Phillip April 1, 2024 No Comments

PSYC FPX 4210 Assessment 2 Research Methodologies

PSYC FPX 4210 Assessment 2 Research Methodologies Name Capella University PSYC FPX4210 Cyberpsychology Prof. Name Date Abstract Cybersecurity breaches have become prevalent in today’s interconnected world, significantly impacting organizations and industries by compromising confidential information. As technology continues to advance, the vulnerability to cyber-attacks increases, necessitating a thorough examination of human-computer interactions and their covalent relationship. This paper delves into two research articles and methodologies that focus on human attributes and behaviors in the context of cybersecurity training. Introduction The advent of technology and the widespread use of the internet by 58% of the global population (Clement, 2019) have given rise to the field of cyberpsychology. This interdisciplinary discipline explores the psychological processes underlying technologically interconnected human behavior, including cyborgs, artificial intelligence, and virtual reality (Atrill et al., 2019). With a focus on various theoretical perspectives and applications, cyberpsychology has implications for education, healthcare, workforce, and security. The paper highlights the transformative effect of technological intimacy on human perception and behavior. Psychological Perspectives in Cybersecurity As cybersecurity directly impacts daily life, understanding the psychological aspects of the cyber world becomes crucial. Security breaches and compromised information pose significant concerns, with hackers exploiting various online platforms. Psychologists, working collaboratively with IT professionals, play a vital role in identifying hackers and predicting behavior. This paper explores two research studies: one on the gamification of cybersecurity training and another on subjective habit formation in the context of cybersecurity. Analysis 1: Successful Gamification of Cybersecurity Training Steen and Deeleman’s (2021) study investigates the effectiveness of a serious game in improving Theory of Planned Behavior (Azjen, 1991) scores related to cybersecurity. The research, involving 258 participants, demonstrates that serious games positively impact self-reported TPB scores. Results indicate higher scores in attitudes, perceived behavior control intentions, and behavior compared to non-cybersecurity games. The study emphasizes the potential of serious gamification in cybersecurity training. Analysis 2: Exploring Workers’ Subjective Experiences of Habit Formation in Cybersecurity: A Qualitative Survey Collins and Hinds (2021) delve into cybersecurity habits in the workplace through a qualitative online survey. The study identifies themes related to forming habits, cultivating habits, and organizational influences. While the study has limitations, such as a relatively small sample size and lack of a control group, it suggests that habit-based interventions may be successful in developing cybersecurity behaviors at work. Critique and Recommendations The paper integrates Social Identity Theory and Social Learning Theory to offer insights into the commonalities of in-group membership and habit formation. Recommendations include leveraging these theories to enhance the effectiveness of cybersecurity training, considering distinctiveness threats, and addressing cognitive biases that contribute to human errors in cybersecurity breaches. Conclusion Cyberpsychology serves as a valuable lens to understand the intricate relationship between psychology and technology. Collaborative efforts between psychology and cybersecurity are essential to design effective strategies and software to combat cybercrime. This paper emphasizes the need for interdisciplinary research to promote a cyber-safe world. References Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179–211. Alhayani, et al., (2021). Effectiveness of artificial intelligence techniques against cyber security risks apply of IT industry. Materials Today: Proceedings. Ancis, J. (2020). STS 359-H01: Cyberpsychology. Digital Commons @ NJIT. Ancis, J. R. (2020,). The Age of Cyberpsychology: An overview · volume 1, issue 1. Technology, Mind, and Behavior. Ancis, J. R. (2020). The Age of Cyberpsychology: An Overview. Technology, Mind, and Behavior, 1(1). PSYC FPX 4210 Assessment 2 Research Methodologies Attrill-Smith. (2019). The Oxford Handbook of Cyberpsychology. Oxford University Press. Bandura, A. (1977). Social Learning theory. Prentice-Hall. Branscombe, N. R., Wann, D. L., Noel, J. G., & Coleman, J. (1993). In-group or out-group extemity: Importance of the threatened social identity. Personality and Social Psychology Bulletin, 19(4), 381–388. Collins, E. I. M., & Hinds, J. (2021). Exploring workers’ subjective experiences of habit formation in cybersecurity: A qualitative survey. Cyberpsychology, Behavior, and Social Networking, 24(9), 599–604. Durbin, S. (2022, January 16). 10 cognitive biases that can derail cybersecurity programs. Security Magazine RSS. rity-programs Ho, et al., (2010). The mediate effect of trust on Organizational Online Knowledge Sharing: An empirical study. International Journal of Information Technology & Decision Making, 09(04), 625–644. Hochheiser, H., Feng, J. H., & Lazar, J. (2017). Research methods in human computer interaction (second edition). Morgan Kaufmann Publishers. Institutional Research, planning and effectiveness. Institutional Research. McLeod, S. A. (2016). PSYC FPX 4210 Assessment 2 Research Methodologies Bandura – social learning theory. Simply Psychology. Norman, K. L. (2017). Cyberpsychology: An introduction to human-computer interaction. Cambridge University Press. The Qualitative Data Analysis & Research Software. ATLAS.ti. Rogers, M. K., Seigfried, K., & Tidke, K. (2006). Self-reported computer criminal behavior: A psychological analysis. Digital Investigation, 3, 116–120. Spears, R., Doosje, B., & Ellemers, N. (1997). Self-stereotyping in the face of threats to group status and distinctiveness: The role of group identification. Personality and Social Psychology Bulletin, 23(5), 538–553. Tajfel, H., & Turner, J. C. (2004). The social identity theory of intergroup behavior. Political Psychology, 276–293.

error: Content is protected, Contact team if you want Free paper for your class!!