This course has covered a wide variety of topics and issues within the field of information security. Your focus thus far has been on how you may incorporate what you have learned into your DIT research. However, it is important to consider how the knowledge you have developed will not only impact your research but also your future as you follow a career path within information systems and security. What is the relevance of information security in the world of business and government? How can you improve your ability to deliver an effective security awareness message that not only informs its audience but ultimately results in real changes in human behavior?
In addition, this week’s resources on risk homeostasis may have led to additional questions. Risk homeostasis cautions that the development of security awareness programs may not be as simple and straightforward as first thought. Humans often take advantage of additional security and safety mechanisms to engage in more risky behavior, thus nullifying many of the anticipated security improvements. Should your newly developed understanding of risk homeostasis impact how you conceive and design security awareness programs?
WE WRITE PAPERS FOR STUDENTS
Tell us about your assignment and we will find the best writer for your project.
Write My Essay For MeFor this assignment, you will reflect on the articles, presentations, and Discussions from the last 8 weeks, and you will consider how the knowledge you have developed in these topics will impact your upcoming research and your future career.
Submit a 2- to 3-page Reflection on this course. Divide your paper into the bold-faced sections listed below, and answer the set of questions listed for that section.
Seminar Content
Does the research and content presented in this course inform or relate to your individual doctoral study?
What research methods or strategic-analysis approaches might be useful in answering the questions that you have posed?
Describe these methods and/or approaches and justify their usefulness.
Research Design
Consider the articles that you have read, and evaluate how the methods of data collection, research statistics employed, and overall research designs have enlightened your individual approach to research.
Is there anything about your approach to your individual research that the literature in this seminar has reinforced or confirmed? Explain your response.
Were you exposed to any new sources of data that will be useful in your doctoral study? Explain your response.
Reflection on Your Professional Ethics
Based on your review of the articles and readings for this course, provide an analysis of privacy and ethical considerations with respect to information security. What do you believe are the critical ethical issues that information security professionals face in maintaining and updating personal information of clients, customers, and employees? What tools and techniques are available to you as a CISO to provide limited, appropriate access to legitimate organization personnel? How will ethical considerations impact your further development as an information security professional?
Reflection on Risk Homeostasis
Based on this week’s articles, can you recall situations where risk homeostasis has affected your behavior? If so, describe these situations and how you believe your behavior was affected. Based on what you now know concerning risk homeostasis, will you modify your own behavior with respect to information security? How would you factor risk homeostasis into your development of future Security Education Training and Awareness programs? Justify your responses.
SAMPLE SOLUTION
Assignment Reflection
Does the research and content presented in this course inform or relate to your doctoral study? The research and content presented in this course relate to my doctoral study. First, this course has informed me that a good study should be grounded in good literature research and personal experience. Therefore, I have come to appreciate the wide learning and research presented in this course to shape my career path and explore further research and studies within information systems and security. For instance, throughout this course, we learned that risk homeostasis caution facilitates the development of security awareness programs, which seems simple and straightforward. However, the course shows that people tend to engage in risk behavior that requires upgrade or improvement with the additional security and safety measures. Therefore, this creates a new niche of research to assess whether the solution presented to the problems is justifiable and how to assess a new niche in the research…