Privacy, Trust and Security in Information Systems

Read attached word doc with instructions for the paper. The article you must use for the cw is:https://www.wired.co.uk/article/zero-trust-a-quick-guide-to-upping-your-cybersecurity-game I have attached below some of the references that you need to use. I have also given screen shots of extra sources you should refer to. 1 Jagatic, Tom & Johnson, Nathaniel & Jakobsson, Markus & Menczer, Filippo. (2007). Social phishing. Commun. ACM. 50. 94-100. 3Davis, C. and Ganesan, R. BApasswd: A new proactive passwordchecker. In Proceedings of the National Computer Security Conference 93,the 16th NIST/NSA conference. 1993, 115. DeAlvare, A.M. A framework for password selection. In Proceedings ofUnix Security Workshop II. (Portland, Aug. 2930, 1998) 2 Adams, Anne & Sasse, Angela. (1999). Users Are Not the Enemy. Commun. ACM. 42. 40-46 Gartner Inc. Gartner study nds signicant increase in e-mail phishing attacks.http://www.gartner.com/5 about/press releases/asset 71087 11.jsp, April 2004. Jagatic, Tom & Johnson, Nathaniel & Jakobsson, Markus & Menczer, Filippo. (2007). Social phishing. Commun. ACM. 50. 94-100. Simson Garnkel and Robert Miller. Johnny 2: A user test of key continuity manage-ment with s/mime and outlook express. Presented at the Symposium on Usable Privacyand Security (SOUPS 2005), July 6-8, 2005, Pittsburgh, PA 7 Neil Chou, Robert Ledesma, Yuka Teraguchi, Dan Boneh, and John C. Mitchell. Client-side defense against web-based identity theft. In Proc. 11th Annual Network and Dis-tributed System Security Symposium (NDSS 04), February 2004. 92, 2,10. Amir Herzberg. Trustbar: Re-establishing trust in the web.http://www.cs.biu.ac.il/herzbea/TrustBar/index.html. MITRE Corporation, MITRE True Story Series, https://www.mitre.org/work/ cybersecurity.html 136 Moving from a ‘human-as-problem’ to a ‘human-as-solution’ cybersecurity mindset Verena Zimmermann Karen Renaud https://rke.abertay.ac.uk/ws/portalfiles/portal/15927807/Renaud_Moving_from_a_Human_Accepted_2019.pdf Blythe, J. M., Gray, A., & Collins, E. (2020, July). Human Cyber Risk Management by Security Awareness Professionals: Carrots or Sticks to Drive Behaviour Change?. In International Conference on Human-Computer Interaction(pp. 76-91). Springer, Cham Organizations’ Information Security Policy Compliance: Stick or Carrot Approach? Yan Chen , K. Ramamurthy & Kuang-Wei Wen (p179)

Use the order calculator below and get started! Contact our live support team for any assistance or inquiry.

[order_calculator]