Online Class Assignment

PSYC FPX 4210 Assessment 2 Research Methodologies

Student Name

Capella University

PSYC FPX 4210 Cyberpsychology

Prof. Name

Date

Abstract

Cybersecurity breaches have become prevalent in today’s interconnected world, significantly impacting organizations and industries by compromising confidential information. As technology continues to advance, the vulnerability to cyber-attacks increases, necessitating a thorough examination of human-computer interactions and their covalent relationship. This paper delves into two research articles and methodologies that focus on human attributes and behaviors in the context of cybersecurity training.

Introduction

The advent of technology and the widespread use of the internet by 58% of the global population (Clement, 2019) have given rise to the field of cyberpsychology. This interdisciplinary discipline explores the psychological processes underlying technologically interconnected human behavior, including cyborgs, artificial intelligence, and virtual reality (Atrill et al., 2019). With a focus on various theoretical perspectives and applications, cyberpsychology has implications for education, healthcare, workforce, and security. The paper highlights the transformative effect of technological intimacy on human perception and behavior.

Psychological Perspectives in Cybersecurity

As cybersecurity directly impacts daily life, understanding the psychological aspects of the cyber world becomes crucial. Security breaches and compromised information pose significant concerns, with hackers exploiting various online platforms. Psychologists, working collaboratively with IT professionals, play a vital role in identifying hackers and predicting behavior. This paper explores two research studies: one on the gamification of cybersecurity training and another on subjective habit formation in the context of cybersecurity.

Analysis 1: Successful Gamification of Cybersecurity Training

Steen and Deeleman’s (2021) study investigates the effectiveness of a serious game in improving Theory of Planned Behavior (Azjen, 1991) scores related to cybersecurity. The research, involving 258 participants, demonstrates that serious games positively impact self-reported TPB scores. Results indicate higher scores in attitudes, perceived behavior control intentions, and behavior compared to non-cybersecurity games. The study emphasizes the potential of serious gamification in cybersecurity training.

Analysis 2: Exploring Workers’ Subjective Experiences of Habit Formation in Cybersecurity: A Qualitative Survey

Collins and Hinds (2021) delve into cybersecurity habits in the workplace through a qualitative online survey. The study identifies themes related to forming habits, cultivating habits, and organizational influences. While the study has limitations, such as a relatively small sample size and lack of a control group, it suggests that habit-based interventions may be successful in developing cybersecurity behaviors at work.

Critique and Recommendations

The paper integrates Social Identity Theory and Social Learning Theory to offer insights into the commonalities of in-group membership and habit formation. Recommendations include leveraging these theories to enhance the effectiveness of cybersecurity training, considering distinctiveness threats, and addressing cognitive biases that contribute to human errors in cybersecurity breaches.

Conclusion

Cyberpsychology serves as a valuable lens to understand the intricate relationship between psychology and technology. Collaborative efforts between psychology and cybersecurity are essential to design effective strategies and software to combat cybercrime. This paper emphasizes the need for interdisciplinary research to promote a cyber-safe world.

References

Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179–211. https://doi.org/10.1016/0749-5978(91)90020-t

Alhayani, et al., (2021). Effectiveness of artificial intelligence techniques against cyber security risks apply of IT industry. Materials Today: Proceedings. https://doi.org/10.1016/j.matpr.2021.02.531

Ancis, J. (2020). STS 359-H01: Cyberpsychology. Digital Commons @ NJIT. https://digitalcommons.njit.edu/hum-syllabi/298/

Ancis, J. R. (2020,). The Age of Cyberpsychology: An overview · volume 1, issue 1. Technology, Mind, and Behavior. https://tmb.apaopen.org/pub/2yn6jhyv

Ancis, J. R. (2020). The Age of Cyberpsychology: An Overview. Technology, Mind, and Behavior, 1(1). https://doi.org/10.1037/tmb0000009

Attrill-Smith. (2019). The Oxford Handbook of Cyberpsychology. Oxford University Press. Bandura, A. (1977). Social Learning theory. Prentice-Hall. Branscombe, N. R., Wann, D. L., Noel, J. G., & Coleman, J. (1993). In-group or out-group extemity: Importance of the threatened social identity. Personality and Social Psychology Bulletin, 19(4), 381–388. https://doi.org/10.1177/0146167293194003

PSYC FPX 4210 Assessment 2 Research Methodologies

Collins, E. I. M., & Hinds, J. (2021). Exploring workers’ subjective experiences of habit formation in cybersecurity: A qualitative survey. Cyberpsychology, Behavior, and Social Networking, 24(9), 599–604. https://doi.org/10.1089/cyber.2020.0631

Durbin, S. (2022, January 16). 10 cognitive biases that can derail cybersecurity programs. Security Magazine RSS. https://www.securitymagazine.com/articles/96918-10-cognitive-biases-that-can-derail-cybersecu

rity-programs Ho, et al., (2010). The mediate effect of trust on Organizational Online Knowledge Sharing: An empirical study. International Journal of Information Technology & Decision Making, 09(04), 625–644. https://doi.org/10.1142/s0219622010003981

Hochheiser, H., Feng, J. H., & Lazar, J. (2017). Research methods in human computer interaction (second edition). Morgan Kaufmann Publishers. Institutional Research, planning and effectiveness. Institutional Research. https://www.ir.colostate.edu/surveys-and-rankings/qualtrics/ McLeod, S. A. (2016).

Bandura – social learning theory. Simply Psychology. www.simplypsychology.org/bandura.html Norman, K. L. (2017). Cyberpsychology: An introduction to human-computer interaction. Cambridge University Press. The Qualitative Data Analysis & Research Software. ATLAS.ti. https://atlasti.com/ Rogers, M. K., Seigfried, K., & Tidke, K. (2006).

Self-reported computer criminal behavior: A psychological analysis. Digital Investigation, 3, 116–120. https://doi.org/10.1016/j.diin.2006.06.002 Spears, R., Doosje, B., & Ellemers, N. (1997).

Self-stereotyping in the face of threats to group status and distinctiveness: The role of group identification. Personality and Social Psychology Bulletin, 23(5), 538–553. https://doi.org/10.1177/0146167297235009 Tajfel, H., & Turner, J. C. (2004).

The social identity theory of intergroup behavior. Political Psychology, 276–293. https://doi.org/10.4324/9780203505984-16

PSYC FPX 4210 Assessment 2 Research Methodologies