SlideShare uma empresa Scribd logo
1 de 25
Running head: AROUND THE CLOCK SECURITY 1
Team # 3
Around the Clock Security
Florida State University
LIS3201
Final Report
Abstract
2
AROUND THE CLOCK SECURITY
The main topic was cybersecurity and studying how research participants manage their
own cybersecurity on mobile apps, websites, and devices. This problem affects businesses and
people all over the world because of hackers and malware that is used to steal private
information. The study participants were FSU college students with the majority being IT or
ICT students who filled out a survey that asked them for general information like their grade
level and gender and more open-ended questions that allowed them to explain how they protect
themselves from cyber-threats. It was discovered that most students do not fully trust websites,
apps and devices to protect their information so they either limit what information they put out
there or use secondary resources to combat online threats. Hackers are more resourceful and
dangerous than ever and students realize that and are looking for ways to limit the risk that they
expose themselves to. In this study, some of the cyber risks found on mobile apps, websites
and devices and the counter measures taken by individuals and companies to prevent their
information from being vulnerable to attack were listed.
Keywords: cybersecurity, privacy, hackers, information
Problem Statement
In the world we live in today, all of our private information is stored in our computers
compared to hard files in our home offices not even 10 years ago. Although this
technological advancement helps save space in our homes and keep all of our information
better organized, it makes it a lot easier for someone to steal this private information. Data
security is one of the biggest IT problems that we face whether you are just an average Joe
trying to protect your credit card information or you own a multi-million dollar business and
are trying to keep all of the business information secure from hackers. Amazon is a multi-
billion dollar company which allows hundreds of thousands of people to purchase products
online on a daily basis. Therefore there are hundreds of thousands of different credit cards
being used on this website making it a hacker friendly place. Data security for Amazon must
3
AROUND THE CLOCK SECURITY
be top of the line to ensure nobody loses their credit card information and any other personal
information such as home address. This is such a common problem for many businesses and
people, and this is why data security is extremely important in keeping the consumer safe and
not losing any money from hackers. Many big companies that complete a lot of online sales
invest a lot of money into data security to try and maximize its effect on hackers (Giles,
2011).
Significance of Study
Keeping information on the internet safe is an extremely high priority. Cyberattacks
have become increasingly sophisticated, as well as extremely common. Nowadays, most
business is conducted over the internet. As mentioned before, many huge businesses that
complete a lot of online sales invest a lot of money into data security to try and maximize its
effect on hackers (Giles, 2011). People have their banking over the internet, submit medical
documents over the internet, and have confidential data that, unsecured, can cause a lot of
damage. With a simple malware attack, a hacker can gain access to all the information kept
on a personal computer. That includes usernames and passwords for sensitive accounts, for
example a financial institution, and one transfer later all that person’s money is gone.
Cybersecurity is vital in today’s working environment, not only for individuals, but also
corporations. According to the International Telecommunications Union (ITU), cybersecurity
is "both about the insecurity created through cyberspace and about technical/non-technical
practices of making it (more) secure" (Walton et al., 2021). Some corporations gather
massive amounts of data on their customers, some of which is confidential customer
information. Keeping that information, the customer service provided to the customer is
paramount to the success of the business, as one security breach could be the difference
between having their customer’s trust, and not having it.
4
AROUND THE CLOCK SECURITY
Research Questions
RQ1: What types of cybersecurity threats do FSU CCI students encounter?
RQ2: How do FSU CCI students protect themselves against cybersecurity threats?
RQ3: Do FSU CCI students feel like the websites and social media platforms that they use
protect their information from cyber security threats?
Environmental Scan
Introduction
Cybersecurity is a growing issue in today’s day and age. It affects everyone and
everything in today’s world. The Internet of Things (IoT) has made it so anything and
everything can be hacked in some way. There have been reports of cars even being able to be
hacked and causing accidents and potential injuries (Blanco, 2021). This is an extreme example
of how hackers can affect people’s lives, and it illustrates the importance of cybersecurity. It’s
importance can not be understated. Online information needs protecting to ensure that people’s
identities are kept safe. The digital age has made it so records are now kept online. Everything
from financial information to medical records, it is all online. So the question of how to protect
that information and where the information is most vulnerable comes into question. With so
many websites, devices and applications on the market, protecting information across all those
platforms can be extremely difficult. However, to effectively protect against hacker’s attacks,
cybersecurity professionals must know about the different types of attacks hackers use.
Hackers have a myriad of different attacks they can use, like phishing, sql injection, DoS and
others (Terra, 2019). In this scan they will all be explained, as well as their countermeasures.
Hackers are a threat that aren’t going anywhere, which is why cybersecurity is so important in
today’s age.
Websites
5
AROUND THE CLOCK SECURITY
One of the biggest issues that has been introduced by the technological era deals with
the cybersecurity aspect of keeping personal information private and unavailable for hackers.
To prevent hackers and malware from stealing private information from businesses or people,
drastic measures of cybersecurity have been planned out and instituted in many computers and
software. However, as far as these drastic measures may go, users still make mistakes by
clicking on the wrong link on a website or even giving a dangerous website owned by hackers
all of their private information.
With the astronomical advancement in information technology over the last decade, it
is considered normal to rely on the everyday use of online services such as financial services,
gaming services and social media. All of these services require private information which can
include a social security number, addresses, and credit card information. Over the past decade,
users have become more and more susceptible to inputting any private information that is being
asked from a website in which the user does not know who it belongs to. Over recent years,
hackers have developed fake websites used to steal all of the sensitive information someone
has to offer. The technology term used for this cybersecurity issue plaguing cyberspace is
known as phishing attacks. In order to prevent many phishing attacks, software has been
created to show a symbol of a lock next to a website's URL in order to prove that the website
being browsed on is secure (Alsariera et al., 2020). Information technology specialists such as
Alsariera believe that courses should be taken in order to show the key differences between
websites attempting phishing and websites that are secure. This finding implies that technology
users should take a course or take some time to learn what to do and what not to do while
surfing the web in order to avoid giving away private information to hackers.
Although giving away one person’s private information sounds bad enough as it is,
there have been many attempts at hacking the government of a country. One of the most
common attempts at hacking an entire government database deals with flooding online
6
AROUND THE CLOCK SECURITY
platforms with duplicitous information and traffic requests. When this happens, websites
become slowed down and crash, allowing for hackers to try and break through the database's
firewall (Wilner, 2018). According to Wilner and other information technology specialists,
drastic measures must be made to create certain softwares in order to detect when an attack
might be happening and shut down everything before the attack does its damage. This finding
implies that even government databases can be compromised by hackers therefore everyone
that uses technology should be extremely cautious when surfing the internet.
Devices
Mobile devices such as smartphones and tablets are used every day for personal, and
business uses. In a study conducted in 2015, the researchers examined how the use of mobile
devices in home and work settings can compromise mobile security (Jeske et al., 2015). In the
midst of a global pandemic, many businesses have adapted to the situation by going virtual and
having their employees work from home. This would mean confidential information would
have to be shared online, therefore leaving this data vulnerable to cyberattacks, especially if
the employee is not using a secured network on their device. While in some cases cyberattacks
on the devices are unavoidable, sometimes the owners of the devices are not as careful with
their privacy on the devices, which can leave them extremely vulnerable. The Internet and other
mobile distractions like social media can easily distract impulsive employees, which can leave
them susceptible to security issues such as phishing and credit card fraud (Jeske et al., 2015).
It is important to be careful and protect any information that may be exposed to hackers,
especially if it is business information. As mentioned before, there are indeed cyberattacks that
are unavoidable and measures such as authentication and authorization processes can help
protect data. While these are very effective forms of cybersecurity, there are still some
problems, specifically continuous authentication systems. Some of the biggest challenges that
occur with these systems are the accuracy of the authentication and how a user’s behavior can
7
AROUND THE CLOCK SECURITY
be replicated by bots in an effective manner (Valero et al., 2018). These kinds of problems are
extremely difficult to solve because of the issues with adaptability and accuracy. However,
there are potential solutions to solving these problems with feature engineering, acquisition of
behavioral data, the computation of authentication level, and automatic adaptability to new
behaviors (Valero et al., 2018). These four phases can help mobile devices be more secure and
much more difficult to get into. Whether it is due to human error or a flawed system, there are
many ways to protect any device from cybercriminals.
The article by Dery covers privacy concerns among devices that specifically collect
sensor-based information. This article explains that certain devices require access to private
information in order to best serve the user’s needs (Dery & Jelnov, 2021). The article by
Serrano-Telleria also mentions that smartphones are most helpful to the user when they are
personalized through user information (Serrano-Tellaria, 2018). Because these devices heavily
rely on user information, it is difficult to draw the line on where exploitation starts. Based on
a study conducted by Serrano-Telleria, the majority of users that were surveyed said that they
do not deeply consider what companies do with their personal data ( Serrano-Tellaria,
2018). In the article written by Dery, they stated that users are often misinformed or uneducated
on what companies/devices are doing with their data, as well as the consequences of their
private information being shared (Dery & Jelnov, 2021). Many users are unaware that their
private information stored on their devices could be potentially sold to third parties (Dery &
Jelnov, 2021). A common theme in both of these articles is that users must be informed about
securing their private information in order to prevent data leaks. Some of the ways that users
can secure their information is by changing the settings on their apps/social media accounts to
not have access to certain information that is stored on their devices. Another solution to
privacy concerns is to have different passwords for different devices/accounts (Dery & Jelnov,
2021). Some participants in the Serrano-Telleria survey said that they do not allow their apps
8
AROUND THE CLOCK SECURITY
to have access to their contacts, photos, etc., in order to limit the amount of data that they can
derive from their devices (Serrano-Telleria, 2018). It appears that one of the major solutions to
privacy concerns on devices is user intervention. However, due to the lack of knowledge about
privacy, user intervention is not always possible.
Apps
Mobile applications have the most active user population and one of the largest with
billions of people using social media sites like Instagram, Facebook, and Twitter. There is
also a large population of users playing mobile games, using mobile applications for
education, and using mobile applications for entertainment. Many mobile applications like
social media platforms are not just mobile, but most users access these platforms using their
