1.3 Research questions
1.3.1 Main research question
• How do students not studying a computer related course perceive computer security in their lives and actions?
1.3.2 Research sub questions
• What is computer Security?
• What is security in a physical context.
• What is computer Security awareness ?
• Benefits of computer security awareness?
• What are the results of the students current perception of computer security
• Why students may perceive computer security the way they do?
• What resources are in place to assist with better computer awareness and security on campus 1.4 Research Approach
According to Creswell (cited by Maree, 2007:265) the main objective of qualitative research is to investigate and interpret a fact or situation
…show more content…
That is the perceptions students have with regards to computer security. Along with the a brief description on the case study methodology and rationale of the study
Chapter Two – Methodology, an In-depth look at the methodology used the plan to gather and interpret the data. The validity of the data to be used as well as the ethical considerations
Chapter Three – Literature review here key concepts will be further investigated. That is Computer Security, Student Security perceptions ad practices
Chapter Four – A literature review on similar work. Look at projects that fall in the same line with my research to see what results they got and the methodology they used
Chapter Five – The Empirical work, The data collected will fall under this section.
Chapter Six – Results, here the researcher will be interpreting and discussing the results from the empirical work
Yin (2009:18) states that a case study is an empirical study that explores a current situation in depth and within its actual environment particularly to make the boundaries between the situation and its environment more visible.
1.6 Conclusion
2 RESEARCH
…show more content…
He is a student at the NWU although a graduate; he can be seen as an insider. Also having worked with some of the students, some may see him as an outsider. So it’s of the utmost importance that the researcher should not portray an image that can be seen as intimidating to the students he is going to interview, and be taken seriously by members of staff he plans on interviewing.
The researcher has biases and strong convictions set in the importance of computer security and its awareness. Even with these the researcher should be careful not to contaminate results by driving the research in such a way that it would results in his biases being supported. Thus he must have the right mix of objectivity and yet be able to relate with his interviewees such that they will give answers about how they truly perceive the elements of computer security. There are certain skills the researcher is aware of that he needs to possess to effectively interview his participants however with this in mind he is determined to make as if, better yet “Fake It Till He Makes It”. He aims to simulate the attitudes and strategies needed to conduct
Persuasive Essay Nowadays, because of the advances in science and technology, most people live on their internet devices such as smart phones, laptops, tablets, and so on. These internet devices and online services store much of our personal information. But when our important information and services, such as online banking, reside online, it can be very dangerous because others can gain unauthorized access. Even our government tracks our personal information.
Myself and all members of the M.A.P.P.S/SPU are fully aware of the importance of information security, given our access to this material. Additionally, with regards to dealing with information security, I have also been the system manager of two distinct and complex data systems. The first being the Voice-box wiretap system. My duties as a member of the Electronic Surveillance Unit consisted of, direct handling of Computer Data Warrants, provisioning of court ordered wiretaps for various NJSP and outside agencies, assisting in the installation of hidden surveillance equipment, and administrating the Voice-box wiretap data system which contained thousands of confidential recordings from hundreds of
Please answer all of the following questions regarding the Wechsler et al. (1994) study of binge drinking: Describe the design of the study, including the researchers’ target population and sampling design, including the sampling frame(s). The target population of the study was composed of all full-time undergraduate students enrolled in 4-year colleges and universities accredited by one of the six regional accrediting bodies covering the United States. The overall sampling design was a two-stage cluster sample.
Acceptable Use Policy Policy Statement: This policy covers Internet/Intranet-related systems, including but not limited to computer equipment, software, operating systems, storage media, are the property of ABC Technologies. These systems are to be used for business purposes only. Purpose/Objectives:
Describe the limitations associated with criminal justice policy making. In an ideal world law enforcement, policy makers and policing agencies are equally aligned with the forces behind criminal activity. They collect information, follow the clues and make arrest, when dealing with computer crimes there a few immediate factors that limit not only fighting the crime but knowing for certain whether it is a crime or not. Many law enforcement officers that handle computer crimes only understand basic computer language and cyber criminal terminology because it is constantly evolved, that not only limits they knowledge of what is criminal but they are also limited to how the law is applied to the crime.
