• Tidak ada hasil yang ditemukan

HEW CHI WEI

N/A
N/A
Nguyễn Gia Hào

Academic year: 2023

Membagikan "HEW CHI WEI"

Copied!
135
0
0

Teks penuh

INTRODUCTION

  • Problem Statement and Motivation
  • Objectives
  • Project Scope and Direction
  • Impact, Significance, and Contribution
  • Report Organization

2 Therefore, exploring the personality traits and cyber hygiene behaviors among university students should be encouraged and carried out. Besides that, explore the personality traits and cyber hygiene behavior among university students is significant. They can play an important role in protecting and maintaining their devices and networks if college students understand basic cyber hygiene practices.

Different personality traits can have big differences on either good or bad cyber hygiene behaviour. The purpose of this project is to explore personality traits and cyber hygiene behaviors among university students. The main result of this project is to test the different types of personality traits of each student and different types of cyber hygiene behavior and knowledge.

A study to investigate personality traits and cyber hygiene behaviors among university students can provide students with a good understanding of following cyber security best practices. In addition, this study will also show the relationship between their personality and their cyber hygiene behavior.

LITERATURE REVIEW

An exploratory study of cyber hygiene behaviours and knowledge

Correlating Human Traits and Cybersecurity Behaviour Intentions

Taking Risks with Cybersecurity: Using Knowledge and Personal Characteristics to

Towards Determining the Effect of Age and Educational Level on Cyber- Hygiene

Literature Review Summary Table

SYSTEM MODEL

Chapter Description

Design Specification

  • Agreeableness
  • Conscientiousness
  • Neuroticism
  • Openness
  • Extraversion

Research Design

Data Collection Method

  • Primary Data
  • Secondary Data

Sampling Design

Questionnaire Design

  • Adaptation of Questionnaire from Published Research

Measuring Scale

  • Nominal Scale
  • Ordinal Scale
  • Likert Scale

Sample Item of Questionnaire

Data Analysis

  • Scale Measurement (survey reliability)

Conclusion

RESULTS

Result and Analyzes for Total 100 Respondents

  • Descriptive Analysis
  • Reliability Test
  • Pearson Correlation
  • Multiple Linear Regression

The R-value between due diligence with software security is 0.444 while the R-value between due diligence with email security is 0.447. From the result, the R-value between neuroticism and software security is 0.254 and the p-value is 0.011. The R-value between neuroticism with email security is 0.329, while the R-value between neuroticism with data management practices is 0.342.

The R-value between extraversion and software security is 0.400, and the R-value between extraversion and email security is 0.494. In addition, the significant p value of openness obtained is 0.001, which means it is lower than the significant level of 0.05. In addition, a significant conscientiousness p value of 0.048 is obtained, which means it is lower than the significant level of 0.05.

This is because the result shows that the β value of pleasantness is -0.144 which is the smallest value. However, the significant value of extraversion is 0.101 which represents that it is greater than the significant level of 0.05. Based on the table above, the β value of pleasantness is 0.089 and the significant value of pleasantness is 0.506 which is greater than the significant level of 0.05.

This is because the β value of neuroticism is 0.075 which is the fourth highest in the result. 42 significant value of openness obtained p value which is 0.050 which means that it is equal to the significant level of 0.05. Unfortunately, the significant value of conscientiousness is 0.201 which represents that it is greater than the significant level of 0.05.

Based on the table above, the β value of neuroticism is 0.126 and the characteristic value of neuroticism is 0.141, which is more than the significant level of 0.05. This is because the β value of acceptance is 0.046, which is the fourth highest value in the result. In addition, the characteristic value of extraversion is 0.910, which means it is higher than the significant level of 0.05.

Table 4.1.1.2: Frequency table for age
Table 4.1.1.2: Frequency table for age

Result and Analyzes for Total 150 Respondents

  • Descriptive Analysis
  • Reliability Test
  • Pearson Correlation
  • Multiple Linear Regression

CONCLUSION

Introduction

This chapter discusses the final result of this research paper, discussion of hypothesis testing, limitations and recommendations. Furthermore, Chapter 5 will focus on the limitations of this study and recommendations for future research. The main purpose of this research paper is to identify different types of personality traits of a college student on cyber hygiene behavior.