mobile devices. Few platforms, like Instagram, are only offered via the mobile application.
Social media companies themselves are at risk of breach of private company data, but users
are also at risk of their information being breached or used in a dangerous way. In the terms
of agreement, users do agree to having their activity monitored, but they do not consent to
having their information taken to be targeted for false advertising or scams nor do most
mobile application platforms allow their users' data to be used in a harmful way. In recent
years targeted attacks on mobile application owners and stockholders have caused them to
reevaluate the importance of cybersecurity and are making smarter cybersecurity
investments. Companies are now monitoring the factors of cyberattacks to determine if
investing in cybersecurity will lead to less damage and damage control costs (Walton et al.,
2021).
Social media companies and other mobile application companies that hold large
amounts of personal data on their users provide them with tips and information on staying
safe. They also provide two factor identification and other identification processes to verify
9
AROUND THE CLOCK SECURITY
their users. They also follow a newly developed cybersecurity standard that updates their
software to be OS compliant (Abbas et al., 2021). Mobile application companies that are
taking early and more critical responses to cybersecurity attacks are protecting their users and
protecting themselves by making cybersecurity investments that will save them from higher
costs and more backlash in the long run.
There are millions of applications, mobile and on computers, that are free and are
used daily for most users. Essential applications may include mobile banking, social media,
online shopping, and so on. Many of these require usernames and passwords to access. With
new authentication technology like most recently in iPhone and Android, Face ID, it has
become an extra step for personal accounts to have ensured confidentiality. Also periodically,
applications will ask users to verify email addresses and phone numbers to make sure that the
application has the most recent and updated information. This is to ensure that no
unauthorized users have access and to ensure smooth interaction within the app. Even though
many apps take these extra steps to ensure safety, some apps may seem friendly at face value
that are intended to be used for a more malignant reason. “A lot more malware has been
found in other, non-Google application stores. Tricking the user into installing the app by
posing as a useful tool or game, the software then steals data from the phone and sends it out
to unknown people with unknown motivations” (Six, 2012). Users longing for full
customization over their personal devices has led to a large virus battle across multiple
applications. Androids and Windows PCs typically have this issue more than Apple users due
to limiting downloads from unverified stores and websites. There are many ways to be
notified of attacks. An example of this is when your browser alerts the user with a caution
page saying that the website or the application that is about to be accessed or downloaded is
not trusted and will not allow the action to happen and gives the “return to safety,” option.
10
AROUND THE CLOCK SECURITY
There have also been implementations of different applications that help with verifying
applications to make sure that data is protected in the process. An example of this would be
the Saint installer. “We implement Saint’s policy in a separate XML file with identical names
to the package name… Immediately after the package is parsed, the Saint installer examines
each requested permission against its corresponding permission-granting policy queried from
the App Policy provider. If a conflict is found, the installer rejects the installation.” (Ongtang
et al., 2011). Thus, the battle to stop hackers and secure personal data rages on.
Environmental Scan Conclusion
The emergence of the digital age has been the cause for everything to go online.
Everyone's information, whether it be personal and public, has urged the issue of
cybersecurity. With all the news, past and present, about the various ways hackers can access
information that can cause catastrophic damage to potential victims lives and they can
potentially never recover. This can include accessing bank information, credit and debit card
numbers and pins, even passwords and social security numbers. With so much sensitive data
at risk, there is going to be an everlasting need to prioritize protecting said data. Consumers
must be wary of what and who they allow access to their information due to there are many
websites, applications, and devices that may seem harmless but are constructed to give
hackers access to sensitive information and so they can do whatever they please with it. With
the countermeasures being taken in the current battle against hackers, there will only be more
ways to bring hackers to a halt whilst protecting everyone's data.
Methods
Data Collection Methods
The data collection method for this study featured an online questionnaire powered by
FSU qualtrics. This was the easiest format in order to survey the most amount of FSU CCI
11
AROUND THE CLOCK SECURITY
students without having to gather everyone at the same place at the same time. By having an
online survey, the FSU CCI students were able to complete the survey while taking their time
with no rush and in any location they desired. Not only is this convenient for the surveyors,
but this allows a stress-free survey experience for the student completing the survey.
Population and Sample
The population consisted of the student population at Florida State University (FSU).
We lowered the sample size tremendously by distributing our survey to the CCI major
students. This decision was based on the content of the survey pertaining to use on the
internet which is what that major is heavily influenced by. The sampling strategy used was
convenience, having classmates and other students within the major taking it. With this, it is
expected to reach at least half of the major students as we had most IT, and ICT majors.
Recruitment Site and Strategy
In order to have people respond to the survey, the best environment the group thought
to post it in was classes that IT and ICT major students would be in. So, the group members
pasted the qualtrics link in class Groupme, blackboard collaborate rooms and zoom rooms for
the target demographic to respond to. If the link was posted in a class period, each group
member made sure to ask the professor beforehand to ensure that it was acceptable to post.
Other than that, the group shared the link through word of mouth.
Analysis
Sample Description (Demographics)
The respondents had 60% males and 40% females complete the survey. 60% of the
respondents were ICT majors, 20% were IT, and the remaining 20% belonged to other
12
AROUND THE CLOCK SECURITY
majors. All of the respondents were between 20 and 22 years old. 60% of the respondents
were seniors, 20% were juniors, and the remaining 20% answered as “other”.
RQ #1: Content of RQ#1
In regards to RQ1, all of the FSU CCI students that responded to the survey reported
using social media. Some of the respondents reported that they did not feel that social media
sites were protecting their privacy. They reported feeling that because their information was
being shared with 3rd party advertisers, it was not being effectively protected. One respondent
felt that social media is effective at protecting privacy because the user is responsible for what
they share.
RQ #2: Content of RQ#2
As for RQ2, the respondents expressed the fact that they take extra precautions to
protect themselves from potential danger online by using outside softwares like virtual private
networks (VPNs). They feel that protection online is inadequate. They also reported that they
monitor what they post on social media and also use different usernames and passwords for
their various social media accounts so their privacy is ensured. All believe that the posing threat
online seriously and take the precautions they deem necessary.
RQ #3: Content of RQ#3
With RQ3, most respondents did not keep in mind the potential cybersecurity concerns
because they usually only follow and interact with friends and family. They are dealing with
people that they know personally and cordially so they feel no threat. Most would have their
profile private to filter who views their content. With them taking these precautions, they feel
that they are well protected.
Figure 1
13
AROUND THE CLOCK SECURITY
Note. The effect students feel social media has on privacy.
Figure 2
Note. The number of hours students spend online outside of class per day.
Discussion
For RQ1, some students believe social media has a negative effect on privacy because
of companies profiting from social media interactions and the fact that the information could
be on the Internet permanently if not removed from the platform, while others believe there is
no effect, meaning that it is neutral because the private information that is shared on social
media is provided by the user willingly. At the moment, there are no positive responses about
social media’s effect on privacy, which says something about how most people feel about
how invasive social media is regarding privacy. For RQ2, some FSU student’s take
14
AROUND THE CLOCK SECURITY
precautions against the potential danger of online hacking by using software that protects
their data like NordVPN. They also monitor what they post on social media; those that feel
that they could be at risk on social media limit what they post and protect their online account
by using different passwords and identification. All take the threat of their online information
being hacked seriously so they have different methods to protect themselves. This shows how
some people are well aware of the risks that social media or any website pose to its users. For
RQ3, most FSU CCI students on social media do not think of the potential cyber security
concerns because they are only looking at people that they know. Most CCI students switch
their social media accounts to private in order to attempt to control the people viewing their
profiles, however hackers have multiple strategies to infiltrate a person's personal
information. Another concern that many students do not understand is the amount of attempts
per day hackers are taking on trusted websites such as amazon in order to steal as much
information as possible.
In another study the researchers found that the use of mobile devices in home and
work settings can compromise mobile security (Jeske et al., 2015). As Figure 1 and Figure 2
show above, most students spend a lot of time on the Internet, but also feel that social media
has a negative or neutral impact on privacy. These two studies show how dependent people
are on the Internet and how the more often people use social media platforms and websites,
the more susceptible they are to cyber attacks. The findings in this study show how aware
people are of these risks and what they are doing to prevent them from happening.
Limitations/Future Study
The biggest limitations in the study was the sample size of the research project. With
a survey, a large enough sample size is required to expand our conclusions to the population
as a whole. Unfortunately, the sample size was not as large as it needed to be to extrapolate it
to the general population we were studying. In addition to that limitation, the limit of
15
AROUND THE CLOCK SECURITY
convenience sampling was also an issue. In general, convenience sampling is not sought after
by researchers, as it has the possibility of skewing the data and not representing the
population accurately.
In a future study that uses these research questions and population, the biggest thing
to focus on would be expanding the respondent pool. If there were more respondents to
provide more data, the conclusion could be extrapolated to the population that was being
studied. It would also be better to try to find a way around convenience sampling if this
research project was repeated. This would provide more precise results in regards to the
population in the research.
Conclusion
Over the course of this study and the completion of the survey, it was gathered that
many students know that apps are not well-equipped with protecting themselves online as far
as their personal data. Though they feel like they are protected since their content is
moderated, there is the fact that companies themselves can distribute our data to be shared to
3rd party companies. To combat this, users will use trust services to further help keep their
data concealed on various apps, devices, and websites so sensitive information will not be
leaked and get into the wrong hands. This shows the distrust between users and these various
forms of technology. Thus, users will continue to be their own form of around the clock
security.
Reflections
Brian Kelly: Throughout this semester, I made it a point to learn about cybersecurity issues. I
took a cybersecurity class, ran as an officer in the cybersecurity club, and did other
cybersecurity related projects in other classes. Within those other clubs and classes, I learned
so much about the threats cybersecurity professionals face, and good ways to counter these
threats. This made the project a lot easier to handle. On top of that, in this class I learned more
16
AROUND THE CLOCK SECURITY
about research methods, and furthered my understanding in different statistics methods like
sampling, applying a conclusion to a population based on researching a sample of the
