Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

hey need writer from order 62922 as there expertise is the best and trust them please message me if anything is needed as I'm not too aware of the task and what reading you need so please tell me what...

1 answer below »


hey need writer from order 62922 as there expertise is the best and trust them please message me if anything is needed as I'm not too aware of the task and what reading you need so please tell me what you pick and if you need me to get you will send lecture video if needed please read below

Seminal article critique based on an article of student's choice relevant to a topic from the course to be completed by all students.


On successful completion you will be able to:

  • Integrate and analyse relevant theoretical and case-based literature to present a sustained, coherent and logical consideration to cybercrime and cyber security
  • Demonstrate a comprehensive understanding of the key procedures and practices relevant to the management of cyber security risks and countermeasures.
  • Critique and evaluate key security vulnerabilities of data storage infrastructure.
  • Apply advanced cyber hygiene practices to improve both personal and professional security
Answered Same Day Aug 10, 2021 PICT3011 Macquaire University

Solution

Dilpreet answered on Aug 25 2021
140 Votes
JOURNAL ARTICLE CRITIQUE
Table of Contents
Introduction    3
Article Critique    3
Conclusion    5
References    6
Contributing factors to increased susceptibility to social media phishing attacks
Introduction
This peer reviewed article written by Parkerand Flowerday (2020), systematically reviews literary sources to determine the factors that may cause certain individuals to be more susceptible to phishing attacks on social media than others. There is no doubt about the fact that the security of social media users is at stake with increased usage of these platforms. Therefore, social media users have been facing several phishing scams. This article by Parkerand Flowerday (2020), aims to describe the factors that have been contributing to an increased susceptibility to social media phishing attacks. The article shall further describe a model that can be used for the purpose of reducing this susceptibility. The article also sheds light on the characteristics of individuals, who are more vulnerable to phishing attacks on social media platforms. The authors of the article have made use of the post-positivist paradigm to conduct a literature review. The literature review that has been conducted by the authors in this particular article makes use of argumentation theory to come up with a balanced and reasoned argument.
Article Critique
The tone and structure of the article makes this article clear and comprehensive and purpose of writing this article has been organised logically. The content presented through this article is relevant and coherent. The communication style followed by the author seems to be suitable for this article. The author has managed to include some quality content form authentic sources into the article, which has made the article informative and legitimate. Through this article the author has provided a clear and concise definition of phishing, which will help the beginners to know about it. Speaking in general terms, phishing can be defined as a form of online identity theft, which is done with a purpose of stealing the valuable and sensitive information of the users such as their passwords, their credit card or their bank account details (Gupta, Singhal & Kapoor, 2016). The authors of the article have further managed to define the social...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here