Diebel blames attributes the blame to banks when they chose security questions to "improve their security measures for online banking" (2). She says that other websites probably assumed the banks knew what they were doing and followed suit (2). She states that security questions are much more insecure than they seem at first glance, and "the answers to many of them can be easily researched or guessed" (3). She also points out incidents of famous people 's accounts getting hacked into via security questions (5), followed by an example of a recent cyber attack on average people (6, 7). Diebel also includes a quote from a cybersecurity expert stating that one reason security questions are still used is because of convenience, instead of having good security (8).
Then again a few individuals believe that the locale shouldn 't screen understudies ' online networking on the grounds that it 's an attack of their protection. The saving so as to check framework would advantage them lives. They say that their managers will have the capacity to track their activities from back when they were in basic, center and secondary school however understudy security ought to be esteemed higher than protection. "The inquiry for specialists and folks is the means by which to see what matters. Also, how to see what matters before catastrophe happens."
If it is understood how parental incarceration affects children, adult imprisonment of these children may be preventable in the future. It is expected to observe a change in behavior or psychological health due to the absence of one or both parents. If a change is apparent, it would be useful to know if it was due to the incarceration or other factors. Despite the reason, the goal is to discover exactly how a parental incarceration affects the child’s future and whether or not they face a heightened risk of being incarcerated. Risks for children whose parent(s) had been incarcerated includes: increased delinquency and possible incarceration if it persists, aggression, physical or sexual abuse, depression, antisocial behavior, anxiety, trust
An advantage of conducting a Survey is that it allows the researcher to collect a large amount of data over a short period of time. They can also be created and administered quickly and easily. A disadvantage of a Survey is that often times the answer choice on a survey may not reflect the participants true opinion. Case Study is a research method in which is single person is directly observed. This study is an open ended type of data collection.
Throughout the twenty first century technology has had substantial advancements, resulting in improvements and enhancements of one 's everyday life. With these advancements, come positive and negative effects. Paying bills, shopping online, and doing taxes are all painless tasks anyone can perform thanks to the power of top of the line computers and internet services. In contrast to the beneficial uses of advanced technology, there are also cynical uses one with a destructive intention could carry out. Hacking personal information, cyber bullying, and plagiarism have all resulted in the upgrading of technology that was not originally intended.
This thesis examined and analyzed the qualitative
Narrative research theory is the study of how human beings experience the world, and narrative researchers compile these stories via in-depth interviews and write narratives about the experience (Gudmundsdottir, 2001). The data collected in narrative research can be qualitative, quantitative, or both. In my research proposal I mentioned in the methodology section that my study will be mostly qualitative in nature but in some cases there will be some quantitative data. I also mentioned that my research will be investigating the Hammonds Farm area, with the intention of investigating the impact of relocations on the livelihoods of beneficiaries that were relocated from Ocean-Drive to Hammonds Farm. Since the study I will be doing involves a case study, the narrative research theory seems the most logical direction as it corresponds with the purpose of my study.
Cybersecurity has become a growing cause for concern in the United States and indeed countries around the world. On February 9, 2016 President Barack Obama announced his Cybersecurity National Action plan (CNAP) to further the nations efforts to protect government agencies, citizens, and businesses from cyber threats domestic and abroad. However, cybersecurity is not a new issue in fact it is as old as the internet itself. With that said, I keep thinking back to that warm September day stained with the image of an enormous fireball engulfing our small TV set. This horrific day changed the course of history forever along with my future career path.
It is primarily a subject oriented approach. In other words, the applicability of methods is mostly focused on the subject. Using qualitative research methodology, the researcher strives to comprehend the broad spectrum. The focus is on analysing the large volumes of data in a scientific and empirical way. This analysis relies on a particular case study, journals, online surveys and others.
People from different sections of the universe are interacting, collaborating, socializing and doing other different activities via internet, which in turn exposes their personal information in cyberspace. Lack of knowledge and cyber security awareness makes these people to be vulnerable to hackers and other malicious players who use the cyber environment. These has been supported by Furnell, Bryan, Phippton, (2007) when they argued that personal or individual internet users are highly exposed to security threats while using their own home computers. It is therefore important that internet users should have clear understanding of all the risks of using internet, the importance of protecting their personal information and the outcome if this is not done