population, amongst other things. I really enjoyed this class, as it has taught me a lot about data
collection and how many different ways that data can be collected, analyzed and presented.
The challenges I faced this semester were more personal, involving difficulties within my
family. This amounted to unfortunately missing some assignments.. I managed those issues in
private within my family and then finished the semester by not missing many more
assignments. Other than those issues I faced challenges in regards to workload. At the start of
the semester I started a new job with Florida Virtual School. They put me through a 25 hour
training curriculum, and it was difficult at first to manage this, along with the coursework I
was assigned. Once I finished the training and got accustomed to the workload of that job, I
was able to better balance my school and work life so I could complete my coursework while
also working at a satisfactory level.
Marcus Brown: Throughout the semester, I can say that I learned a great deal overall. This
project in specific has really helped me improve my researching abilities as a whole. I figured
I was well-equipped in research, but ended up learning new sampling methods, analysis on
qualitative and quantitative data, creating an environmental scan, and even distributing the
survey we had to create for this class. Through all my years of being in school, this has been
the most in depth research project that I have done, which makes sense why this was a group
project also. The most challenging thing for me while doing this project was trying to grasp the
concept of an environmental scan. It felt more like a literature review, but I learned that their
different. Looking through the lecture notes and talking to other classmates, I was able to get a
better understanding of it. Another interesting aspect of the project was trying to formulate
research questions that wouldn’t sound redundant and actually get honest answers out of our
17
AROUND THE CLOCK SECURITY
respondents. We came together and bounced ideas off each other to create good research
questions. This project has really improved my cooperation and working in groups. Scheduling
times to meet up and finish key parts in our projects and also working around my schedule
outside of school was also a challenge but was able to do so. This class really has helped me
better organize data and information entirely. With the introduction of Zotero, I can catalogue
my sources and also other articles and information pieces in future studies.
Jermanni Evans: I learned a great deal over the course of working on this project during the
semester and about all the things that go into research. Even with prior experience working on
a research project, I have never worked on something as in-depth as this research project. It
was very interesting learning about the various aspects of research such as the different
sampling methods, gaining more knowledge about qualitative analysis, developing an
environmental scan, and how to create a research survey, which is something I had never done
before. The main challenge of learning all of this new information along with stuff that I was
already familiar with is the fact that it was still a lot to take in. For example, I had some
experience with quantitative data in the past, so when it was time to work on the qualitative
side of things, I had no idea how to go about it even when looking at the example in class.
When it was time to take the quiz on quantitative and qualitative analysis, I was able to figure
out how to code the themes for the qualitative portion of the quiz by looking at the example
and realizing that even though it was a little tedious, it was not really that difficult. That was
how I approached any issue or challenge that I had with the project or the class in general by
looking back at the slides from the lectures along with the examples. It was nice getting to work
on this project with my team throughout the semester and seeing everything come together.
18
AROUND THE CLOCK SECURITY
Grace Bayliss: Throughout this semester I learned a ton about researching and analyzing data.
Through the creation of this project I was able to gain valuable skills in not only data analysis
but also in survey creation. I learned how to create thorough and concise research questions
that are effective at providing us with the information we need. I also learned how to analyze
and interpret given data sets. I improved my skills at excel spreadsheets as well. Conducting
research through the execution of this project was a great learning experience. I feel that my
understanding of creating and conducting a study as well as a survey has increased greatly.
Prior to this class I had little understanding of what actually went into research studies, and
now I feel that my understanding of how they work, as well as how to interpret the data from
them, has improved greatly. There were many challenges that we faced with this project. We
had to work around each other's schedules and split the work evenly. We also ran into some
trouble when it came to creating effective research questions. At times there was also confusion
with assignment instructions, especially when it came to the coding/themes assignment.
Coming up with a good team name was also a bit of a struggle for the group. Overall I feel that
we worked as a group to overcome any challenges that we were faced with. We asked questions
when necessary and worked together to complete assignments to the best of our ability.
Christian Caba: Over the course of the semester, we have been incrementally working
towards this research project and overcoming any obstacle/confusion along the way. This was
my first research project or any research in general that I have ever conducted therefore I
learned a great deal from the creating an abstract, obtaining the data, and finalizing all of it
with a conclusion/discussion of what we found. Although I learned everything about
conducting and creating a research project this semester, one of the most difficult parts to me
was building a survey centered around the research questions and making sure it answered all
of the questions we needed to be answered when somebody completed the survey. Although
19
AROUND THE CLOCK SECURITY
this was a difficult task, my group and I were able to each formulate our own set of questions
and combine all of them to truly build a great survey which answered all of our research
questions. As far as the rest of the project, every other aspect of it was about qualitative data
analysis. Another obstacle along the road came from analyzing all of the data we received from
everyone answering our survey we created. The only step that was difficult in this process was
figuring out the categories/themes we would classify all of the data imputed by the surveyors.
Once we figured that out, it was smooth sailing however extremely tedious as it was a lot of
data to be analyzed. Overall, this was a great learning experience as I had no experience doing
any research and we were really able to hit all the key points in creating a research project.
Destiny Donald: Working on this assignment with my group helped me understand how to
better organize data and information. I haven’t worked on a research project for this long or
one that is so complex so there was a learning curve with most of the process but talking about
the different concepts in class and the in class assignments assisted in working on the project.
I learned about the different types of data before in previous classes but this class gave me a
better understanding in how to phrase research questions based on the type and content of data
we wanted to collect. Because we had to do an in depth overview of our research purpose, data
collection methods and all other aspects of our project we understood exactly what we were
studying and what we wanted to learn from our research. Also the questions were so thought
out, specific, and organized so once we collected the data from our participants we were able
to synthesize the information clearly. When we first started working on the project, it was a
little difficult understanding some of the assignments and working within each other's busy
schedule but after a couple of weeks we all got the hang of it and were able to work well
together. We managed issues within the assignment by not being afraid to ask clarifying
questions about any aspects of the project. Because we communicated with each other clearly
20
AROUND THE CLOCK SECURITY
and divided the work evenly we were able to complete every assignment with little to no
problem.
21
AROUND THE CLOCK SECURITY
References
Abbas, H., Amjad, M.F., Atiquzzaman, M., Hamdani, S.W., Janjua, A.R., Shahid, W.B.,
Malik, J., Murtaza, M. H., & Khan, A.W. (2021). Cybersecurity standards in the context
of operating system. ACM Computing Surveys, 54(3), 1–36.
https://doi.org/10.1145/3442480
Alsariera, Y. A., Elijah, A. V., & Balogun, A. O. (2020). Phishing website detection: Forest by
penalizing attributes algorithm and its enhanced variations. Arabian Journal for
Science and Engineering, 45(12), 10459-10470.
https://doi.org/10.1007/s13369-020-04802-1
Blanco, S. (2021, September 4). Car hacking danger is likely closer than you think. Car and
Driver. https://www.caranddriver.com/news/a37453835/car-hacking-danger-is-likely-
closer-than-you-think/
Dery, L., & Jelnov, A. (2021). Privacy–accuracy consideration in devices that collect sensor-
based information. Sensors, 21(14), 4684. https://doi-org./10.3390/s21144684
Jeske, D., Briggs, P., & Coventry, L. (2016). Exploring the relationship between impulsivity
and decision-making on mobile devices. Personal and Ubiquitous Computing, 20(4),
545–557. https://doi.org/10.1007/s00779-016-0938-4
Jorquera Valero, J., Sánchez Sánchez, P., Fernández Maimó, L., Huertas Celdrán, A., Arjona
Fernández, M., De Los Santos Vílchez, S., & Martínez Pérez, G. (2018). Improving the
security and QOE in mobile devices through an intelligent and adaptive continuous
authentication system. Sensors, 18(11), 3769. https://doi.org/10.3390/s18113769
Kemp, S. (2020, April 23). Digital around the world in April 2020.
https://wearesocial.com/uk/blog/2020/04/digital-around-the-world-in-
april-2020/
22
AROUND THE CLOCK SECURITY
Kostyuk, N. (2014). International and domestic challenges to Comprehensive National
Cybersecurity: A case study of the Czech Republic. Journal of Strategic Security, 7(1),
68–82. https://doi.org/10.5038/1944-0472.7.1.6
Ongtang, M., McLaughlin, S., Enck, W., & McDaniel, P. (2011). Semantically Rich
Application-centric security in Android. Security and Communication Networks, 5(6),
658–673. https://doi.org/10.1002/sec.360
Serrano-Tellería, A. (2018). Users’ management of mobile devices and privacy. El Profesional
de La Información, 27(4), 822-829.
https://doi.org/10.3145/epi.2018.jul.11
Six, J. (2012). Application security for the Android platform. O'Reilly Online Learning.
https://www.oreilly.com/library/view/application-security-
for/9781449322250/ch01.html
Terra, J. Why cyber security is important to you [especially in 2021]. (2019, November 18).
Simplilearn.com. https://www.simplilearn.com/cybersecurity-and-you-article
Walton, S., Wheeler, P. R., Zhang, Y. I., & Zhao, X. R. (2021). An integrative review and
analysis of cybersecurity research: Current state and future directions. Journal of
Information Systems, 35(1), 155-186. https://doi.org/10.2308/ISYS-19-033
Wilner, A. S. (2018). Cybersecurity and its discontents: Artificial intelligence, the Internet of
Things, and digital misinformation. International Journal (Toronto), 73(2), 308–316.
https://doi.org/10.1177/0020702018782496
Consent Form
23
AROUND THE CLOCK SECURITY
In the table below, list what contributions each of the team members made to this
assignment.
Name Contribution
Brian Kelly Document creation, problem statement, limitations
Marcus Brown Research questions, population sample, conclusion
Jermanni Evans Significance of study, references, visualizations,
discussion
Grace Bayliss Environmental Scan
Christian Caba Analysis, data collection method
Destiny Donald Abstract
24
AROUND THE CLOCK SECURITY
Criteria Rating
Abstract,Problem Statement, Significance, RQs: 11 points
Appropriate abstract,problem statement, significance, and RQs (4 pts), in-
text citations for all arguments (4 pts); revisions from research project report
(3 pts)
Environmental Scan: 10 points
Appropriate intro, subsections, and conclusion (3 pts), in-text citations for all
arguments (4 pts), revisions from research project report (3 pts)
Methods: 9 points
Finalized data collection method(s) (2pts), sampling technique(s) (2pts), and
recruitment process (2 pts), revisions from research project report (3 pts)
Analysis: 19 points
Sample description (2 pts); complete QUAL and QUAN findings for each
research question (8 pts); include data/stats/quotes, analysis, and relate
findings to RQ answers (6 pts), visualizations (3 pts)
Discussion: 18 points
Summarize findings for all RQs (3 pts), provide interpretations/discussions
for all RQs (12 pts), comparison/contrast with previous studies and citation
needed (3 pts)
Limitations/Future Studies: 6 points
Limitations (include generalizability issues discussion) (3 pts), future studies
(3 pts)
Conclusion: 5 points
Restate and highlight core findings (5 pts)
Reflection: 10 points (Individual) 1)
25
AROUND THE CLOCK SECURITY
Reflection by team members (10 pts each) 2)
3)
4)
5)
6)
File Name, APA Style, Consent Form: 12 points
File name (1 pt), proper citations and references (8 pts),match between
reference list and citations, (2 pts), consent form (1 pt)

