Marking Criteria HD (80%-100%) D (70% - 79%) C (60% - 69%) P (50% - 59%) N (0% - 49%) Broad Scan  Research journal  Filing system  Bibliographic file from broad scan A up-to-date research journal...

1 answer below »
topic name : Human and usability factors in web security & privacy
while making the assignment please keep in mind ( security and privacy on the web) because topic is chosen from this. will come to know more from capture file which i have attached.


Marking Criteria HD (80%-100%) D (70% - 79%) C (60% - 69%) P (50% - 59%) N (0% - 49%) Broad Scan  Research journal  Filing system  Bibliographic file from broad scan A up-to-date research journal is kept, filing system is shown with required folder and subfolder settings in good organization, bibliographic information from broad scan is stored in separate files based on the keywords used for search, rough analysis on the literature collection is applied to filter out irrelevant documents A up-to-date research journal is kept, filing system is shown with required folder and subfolder settings in good organization, bibliographic information from broad scan is stored in separate files based on the keywords used for search A up-to-date research journal is kept, filing system is shown with required folder and subfolder settings, bibliographic information from broad scan is stored in a single file A up-to-date research journal is kept, simple filing system is shown, bibliographic information from broad scan is stored in a single file No complete broad scan is implemented, such as no filing system is shown, no bibliographic information is collected or submitted, or no research journal is provided Focused Review  Updated filing system  Updated bibliographic file from focused review Focused review is implemented with updated filing system with and bibliographic information separate folder and subfolders apart from broad scan, advanced filtering method is used to keep only the highly relevant documents with appropriate explanation of selection Focused review is implemented with updated filing system with and bibliographic information separate folder and subfolders apart from broad scan, a filtering method is used to keep only the highly relevant documents Focused review is implemented with updated filing system with and bibliographic information separate folder and subfolders apart from broad scan Focused review is implemented with updated filing system and bibliographic information No complete focused review is implemented, such as filing system is not updated, or bibliographic information is not updated Comprehensive Critique  Evaluation statements of two Well-written evaluation statements for two selected papers are Comprehensive critique is implemented by submit a written Comprehensive critique is implemented by submit a written Comprehensive critique is implemented by submit a written No evaluation statement is submitted, or only one paper is selected papers presented, insights from these two papers are highlighted in content summary of evaluating two selected papers with detailed information and analysis of listed aspects summary of evaluating two selected papers in terms of listed aspects summary of evaluating two selected papers evaluated Final outline of the literature review chapter Demonstrate capability to create hieratical outline of chapter is presented up to four levels of titles in logical order to provide clear overview organization of the entire chapter Demonstrate capability to create hieratical outline of chapter is presented up to three levels of titles in logical order to provide overview organization of the entire chapter Demonstrate capability to create hieratical outline of chapter is presented up to two levels of section and subsection titles in logical order to show organization of the entire chapter Demonstrate capability to create hieratical outline of chapter is presented at least one level of section titles of the entire chapter Failed to provide an outline of the chapter, or provide an outline for other chapters or the entire thesis Introduction section Well-written introduction section with careful organization to give big picture and insight of current development of information technology used in the selected research area Well-written introduction section to state the current development of information technology used in the selected research area Brief introduction in a short paragraph to state the content of the literature review chapter Very brief introduction in couple sentences to state the content of the literature review chapter No introduction section is written or the content is for entire thesis, but not literature review chapter Thesis template for VU-Sydney NIT6130 INTRODUCTION TO RESEARCH ASSIGNMENT 2 – LITERATURE REVIEW by XXXX YYYY Student ID: 4999999 Submitted to: Dr. Rachid Hamadi ii Table of Contents Table of Contents ................................................................................................................................ ii List of Figures .................................................................................................................................... iii List of Tables ...................................................................................................................................... iv Chapter 1 Literature Review ............................................................................................................... 1 1.1 Broad Scan ................................................................................................................................ 2 1.1.1 Research journal ................................................................................................................. 2 1.1.2 Filing system ...................................................................................................................... 4 1.1.3 Bibliographic file from broad scan ..................................................................................... 5 1.2 Focused Review .......................................................................
Answered Same DayAug 26, 2020NIT6130

Answer To: Marking Criteria HD (80%-100%) D (70% - 79%) C (60% - 69%) P (50% - 59%) N (0% - 49%) Broad Scan ...

Vignesh answered on Sep 01 2020
149 Votes
HUMAN AND USABILITY FACTORS IN WEB SECURITY AND PRIVACY
INTRODUCTION
Security and privacy are one of the important factors in protecting the e-commerce data and web services. Nowadays, Security breaches occurrence is common and we should be aware of it to protect it from happening. A Security breach is a process that occurs due to the vulnerability of the existing security mechanism. Examp
les of security mechanisms are compromising data security, password attack, overflow attack, web page attack, etc. this type of attacks results in financial loss. Information security is securing the basic principles of security such as Confidentiality, integrity and availability of data, system applications and network applications to ensure the safe transactions. Confidentiality is protecting the unauthorized access to secure the information. Integrity is protecting the unauthorized changes in the system, application, network and information. Availability is providing the access to the data all time whenever the user requests the information.
If the information is secured obviously, the privacy of the information is assured. Users should trust that the information should be used in an efficient manner without any security and privacy issues. Information privacy means that protecting the information against the unauthorized manner of individuals. Privacy of the data is considered more important in today’s life. Since all the information are stolen and compromised easily by the hackers the information should be stored securely using security and privacy policies. Many companies host websites using privacy policies that illustrates how the user’s information is secured and used. For implementing security and privacy policies, Human factors is considered an important factor. This is a major role used for designing the security system and policies. When the security is not intrusive to the people, they will not use the security features and functionality.
NEEDS OF SECURITY AND PRIVACY
Our world is processing trillion of information per second and most of the information in the world is processed from one place to another. We don’t know that all the information that is sent to the system are verified because more technology has come up which does not need human interaction. We don’t know that the information we are getting is the correct because of Possibility for the human capacity to track the information step by step. Due to this negligence, we are vulnerable to the attackers from anywhere. Recent reports, we are living in world of lies where people are unaware of this information spread. The information is shared through social media, living with the other people gets the same incorrect information. People will not know who sent the information where the information came from but people use this kind of information because of the people who sent it to them are trusted by them in order to prevent this kind of process to happen.
People need to share information which is sent to them they do not bother about the information is correct or not. Recent time companies have grown in the security domain more and many companies are aware of the security because of the information retrieval and duplication of the information. For example, if I own a company and I decide to publish a site. The website has some public data that is shared over the internet. People can go and fetch the information as they want and when they want. The part of the information should be confident about myself than the other people. They can try some attack on the internet to get that confident information from myself and they try to make it as public in doing so people who are using the internet are getting the information for free of cost and no copyright. So that companies are they to protect that information and monitor the activity of the user and they try to protect the information they require.
HUMANS AND THEIR...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here