks, specifically phishing attacks. It examines the data generation methods, including primary and secondary data from internet surveys and questionnaires, and evaluates the sampling frame and technique, which employed a random sampling methodology with a sample size of 20 participants. The report assesses the response rate, survey results, and limitations of the survey strategy, highlighting flaws such as the limited sample size and the adoption of a random sampling technique. The evaluation also considers the effectiveness of the survey strategy, which utilized a close-ended survey format to gather data on phishing and cybercrimes. The report concludes by summarizing the strengths and weaknesses of the research methods used in the article.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
IT 0
Information Technology
Research Methods
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
IT 1
Table of Contents
Article name................................................................................................................................................2
Evaluation of the article...............................................................................................................................2
References...................................................................................................................................................6
Document Page
IT 2
Article name
Security awareness of computer users: A phishing threat avoidance perspective
Evaluation of the article
Research aim
The selected paper was written by Nalin and Steve in the year 2014. The aim of the
paper is to evaluate the security threats and vulnerabilities associated with the computing
networks and describe the concept behind a phishing attack (Arachchilage, & Love, 2014).
It is found that the research aim was at the wide and inclusive coverage of people in
regards to the security threats. The researchers provided a way to describe the cyber-
crimes as phishing occurred in the computers.
Data generation method
It is found that the writers adopted both primary and secondary data gathering
methods that helped to obtain fresh and reviewed information in regards to the phishing
attack. The included data generation methods were through the internet. Moreover, the
internet survey was not appropriate for which the writers included a close-ended survey
through questionnaire and obtained viewpoints of the writers. Therefore, it is reported
that using both primary and secondary data the aims and goals of the research were
achieved effectively and the research concerns were addressed using viewpoints of the
previous writers and participants.
Sampling frame and technique
After reviewing the chosen paper it is found that the writers provided information
about the sampling frame and reported that it is beneficial for an investigation that helps
the writers to obtain effective participants in the survey. In this article, the writers adopted
a random sampling methodology due to their ability to provide larger participants in less
time and also managed the conflict-related issues. Moreover, using such a method the
writers included 20 participants in the close-ended survey and provided a way to review
Document Page
IT 3
and evaluate the opinions of the participants in regards to the security concerns and
phishing attack.
Sample size
It is found that the sample size used by the writers was 20 where around 13
participants were male and 7 participants were female that provided their viewpoints and
managed the research concerns. It is reported that the chosen sample size is appropriate
and enough for obtaining reliable and effective points in the research. Using such a process
the writers conducted a survey through questionnaires and collected responses of the
participants about cyber-crimes and phishing attacks. So, it is highlighted that the
involvement of such a sample size is enough to achieve research aims and support the
arguments with evidence.
Response rate and non-respondents
The response rate is helpful for finding the number of participants provided their
viewpoints while conducting the investigation. In the chosen paper, the response rate is
more than 80% that indicates that the developed survey helped to gather the appropriate
data related to the cyber-crimes and phishing attack. On the opposite side, the rate of non-
respondent is very less as most of the participants provided their viewpoints and answered
the questions effectively. Therefore, it is highlighted that the included participants in the
survey were helpful that supported the arguments and addressed the research concerns
effectively.
Efforts of the researchers
It is determined that the writers provided depth information about the sampling
technique and reviewed the responses of the participants effectively. Moreover, the writers
also made efforts to see the difference among respondents and non-respondents and
highlighted that the rate of the responder is larger rather than non-responders. Therefore,
the included participants supported the points highlighted in the survey and provided
depth information about the phishing attack.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
IT 4
Survey results
After reviewing the selected article, it is found that the writers adopted an effective
sampling technique that helped to obtain a larger population and sample size in the
research and managed the problems and issues that occurred in the survey. Moreover, the
writers use the survey findings to make a generalization about a larger population and it is
appropriate due to their ability to address research questions and provides a way to
support findings and results with the evidence. Therefore, the results of the survey were
effective and helpful for the writers and also provided fresh information about phishing
attacks and suggested effective mitigation techniques.
Limitations of the survey strategy
It is determined that the conducted survey is that the writers did not include an
effective sample size that produced research gaps in the survey and also affected the
quality of research. Moreover, the researchers adopted a random sampling technique that
provided less effective participants in the research and produced problems in the data
interpretation. It is highlighted that the conducted survey included limited questions about
the phishing attack and mitigation techniques due to which the researchers are not able to
such computing attacks that occurred in the companies.
Flaws or omissions in the research
It is found that the developed survey provided a way to gather fresh information
about computing security and phishing attacks. In the conducted survey the writers
included fewer questions about the phishing technique and adopted the fewer participants
that affected the research quality. However, the adopted survey strategy was helpful by
which the viewpoints of the participants were obtained and evaluated effectively.
Effectiveness of survey strategy
In the chosen paper, the writers adopted a close-ended survey that included
questions about phishing and cyber-crimes occurred in the computing devices. The
investigators included major 5 points included agree, disagree, strongly agree, strongly
Document Page
IT 5
disagree and natural for gathering the responses of the participants. In terms of
effectiveness, the adopted survey strategy was more effective where the writers used
effective sampling techniques and managed the flow of information in the entire paper. The
presence of such a strategy helped to gather primary data related to a phishing attack and
also reduced the research gaps. Overall, the selected research methods provided a way to
complete the research with better outcomes and helped the writers to obtain primary and
secondary data in the research.
Document Page
IT 6
References
Arachchilage, N. A. G., & Love, S. (2014). Security awareness of computer users: A phishing
threat avoidance perspective. Computers in Human Behavior, 38(6), 304-312.
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]