Mais conteúdo relacionado

Mais procurados

Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
Mark Albala
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
Symantec
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environment
K Singh
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security System
IJERA Editor
 
CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018
Confederation of Indian Industry
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
Tharaka Mahadewa
 

Mais procurados (19)

Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
 
188
188188
188
 
Ijnsa050215
Ijnsa050215Ijnsa050215
Ijnsa050215
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industry
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
 
Netop Remote Control Embedded Devices
Netop Remote Control Embedded DevicesNetop Remote Control Embedded Devices
Netop Remote Control Embedded Devices
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environment
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security System
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
 
Data Protection & Privacy During the Coronavirus Pandemic
Data Protection & Privacy During the Coronavirus PandemicData Protection & Privacy During the Coronavirus Pandemic
Data Protection & Privacy During the Coronavirus Pandemic
 
How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
IT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide DeckIT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide Deck
 
[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention
 
CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
 

Semelhante a Team 3_Final Project.docx

12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
AnastaciaShadelb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
ChantellPantoja184
 
Surname 2Briana CastilloCyber Crime6-16-15.docx
Surname 2Briana CastilloCyber Crime6-16-15.docxSurname 2Briana CastilloCyber Crime6-16-15.docx
Surname 2Briana CastilloCyber Crime6-16-15.docx
mattinsonjanel
 
Running Head CURRENT CHALLENGES FACING CYBER SECURITY .docx
Running Head CURRENT CHALLENGES FACING CYBER SECURITY          .docxRunning Head CURRENT CHALLENGES FACING CYBER SECURITY          .docx
Running Head CURRENT CHALLENGES FACING CYBER SECURITY .docx
healdkathaleen
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
healdkathaleen
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
varun4110
 
