Article Review: Security Awareness of Computer Users, ICT615 Module

Verified

Added on  2022/09/22

|3
|339
|24
Homework Assignment
AI Summary
This assignment is a critical evaluation of the research paper "Security awareness of computer users: A phishing threat avoidance" by Arachchilage and Love (2014). The review, following the evaluation guide for surveys from the ICT615 textbook, assesses the paper's methodology, including its aim for inclusive coverage, data generation methods (internet-based surveys), sampling frame (computing network users), and sampling technique (random sampling). The evaluation examines the sample size, response rates, and the handling of non-respondents, assessing the generalization of survey findings. The review highlights the limitations of the survey strategy, such as sample size constraints, and evaluates the overall effectiveness and reliability of the survey in achieving its objectives. The assignment provides a detailed analysis of the research paper's strengths and weaknesses, offering insights into survey design and the study of phishing attacks. Desklib offers a comprehensive platform for students, providing access to a variety of study materials.
Document Page
IT 0
Article Review
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
IT 1
Question 1
The aim of the research was at wide and inclusive coverage of people where the writers
focused on the security risks as phishing attacks occurred in the computers.
Question 2
The writers included a literature review and interviews to gather reliable information.
These methods were used via the internet that helped to obtain effective information.
Question 3
The sampling frame is a computing network that is susceptible to phishing threats. The
writers adopted a random sampling technique that helped to include effective participants
in the survey and obtain reliable information.
Question 4
It is determined that the writers included 161 population size and the sample size was 140
that was enough for the research where the participants provided depth information about
phishing attack.
Question 5
The writers provided less information about the response rate and the chosen paper does
not deal with non-respondents as it included appropriate responses obtained from the
participants.
Question 6
The researchers made efforts to see the difference among respondents and non-
respondents and analyzed the viewpoints of the participants effectively. Moreover, the
writers included responses of previous studies related to the phishing attack.
Document Page
IT 2
Question 7
It is determined that the writers utilize the survey findings to make generalizations about
the larger population which are appropriate for achieving aims and addressing the
research questions.
Question 8
There are numerous limitations of the survey including limited samples, included less
effective participants and adopted less significant processes for analyzing the gathered
viewpoints.
Question 9
The major flaw in the survey strategy was limited samples that directly affected the
findings of the investigation and produced quality-related concerns in the investigation.
Question 10
In terms of effectiveness, the included survey strategy is more reliable and significant that
helped the writers to gather appropriate points related to the phishing attack. Moreover,
the survey strategy helped to manage the flow of information and achieve developed aims.
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]