PSYC FPX 4210 Assessment 2 Research Methodologies
Student Name
Capella University
PSYC FPX 4210 Cyberpsychology
Prof. Name
Date
Abstract
Cybersecurity breaches have become prevalent in today’s interconnected world, significantly impacting organizations and industries by compromising confidential information. As technology continues to advance, the vulnerability to cyber-attacks increases, necessitating a thorough examination of human-computer interactions and their covalent relationship. This paper delves into two research articles and methodologies that focus on human attributes and behaviors in the context of cybersecurity training.
Introduction
The advent of technology and the widespread use of the internet by 58% of the global population (Clement, 2019) have given rise to the field of cyberpsychology. This interdisciplinary discipline explores the psychological processes underlying technologically interconnected human behavior, including cyborgs, artificial intelligence, and virtual reality (Atrill et al., 2019). With a focus on various theoretical perspectives and applications, cyberpsychology has implications for education, healthcare, workforce, and security. The paper highlights the transformative effect of technological intimacy on human perception and behavior.
Psychological Perspectives in Cybersecurity
As cybersecurity directly impacts daily life, understanding the psychological aspects of the cyber world becomes crucial. Security breaches and compromised information pose significant concerns, with hackers exploiting various online platforms. Psychologists, working collaboratively with IT professionals, play a vital role in identifying hackers and predicting behavior. This paper explores two research studies: one on the gamification of cybersecurity training and another on subjective habit formation in the context of cybersecurity.
Analysis 1: Successful Gamification of Cybersecurity Training
Steen and Deeleman’s (2021) study investigates the effectiveness of a serious game in improving Theory of Planned Behavior (Azjen, 1991) scores related to cybersecurity. The research, involving 258 participants, demonstrates that serious games positively impact self-reported TPB scores. Results indicate higher scores in attitudes, perceived behavior control intentions, and behavior compared to non-cybersecurity games. The study emphasizes the potential of serious gamification in cybersecurity training.
Analysis 2: Exploring Workers’ Subjective Experiences of Habit Formation in Cybersecurity: A Qualitative Survey
Collins and Hinds (2021) delve into cybersecurity habits in the workplace through a qualitative online survey. The study identifies themes related to forming habits, cultivating habits, and organizational influences. While the study has limitations, such as a relatively small sample size and lack of a control group, it suggests that habit-based interventions may be successful in developing cybersecurity behaviors at work.
Critique and Recommendations
The paper integrates Social Identity Theory and Social Learning Theory to offer insights into the commonalities of in-group membership and habit formation. Recommendations include leveraging these theories to enhance the effectiveness of cybersecurity training, considering distinctiveness threats, and addressing cognitive biases that contribute to human errors in cybersecurity breaches.
Conclusion
Cyberpsychology serves as a valuable lens to understand the intricate relationship between psychology and technology. Collaborative efforts between psychology and cybersecurity are essential to design effective strategies and software to combat cybercrime. This paper emphasizes the need for interdisciplinary research to promote a cyber-safe world.
References
Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179–211. https://doi.org/10.1016/0749-5978(91)90020-t
Alhayani, et al., (2021). Effectiveness of artificial intelligence techniques against cyber security risks apply of IT industry. Materials Today: Proceedings. https://doi.org/10.1016/j.matpr.2021.02.531
Ancis, J. (2020). STS 359-H01: Cyberpsychology. Digital Commons @ NJIT. https://digitalcommons.njit.edu/hum-syllabi/298/
Ancis, J. R. (2020,). The Age of Cyberpsychology: An overview · volume 1, issue 1. Technology, Mind, and Behavior. https://tmb.apaopen.org/pub/2yn6jhyv
Ancis, J. R. (2020). The Age of Cyberpsychology: An Overview. Technology, Mind, and Behavior, 1(1). https://doi.org/10.1037/tmb0000009
Attrill-Smith. (2019). The Oxford Handbook of Cyberpsychology. Oxford University Press. Bandura, A. (1977). Social Learning theory. Prentice-Hall. Branscombe, N. R., Wann, D. L., Noel, J. G., & Coleman, J. (1993). In-group or out-group extemity: Importance of the threatened social identity. Personality and Social Psychology Bulletin, 19(4), 381–388. https://doi.org/10.1177/0146167293194003
PSYC FPX 4210 Assessment 2 Research Methodologies
Collins, E. I. M., & Hinds, J. (2021). Exploring workers’ subjective experiences of habit formation in cybersecurity: A qualitative survey. Cyberpsychology, Behavior, and Social Networking, 24(9), 599–604. https://doi.org/10.1089/cyber.2020.0631
Durbin, S. (2022, January 16). 10 cognitive biases that can derail cybersecurity programs. Security Magazine RSS. https://www.securitymagazine.com/articles/96918-10-cognitive-biases-that-can-derail-cybersecu
rity-programs Ho, et al., (2010). The mediate effect of trust on Organizational Online Knowledge Sharing: An empirical study. International Journal of Information Technology & Decision Making, 09(04), 625–644. https://doi.org/10.1142/s0219622010003981
Hochheiser, H., Feng, J. H., & Lazar, J. (2017). Research methods in human computer interaction (second edition). Morgan Kaufmann Publishers. Institutional Research, planning and effectiveness. Institutional Research. https://www.ir.colostate.edu/surveys-and-rankings/qualtrics/ McLeod, S. A. (2016).
Bandura – social learning theory. Simply Psychology. www.simplypsychology.org/bandura.html Norman, K. L. (2017). Cyberpsychology: An introduction to human-computer interaction. Cambridge University Press. The Qualitative Data Analysis & Research Software. ATLAS.ti. https://atlasti.com/ Rogers, M. K., Seigfried, K., & Tidke, K. (2006).
Self-reported computer criminal behavior: A psychological analysis. Digital Investigation, 3, 116–120. https://doi.org/10.1016/j.diin.2006.06.002 Spears, R., Doosje, B., & Ellemers, N. (1997).
Self-stereotyping in the face of threats to group status and distinctiveness: The role of group identification. Personality and Social Psychology Bulletin, 23(5), 538–553. https://doi.org/10.1177/0146167297235009 Tajfel, H., & Turner, J. C. (2004).
The social identity theory of intergroup behavior. Political Psychology, 276–293. https://doi.org/10.4324/9780203505984-16
PSYC FPX 4210 Assessment 2 Research Methodologies
Get Capella University Free BS Psychology Samples
BIO FPX 1000
- BIO FPX 1000 Assessment 7 Media and Internet: Accurate vs Inaccurate
- BIO FPX 1000 Assessment 6 Patient Case Study Profiles – Cancer Causes
- BIO FPX 1000 Assessment 5 Genetics Lab
- BIO FPX 1000 Assessment 4 Digestion Lab
- BIO FPX 1000 Assessment 3 Urinary Lab
- BIO FPX 1000 Assessment 2 Neuromuscular Lab
- BIO FPX 1000 Assessment 1 Cardiovascular System Lab
COM FPX 1150
HIM FPX 4610
- HIM FPX 4610 Assessment 6 Health Topic Presentation
- HIM FPX 4610 Assessment 5 Discharge Summary: The Cardiorespiratory System
- HIM FPX 4610 Assessment 4 Operative Report: The Genitourinary System
- HIM FPX 4610 Assessment 3 Health Topic Approval
- HIM FPX 4610 Assessment 2 History and Physical (H&P): The Nervous System
- HIM FPX 4610 Assessment 1 Progress Note- The Skin
HIS FPX 1150
HUM FPX 1150
PSYC FPX 1000
PSYC FPX 2200
PSYC FPX 2300