Data Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network AnalysisData Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network Analysis
IJERD Editor
 

Semelhante a Team 3_Final Project.docx (20)

12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
1402.1842.pdf
1402.1842.pdf1402.1842.pdf
1402.1842.pdf
 
Surname 2Briana CastilloCyber Crime6-16-15.docx
Surname 2Briana CastilloCyber Crime6-16-15.docxSurname 2Briana CastilloCyber Crime6-16-15.docx
Surname 2Briana CastilloCyber Crime6-16-15.docx
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber security
 
Running Head CURRENT CHALLENGES FACING CYBER SECURITY .docx
Running Head CURRENT CHALLENGES FACING CYBER SECURITY          .docxRunning Head CURRENT CHALLENGES FACING CYBER SECURITY          .docx
Running Head CURRENT CHALLENGES FACING CYBER SECURITY .docx
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
 
Cyber_Security.-project-4th year-cse pdf
Cyber_Security.-project-4th year-cse pdfCyber_Security.-project-4th year-cse pdf
Cyber_Security.-project-4th year-cse pdf
 
Cyber_Security+Education_Project_Report.pdf
Cyber_Security+Education_Project_Report.pdfCyber_Security+Education_Project_Report.pdf
Cyber_Security+Education_Project_Report.pdf
 
Risky Business
Risky BusinessRisky Business
Risky Business
 
Cybersecurity- Role of FinTech
Cybersecurity- Role of FinTech Cybersecurity- Role of FinTech
Cybersecurity- Role of FinTech
 
Trends_in_my_profession(revised)
Trends_in_my_profession(revised)Trends_in_my_profession(revised)
Trends_in_my_profession(revised)
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
 
Data Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network AnalysisData Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network Analysis
 
Cyber attack awareness and prevention in network security
Cyber attack awareness and prevention in network securityCyber attack awareness and prevention in network security
Cyber attack awareness and prevention in network security
 
INFORMATION ASSURANCE AND SECURITY 1.pdf
INFORMATION ASSURANCE AND SECURITY 1.pdfINFORMATION ASSURANCE AND SECURITY 1.pdf
INFORMATION ASSURANCE AND SECURITY 1.pdf
 
Top Cyber Security Course in India - GICSEH.pdf
Top Cyber Security Course in India - GICSEH.pdfTop Cyber Security Course in India - GICSEH.pdf
Top Cyber Security Course in India - GICSEH.pdf
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Team 3_Final Project.docx

  • 1. Running head: AROUND THE CLOCK SECURITY 1 Team # 3 Around the Clock Security Florida State University LIS3201 Final Report Abstract
  • 2. 2 AROUND THE CLOCK SECURITY The main topic was cybersecurity and studying how research participants manage their own cybersecurity on mobile apps, websites, and devices. This problem affects businesses and people all over the world because of hackers and malware that is used to steal private information. The study participants were FSU college students with the majority being IT or ICT students who filled out a survey that asked them for general information like their grade level and gender and more open-ended questions that allowed them to explain how they protect themselves from cyber-threats. It was discovered that most students do not fully trust websites, apps and devices to protect their information so they either limit what information they put out there or use secondary resources to combat online threats. Hackers are more resourceful and dangerous than ever and students realize that and are looking for ways to limit the risk that they expose themselves to. In this study, some of the cyber risks found on mobile apps, websites and devices and the counter measures taken by individuals and companies to prevent their information from being vulnerable to attack were listed. Keywords: cybersecurity, privacy, hackers, information Problem Statement In the world we live in today, all of our private information is stored in our computers compared to hard files in our home offices not even 10 years ago. Although this technological advancement helps save space in our homes and keep all of our information better organized, it makes it a lot easier for someone to steal this private information. Data security is one of the biggest IT problems that we face whether you are just an average Joe trying to protect your credit card information or you own a multi-million dollar business and are trying to keep all of the business information secure from hackers. Amazon is a multi- billion dollar company which allows hundreds of thousands of people to purchase products online on a daily basis. Therefore there are hundreds of thousands of different credit cards being used on this website making it a hacker friendly place. Data security for Amazon must
  • 3. 3 AROUND THE CLOCK SECURITY be top of the line to ensure nobody loses their credit card information and any other personal information such as home address. This is such a common problem for many businesses and people, and this is why data security is extremely important in keeping the consumer safe and not losing any money from hackers. Many big companies that complete a lot of online sales invest a lot of money into data security to try and maximize its effect on hackers (Giles, 2011). Significance of Study Keeping information on the internet safe is an extremely high priority. Cyberattacks have become increasingly sophisticated, as well as extremely common. Nowadays, most business is conducted over the internet. As mentioned before, many huge businesses that complete a lot of online sales invest a lot of money into data security to try and maximize its effect on hackers (Giles, 2011). People have their banking over the internet, submit medical documents over the internet, and have confidential data that, unsecured, can cause a lot of damage. With a simple malware attack, a hacker can gain access to all the information kept on a personal computer. That includes usernames and passwords for sensitive accounts, for example a financial institution, and one transfer later all that person’s money is gone. Cybersecurity is vital in today’s working environment, not only for individuals, but also corporations. According to the International Telecommunications Union (ITU), cybersecurity is "both about the insecurity created through cyberspace and about technical/non-technical practices of making it (more) secure" (Walton et al., 2021). Some corporations gather massive amounts of data on their customers, some of which is confidential customer information. Keeping that information, the customer service provided to the customer is paramount to the success of the business, as one security breach could be the difference between having their customer’s trust, and not having it.
  • 4. 4 AROUND THE CLOCK SECURITY Research Questions RQ1: What types of cybersecurity threats do FSU CCI students encounter? RQ2: How do FSU CCI students protect themselves against cybersecurity threats? RQ3: Do FSU CCI students feel like the websites and social media platforms that they use protect their information from cyber security threats? Environmental Scan Introduction Cybersecurity is a growing issue in today’s day and age. It affects everyone and everything in today’s world. The Internet of Things (IoT) has made it so anything and everything can be hacked in some way. There have been reports of cars even being able to be hacked and causing accidents and potential injuries (Blanco, 2021). This is an extreme example of how hackers can affect people’s lives, and it illustrates the importance of cybersecurity. It’s importance can not be understated. Online information needs protecting to ensure that people’s identities are kept safe. The digital age has made it so records are now kept online. Everything from financial information to medical records, it is all online. So the question of how to protect that information and where the information is most vulnerable comes into question. With so many websites, devices and applications on the market, protecting information across all those platforms can be extremely difficult. However, to effectively protect against hacker’s attacks, cybersecurity professionals must know about the different types of attacks hackers use. Hackers have a myriad of different attacks they can use, like phishing, sql injection, DoS and others (Terra, 2019). In this scan they will all be explained, as well as their countermeasures. Hackers are a threat that aren’t going anywhere, which is why cybersecurity is so important in today’s age. Websites
  • 5. 5 AROUND THE CLOCK SECURITY One of the biggest issues that has been introduced by the technological era deals with the cybersecurity aspect of keeping personal information private and unavailable for hackers. To prevent hackers and malware from stealing private information from businesses or people, drastic measures of cybersecurity have been planned out and instituted in many computers and software. However, as far as these drastic measures may go, users still make mistakes by clicking on the wrong link on a website or even giving a dangerous website owned by hackers all of their private information. With the astronomical advancement in information technology over the last decade, it is considered normal to rely on the everyday use of online services such as financial services, gaming services and social media. All of these services require private information which can include a social security number, addresses, and credit card information. Over the past decade, users have become more and more susceptible to inputting any private information that is being asked from a website in which the user does not know who it belongs to. Over recent years, hackers have developed fake websites used to steal all of the sensitive information someone has to offer. The technology term used for this cybersecurity issue plaguing cyberspace is known as phishing attacks. In order to prevent many phishing attacks, software has been created to show a symbol of a lock next to a website's URL in order to prove that the website being browsed on is secure (Alsariera et al., 2020). Information technology specialists such as Alsariera believe that courses should be taken in order to show the key differences between websites attempting phishing and websites that are secure. This finding implies that technology users should take a course or take some time to learn what to do and what not to do while surfing the web in order to avoid giving away private information to hackers. Although giving away one person’s private information sounds bad enough as it is, there have been many attempts at hacking the government of a country. One of the most common attempts at hacking an entire government database deals with flooding online
  • 6. 6 AROUND THE CLOCK SECURITY platforms with duplicitous information and traffic requests. When this happens, websites become slowed down and crash, allowing for hackers to try and break through the database's firewall (Wilner, 2018). According to Wilner and other information technology specialists, drastic measures must be made to create certain softwares in order to detect when an attack might be happening and shut down everything before the attack does its damage. This finding implies that even government databases can be compromised by hackers therefore everyone that uses technology should be extremely cautious when surfing the internet. Devices Mobile devices such as smartphones and tablets are used every day for personal, and business uses. In a study conducted in 2015, the researchers examined how the use of mobile devices in home and work settings can compromise mobile security (Jeske et al., 2015). In the midst of a global pandemic, many businesses have adapted to the situation by going virtual and having their employees work from home. This would mean confidential information would have to be shared online, therefore leaving this data vulnerable to cyberattacks, especially if the employee is not using a secured network on their device. While in some cases cyberattacks on the devices are unavoidable, sometimes the owners of the devices are not as careful with their privacy on the devices, which can leave them extremely vulnerable. The Internet and other mobile distractions like social media can easily distract impulsive employees, which can leave them susceptible to security issues such as phishing and credit card fraud (Jeske et al., 2015). It is important to be careful and protect any information that may be exposed to hackers, especially if it is business information. As mentioned before, there are indeed cyberattacks that are unavoidable and measures such as authentication and authorization processes can help protect data. While these are very effective forms of cybersecurity, there are still some problems, specifically continuous authentication systems. Some of the biggest challenges that occur with these systems are the accuracy of the authentication and how a user’s behavior can
  • 7. 7 AROUND THE CLOCK SECURITY be replicated by bots in an effective manner (Valero et al., 2018). These kinds of problems are extremely difficult to solve because of the issues with adaptability and accuracy. However, there are potential solutions to solving these problems with feature engineering, acquisition of behavioral data, the computation of authentication level, and automatic adaptability to new behaviors (Valero et al., 2018). These four phases can help mobile devices be more secure and much more difficult to get into. Whether it is due to human error or a flawed system, there are many ways to protect any device from cybercriminals. The article by Dery covers privacy concerns among devices that specifically collect sensor-based information. This article explains that certain devices require access to private information in order to best serve the user’s needs (Dery & Jelnov, 2021). The article by Serrano-Telleria also mentions that smartphones are most helpful to the user when they are personalized through user information (Serrano-Tellaria, 2018). Because these devices heavily rely on user information, it is difficult to draw the line on where exploitation starts. Based on a study conducted by Serrano-Telleria, the majority of users that were surveyed said that they do not deeply consider what companies do with their personal data ( Serrano-Tellaria, 2018). In the article written by Dery, they stated that users are often misinformed or uneducated on what companies/devices are doing with their data, as well as the consequences of their private information being shared (Dery & Jelnov, 2021). Many users are unaware that their private information stored on their devices could be potentially sold to third parties (Dery & Jelnov, 2021). A common theme in both of these articles is that users must be informed about securing their private information in order to prevent data leaks. Some of the ways that users can secure their information is by changing the settings on their apps/social media accounts to not have access to certain information that is stored on their devices. Another solution to privacy concerns is to have different passwords for different devices/accounts (Dery & Jelnov, 2021). Some participants in the Serrano-Telleria survey said that they do not allow their apps
  • 8. 8 AROUND THE CLOCK SECURITY to have access to their contacts, photos, etc., in order to limit the amount of data that they can derive from their devices (Serrano-Telleria, 2018). It appears that one of the major solutions to privacy concerns on devices is user intervention. However, due to the lack of knowledge about privacy, user intervention is not always possible. Apps Mobile applications have the most active user population and one of the largest with billions of people using social media sites like Instagram, Facebook, and Twitter. There is also a large population of users playing mobile games, using mobile applications for education, and using mobile applications for entertainment. Many mobile applications like social media platforms are not just mobile, but most users access these platforms using their mobile devices. Few platforms, like Instagram, are only offered via the mobile application. Social media companies themselves are at risk of breach of private company data, but users are also at risk of their information being breached or used in a dangerous way. In the terms of agreement, users do agree to having their activity monitored, but they do not consent to having their information taken to be targeted for false advertising or scams nor do most mobile application platforms allow their users' data to be used in a harmful way. In recent years targeted attacks on mobile application owners and stockholders have caused them to reevaluate the importance of cybersecurity and are making smarter cybersecurity investments. Companies are now monitoring the factors of cyberattacks to determine if investing in cybersecurity will lead to less damage and damage control costs (Walton et al., 2021). Social media companies and other mobile application companies that hold large amounts of personal data on their users provide them with tips and information on staying safe. They also provide two factor identification and other identification processes to verify
  • 9. 9 AROUND THE CLOCK SECURITY their users. They also follow a newly developed cybersecurity standard that updates their software to be OS compliant (Abbas et al., 2021). Mobile application companies that are taking early and more critical responses to cybersecurity attacks are protecting their users and protecting themselves by making cybersecurity investments that will save them from higher costs and more backlash in the long run. There are millions of applications, mobile and on computers, that are free and are used daily for most users. Essential applications may include mobile banking, social media, online shopping, and so on. Many of these require usernames and passwords to access. With new authentication technology like most recently in iPhone and Android, Face ID, it has become an extra step for personal accounts to have ensured confidentiality. Also periodically, applications will ask users to verify email addresses and phone numbers to make sure that the application has the most recent and updated information. This is to ensure that no unauthorized users have access and to ensure smooth interaction within the app. Even though many apps take these extra steps to ensure safety, some apps may seem friendly at face value that are intended to be used for a more malignant reason. “A lot more malware has been found in other, non-Google application stores. Tricking the user into installing the app by posing as a useful tool or game, the software then steals data from the phone and sends it out to unknown people with unknown motivations” (Six, 2012). Users longing for full customization over their personal devices has led to a large virus battle across multiple applications. Androids and Windows PCs typically have this issue more than Apple users due to limiting downloads from unverified stores and websites. There are many ways to be notified of attacks. An example of this is when your browser alerts the user with a caution page saying that the website or the application that is about to be accessed or downloaded is not trusted and will not allow the action to happen and gives the “return to safety,” option.
  • 10. 10 AROUND THE CLOCK SECURITY There have also been implementations of different applications that help with verifying applications to make sure that data is protected in the process. An example of this would be the Saint installer. “We implement Saint’s policy in a separate XML file with identical names to the package name… Immediately after the package is parsed, the Saint installer examines each requested permission against its corresponding permission-granting policy queried from the App Policy provider. If a conflict is found, the installer rejects the installation.” (Ongtang et al., 2011). Thus, the battle to stop hackers and secure personal data rages on. Environmental Scan Conclusion The emergence of the digital age has been the cause for everything to go online. Everyone's information, whether it be personal and public, has urged the issue of cybersecurity. With all the news, past and present, about the various ways hackers can access information that can cause catastrophic damage to potential victims lives and they can potentially never recover. This can include accessing bank information, credit and debit card numbers and pins, even passwords and social security numbers. With so much sensitive data at risk, there is going to be an everlasting need to prioritize protecting said data. Consumers must be wary of what and who they allow access to their information due to there are many websites, applications, and devices that may seem harmless but are constructed to give hackers access to sensitive information and so they can do whatever they please with it. With the countermeasures being taken in the current battle against hackers, there will only be more ways to bring hackers to a halt whilst protecting everyone's data. Methods Data Collection Methods The data collection method for this study featured an online questionnaire powered by FSU qualtrics. This was the easiest format in order to survey the most amount of FSU CCI
  • 11. 11 AROUND THE CLOCK SECURITY students without having to gather everyone at the same place at the same time. By having an online survey, the FSU CCI students were able to complete the survey while taking their time with no rush and in any location they desired. Not only is this convenient for the surveyors, but this allows a stress-free survey experience for the student completing the survey. Population and Sample The population consisted of the student population at Florida State University (FSU). We lowered the sample size tremendously by distributing our survey to the CCI major students. This decision was based on the content of the survey pertaining to use on the internet which is what that major is heavily influenced by. The sampling strategy used was convenience, having classmates and other students within the major taking it. With this, it is expected to reach at least half of the major students as we had most IT, and ICT majors. Recruitment Site and Strategy In order to have people respond to the survey, the best environment the group thought to post it in was classes that IT and ICT major students would be in. So, the group members pasted the qualtrics link in class Groupme, blackboard collaborate rooms and zoom rooms for the target demographic to respond to. If the link was posted in a class period, each group member made sure to ask the professor beforehand to ensure that it was acceptable to post. Other than that, the group shared the link through word of mouth. Analysis Sample Description (Demographics) The respondents had 60% males and 40% females complete the survey. 60% of the respondents were ICT majors, 20% were IT, and the remaining 20% belonged to other
  • 12. 12 AROUND THE CLOCK SECURITY majors. All of the respondents were between 20 and 22 years old. 60% of the respondents were seniors, 20% were juniors, and the remaining 20% answered as “other”. RQ #1: Content of RQ#1 In regards to RQ1, all of the FSU CCI students that responded to the survey reported using social media. Some of the respondents reported that they did not feel that social media sites were protecting their privacy. They reported feeling that because their information was being shared with 3rd party advertisers, it was not being effectively protected. One respondent felt that social media is effective at protecting privacy because the user is responsible for what they share. RQ #2: Content of RQ#2 As for RQ2, the respondents expressed the fact that they take extra precautions to protect themselves from potential danger online by using outside softwares like virtual private networks (VPNs). They feel that protection online is inadequate. They also reported that they monitor what they post on social media and also use different usernames and passwords for their various social media accounts so their privacy is ensured. All believe that the posing threat online seriously and take the precautions they deem necessary. RQ #3: Content of RQ#3 With RQ3, most respondents did not keep in mind the potential cybersecurity concerns because they usually only follow and interact with friends and family. They are dealing with people that they know personally and cordially so they feel no threat. Most would have their profile private to filter who views their content. With them taking these precautions, they feel that they are well protected. Figure 1
  • 13. 13 AROUND THE CLOCK SECURITY Note. The effect students feel social media has on privacy. Figure 2 Note. The number of hours students spend online outside of class per day. Discussion For RQ1, some students believe social media has a negative effect on privacy because of companies profiting from social media interactions and the fact that the information could be on the Internet permanently if not removed from the platform, while others believe there is no effect, meaning that it is neutral because the private information that is shared on social media is provided by the user willingly. At the moment, there are no positive responses about social media’s effect on privacy, which says something about how most people feel about how invasive social media is regarding privacy. For RQ2, some FSU student’s take
  • 14. 14 AROUND THE CLOCK SECURITY precautions against the potential danger of online hacking by using software that protects their data like NordVPN. They also monitor what they post on social media; those that feel that they could be at risk on social media limit what they post and protect their online account by using different passwords and identification. All take the threat of their online information being hacked seriously so they have different methods to protect themselves. This shows how some people are well aware of the risks that social media or any website pose to its users. For RQ3, most FSU CCI students on social media do not think of the potential cyber security concerns because they are only looking at people that they know. Most CCI students switch their social media accounts to private in order to attempt to control the people viewing their profiles, however hackers have multiple strategies to infiltrate a person's personal information. Another concern that many students do not understand is the amount of attempts per day hackers are taking on trusted websites such as amazon in order to steal as much information as possible. In another study the researchers found that the use of mobile devices in home and work settings can compromise mobile security (Jeske et al., 2015). As Figure 1 and Figure 2 show above, most students spend a lot of time on the Internet, but also feel that social media has a negative or neutral impact on privacy. These two studies show how dependent people are on the Internet and how the more often people use social media platforms and websites, the more susceptible they are to cyber attacks. The findings in this study show how aware people are of these risks and what they are doing to prevent them from happening. Limitations/Future Study The biggest limitations in the study was the sample size of the research project. With a survey, a large enough sample size is required to expand our conclusions to the population as a whole. Unfortunately, the sample size was not as large as it needed to be to extrapolate it to the general population we were studying. In addition to that limitation, the limit of
  • 15. 15 AROUND THE CLOCK SECURITY convenience sampling was also an issue. In general, convenience sampling is not sought after by researchers, as it has the possibility of skewing the data and not representing the population accurately. In a future study that uses these research questions and population, the biggest thing to focus on would be expanding the respondent pool. If there were more respondents to provide more data, the conclusion could be extrapolated to the population that was being studied. It would also be better to try to find a way around convenience sampling if this research project was repeated. This would provide more precise results in regards to the population in the research. Conclusion Over the course of this study and the completion of the survey, it was gathered that many students know that apps are not well-equipped with protecting themselves online as far as their personal data. Though they feel like they are protected since their content is moderated, there is the fact that companies themselves can distribute our data to be shared to 3rd party companies. To combat this, users will use trust services to further help keep their data concealed on various apps, devices, and websites so sensitive information will not be leaked and get into the wrong hands. This shows the distrust between users and these various forms of technology. Thus, users will continue to be their own form of around the clock security. Reflections Brian Kelly: Throughout this semester, I made it a point to learn about cybersecurity issues. I took a cybersecurity class, ran as an officer in the cybersecurity club, and did other cybersecurity related projects in other classes. Within those other clubs and classes, I learned so much about the threats cybersecurity professionals face, and good ways to counter these threats. This made the project a lot easier to handle. On top of that, in this class I learned more
  • 16. 16 AROUND THE CLOCK SECURITY about research methods, and furthered my understanding in different statistics methods like sampling, applying a conclusion to a population based on researching a sample of the population, amongst other things. I really enjoyed this class, as it has taught me a lot about data collection and how many different ways that data can be collected, analyzed and presented. The challenges I faced this semester were more personal, involving difficulties within my family. This amounted to unfortunately missing some assignments.. I managed those issues in private within my family and then finished the semester by not missing many more assignments. Other than those issues I faced challenges in regards to workload. At the start of the semester I started a new job with Florida Virtual School. They put me through a 25 hour training curriculum, and it was difficult at first to manage this, along with the coursework I was assigned. Once I finished the training and got accustomed to the workload of that job, I was able to better balance my school and work life so I could complete my coursework while also working at a satisfactory level. Marcus Brown: Throughout the semester, I can say that I learned a great deal overall. This project in specific has really helped me improve my researching abilities as a whole. I figured I was well-equipped in research, but ended up learning new sampling methods, analysis on qualitative and quantitative data, creating an environmental scan, and even distributing the survey we had to create for this class. Through all my years of being in school, this has been the most in depth research project that I have done, which makes sense why this was a group project also. The most challenging thing for me while doing this project was trying to grasp the concept of an environmental scan. It felt more like a literature review, but I learned that their different. Looking through the lecture notes and talking to other classmates, I was able to get a better understanding of it. Another interesting aspect of the project was trying to formulate research questions that wouldn’t sound redundant and actually get honest answers out of our
  • 17. 17 AROUND THE CLOCK SECURITY respondents. We came together and bounced ideas off each other to create good research questions. This project has really improved my cooperation and working in groups. Scheduling times to meet up and finish key parts in our projects and also working around my schedule outside of school was also a challenge but was able to do so. This class really has helped me better organize data and information entirely. With the introduction of Zotero, I can catalogue my sources and also other articles and information pieces in future studies. Jermanni Evans: I learned a great deal over the course of working on this project during the semester and about all the things that go into research. Even with prior experience working on a research project, I have never worked on something as in-depth as this research project. It was very interesting learning about the various aspects of research such as the different sampling methods, gaining more knowledge about qualitative analysis, developing an environmental scan, and how to create a research survey, which is something I had never done before. The main challenge of learning all of this new information along with stuff that I was already familiar with is the fact that it was still a lot to take in. For example, I had some experience with quantitative data in the past, so when it was time to work on the qualitative side of things, I had no idea how to go about it even when looking at the example in class. When it was time to take the quiz on quantitative and qualitative analysis, I was able to figure out how to code the themes for the qualitative portion of the quiz by looking at the example and realizing that even though it was a little tedious, it was not really that difficult. That was how I approached any issue or challenge that I had with the project or the class in general by looking back at the slides from the lectures along with the examples. It was nice getting to work on this project with my team throughout the semester and seeing everything come together.
  • 18. 18 AROUND THE CLOCK SECURITY Grace Bayliss: Throughout this semester I learned a ton about researching and analyzing data. Through the creation of this project I was able to gain valuable skills in not only data analysis but also in survey creation. I learned how to create thorough and concise research questions that are effective at providing us with the information we need. I also learned how to analyze and interpret given data sets. I improved my skills at excel spreadsheets as well. Conducting research through the execution of this project was a great learning experience. I feel that my understanding of creating and conducting a study as well as a survey has increased greatly. Prior to this class I had little understanding of what actually went into research studies, and now I feel that my understanding of how they work, as well as how to interpret the data from them, has improved greatly. There were many challenges that we faced with this project. We had to work around each other's schedules and split the work evenly. We also ran into some trouble when it came to creating effective research questions. At times there was also confusion with assignment instructions, especially when it came to the coding/themes assignment. Coming up with a good team name was also a bit of a struggle for the group. Overall I feel that we worked as a group to overcome any challenges that we were faced with. We asked questions when necessary and worked together to complete assignments to the best of our ability. Christian Caba: Over the course of the semester, we have been incrementally working towards this research project and overcoming any obstacle/confusion along the way. This was my first research project or any research in general that I have ever conducted therefore I learned a great deal from the creating an abstract, obtaining the data, and finalizing all of it with a conclusion/discussion of what we found. Although I learned everything about conducting and creating a research project this semester, one of the most difficult parts to me was building a survey centered around the research questions and making sure it answered all of the questions we needed to be answered when somebody completed the survey. Although
  • 19. 19 AROUND THE CLOCK SECURITY this was a difficult task, my group and I were able to each formulate our own set of questions and combine all of them to truly build a great survey which answered all of our research questions. As far as the rest of the project, every other aspect of it was about qualitative data analysis. Another obstacle along the road came from analyzing all of the data we received from everyone answering our survey we created. The only step that was difficult in this process was figuring out the categories/themes we would classify all of the data imputed by the surveyors. Once we figured that out, it was smooth sailing however extremely tedious as it was a lot of data to be analyzed. Overall, this was a great learning experience as I had no experience doing any research and we were really able to hit all the key points in creating a research project. Destiny Donald: Working on this assignment with my group helped me understand how to better organize data and information. I haven’t worked on a research project for this long or one that is so complex so there was a learning curve with most of the process but talking about the different concepts in class and the in class assignments assisted in working on the project. I learned about the different types of data before in previous classes but this class gave me a better understanding in how to phrase research questions based on the type and content of data we wanted to collect. Because we had to do an in depth overview of our research purpose, data collection methods and all other aspects of our project we understood exactly what we were studying and what we wanted to learn from our research. Also the questions were so thought out, specific, and organized so once we collected the data from our participants we were able to synthesize the information clearly. When we first started working on the project, it was a little difficult understanding some of the assignments and working within each other's busy schedule but after a couple of weeks we all got the hang of it and were able to work well together. We managed issues within the assignment by not being afraid to ask clarifying questions about any aspects of the project. Because we communicated with each other clearly
  • 20. 20 AROUND THE CLOCK SECURITY and divided the work evenly we were able to complete every assignment with little to no problem.
  • 21. 21 AROUND THE CLOCK SECURITY References Abbas, H., Amjad, M.F., Atiquzzaman, M., Hamdani, S.W., Janjua, A.R., Shahid, W.B., Malik, J., Murtaza, M. H., & Khan, A.W. (2021). Cybersecurity standards in the context of operating system. ACM Computing Surveys, 54(3), 1–36. https://doi.org/10.1145/3442480 Alsariera, Y. A., Elijah, A. V., & Balogun, A. O. (2020). Phishing website detection: Forest by penalizing attributes algorithm and its enhanced variations. Arabian Journal for Science and Engineering, 45(12), 10459-10470. https://doi.org/10.1007/s13369-020-04802-1 Blanco, S. (2021, September 4). Car hacking danger is likely closer than you think. Car and Driver. https://www.caranddriver.com/news/a37453835/car-hacking-danger-is-likely- closer-than-you-think/ Dery, L., & Jelnov, A. (2021). Privacy–accuracy consideration in devices that collect sensor- based information. Sensors, 21(14), 4684. https://doi-org./10.3390/s21144684 Jeske, D., Briggs, P., & Coventry, L. (2016). Exploring the relationship between impulsivity and decision-making on mobile devices. Personal and Ubiquitous Computing, 20(4), 545–557. https://doi.org/10.1007/s00779-016-0938-4 Jorquera Valero, J., Sánchez Sánchez, P., Fernández Maimó, L., Huertas Celdrán, A., Arjona Fernández, M., De Los Santos Vílchez, S., & Martínez Pérez, G. (2018). Improving the security and QOE in mobile devices through an intelligent and adaptive continuous authentication system. Sensors, 18(11), 3769. https://doi.org/10.3390/s18113769 Kemp, S. (2020, April 23). Digital around the world in April 2020. https://wearesocial.com/uk/blog/2020/04/digital-around-the-world-in- april-2020/
  • 22. 22 AROUND THE CLOCK SECURITY Kostyuk, N. (2014). International and domestic challenges to Comprehensive National Cybersecurity: A case study of the Czech Republic. Journal of Strategic Security, 7(1), 68–82. https://doi.org/10.5038/1944-0472.7.1.6 Ongtang, M., McLaughlin, S., Enck, W., & McDaniel, P. (2011). Semantically Rich Application-centric security in Android. Security and Communication Networks, 5(6), 658–673. https://doi.org/10.1002/sec.360 Serrano-Tellería, A. (2018). Users’ management of mobile devices and privacy. El Profesional de La Información, 27(4), 822-829. https://doi.org/10.3145/epi.2018.jul.11 Six, J. (2012). Application security for the Android platform. O'Reilly Online Learning. https://www.oreilly.com/library/view/application-security- for/9781449322250/ch01.html Terra, J. Why cyber security is important to you [especially in 2021]. (2019, November 18). Simplilearn.com. https://www.simplilearn.com/cybersecurity-and-you-article Walton, S., Wheeler, P. R., Zhang, Y. I., & Zhao, X. R. (2021). An integrative review and analysis of cybersecurity research: Current state and future directions. Journal of Information Systems, 35(1), 155-186. https://doi.org/10.2308/ISYS-19-033 Wilner, A. S. (2018). Cybersecurity and its discontents: Artificial intelligence, the Internet of Things, and digital misinformation. International Journal (Toronto), 73(2), 308–316. https://doi.org/10.1177/0020702018782496 Consent Form
  • 23. 23 AROUND THE CLOCK SECURITY In the table below, list what contributions each of the team members made to this assignment. Name Contribution Brian Kelly Document creation, problem statement, limitations Marcus Brown Research questions, population sample, conclusion Jermanni Evans Significance of study, references, visualizations, discussion Grace Bayliss Environmental Scan Christian Caba Analysis, data collection method Destiny Donald Abstract
  • 24. 24 AROUND THE CLOCK SECURITY Criteria Rating Abstract,Problem Statement, Significance, RQs: 11 points Appropriate abstract,problem statement, significance, and RQs (4 pts), in- text citations for all arguments (4 pts); revisions from research project report (3 pts) Environmental Scan: 10 points Appropriate intro, subsections, and conclusion (3 pts), in-text citations for all arguments (4 pts), revisions from research project report (3 pts) Methods: 9 points Finalized data collection method(s) (2pts), sampling technique(s) (2pts), and recruitment process (2 pts), revisions from research project report (3 pts) Analysis: 19 points Sample description (2 pts); complete QUAL and QUAN findings for each research question (8 pts); include data/stats/quotes, analysis, and relate findings to RQ answers (6 pts), visualizations (3 pts) Discussion: 18 points Summarize findings for all RQs (3 pts), provide interpretations/discussions for all RQs (12 pts), comparison/contrast with previous studies and citation needed (3 pts) Limitations/Future Studies: 6 points Limitations (include generalizability issues discussion) (3 pts), future studies (3 pts) Conclusion: 5 points Restate and highlight core findings (5 pts) Reflection: 10 points (Individual) 1)
  • 25. 25 AROUND THE CLOCK SECURITY Reflection by team members (10 pts each) 2) 3) 4) 5) 6) File Name, APA Style, Consent Form: 12 points File name (1 pt), proper citations and references (8 pts),match between reference list and citations, (2 pts), consent form (1 pt)