Discussion of Hypothesis Test

  • Hypothesis for agreeableness as independent variable, software security,
  • Hypothesis for openness as independent variable, software security, email
  • Hypothesis for extraversion as independent variable, software security,

According to Pearson's correlation coefficient analysis, agreeableness has a significant relationship with software security, email security and data management practices. This is because all the p-values ​​between acceptable software security, email security and data management practices are <0.001, which is lower than the significant level of 0.01 or 0.05. However, the result of multiple regression analysis shows that the significant value between acceptable software security, email security and data management practices is and 0.811, which is greater than the significant level of 0.05.

Therefore, pleasantness is not significant for software security, email security, and data management practices, even though the significant value is <0.001 in Pearson correlation analysis. A study of [8] related to the result of this study stating that friendliness is not important for software security, email security and data management practices. Aside from that, rigor has a significant relationship with software security, email security, and data management practices in the Pearson correlation coefficient analysis.

This is because all the p-values ​​between software security due diligence, email security, and data management practices are <0.001, which is below the significant level of 0.01 or 0.05. In addition, according to Pearson's analysis of correlation coefficients, neuroticism has a significant relationship with software security, email security, and data management practices. This is because all the p-values ​​between software security neuroticism, email security, and data management practices are <0.001, which is below the significant level of 0.01 or 0.05.

The correlation value between neuroticism with software security, email security and data management practices is which means that all are moderately correlated and positively significant. Beyond that, openness has a significant relationship with software security, email security, and data management practices. This is because all the p-values ​​between openness with software security, email security and data management practices are <0.001, which is lower than the significant level of 0.01 or 0.05.

According to the result of multiple regression analysis shows the significant value between openness with software security, email security and data management practices is and 0.050 which is lower than and equal to the significant level of 0.05. So it can be concluded that openness is significant for software security, email security and data management practices as the significant value is lower than the significant level of 0.05. The correlation value between extraversion with software security, email security and data management practices is which means that all are moderately correlated and positively significant.

Recommendation for Future Study

Thus, the data set should be removed when a value is missing or an illogical response. Furthermore, there is a correlation value shown in the Pearson Correlation analysis which is less than 0.4, this value is from the variables of acceptability and data management practices. In other words, the strength of this correlation relationship is weak which means that there is minimal influence of the independent variable affecting the dependent variable.

Conclusion

Bachelor of Information Systems Engineering (honours) Business Information Systems Faculty of Information and Communication Technology (Kampar campus), UTAR. I am a final year undergraduate studying Bachelor of Information Systems (HONS) Business Information Systems at Universiti Tunku Abdul Rahman (UTAR) Kampar, Perak. If you have any questions about the content of the questionnaire, please contact Hew Chi Wei at ([email protected]).

I did the planning in the first week because next week is the Chinese New Year holiday. It is a bit challenging to collect data because the target sample size is 150 and I have to collect 150 respondents myself. My progress is going smoothly in this current situation, but I need to start the joint survey to collect 150 respondents as my target sample size.

The SPSS account is a free trial for a month and I may have to find another way to get a free trial after a month. Progress is a bit slow as I wanted to collect more of the completed questionnaire. I need to learn how to do data analysis by using SPSS software by myself through YouTube and Google as it is my first time using SPSS software.

The process is going smoothly for the moment, it's just waiting for the questionnaire to be completed by the respondents so I can continue to run the data. There are few analyzes to be tested with SPSS and there are some results I don't understand the meaning of. Therefore, I need help from the Internet so that I can gain a better understanding of the method for explaining the results analysis.

There are some meanings in the analysis results that I cannot understand, so I need to read several articles and online sources about the test to interpret the results correctly. The content of the presentation is too big to present all content in 15 minutes, so I need to summarize and highlight the important content to share with my supervisor and moderator. Note Supervisor/candidate(s) are required to deliver a soft copy of the full set of the originality report to the faculty/department.

Based on the above results, I hereby declare that I am satisfied with the originality of the Final Year Project Report submitted by my student(s) as mentioned above. Form title: Supervisor's comments on originality report generated by Turnitin for submission of final year project report (for undergraduate programs).

Gambar

Table 2.5: Summary of Literature Review
Figure 3.1 presents the research model of this study. The model was created based on  the  Five-Factor  model,  also  called  as  the  “Big  Five”  personality  traits  and  cyber  hygiene  behavior
Table 3.5.1.1: Summary of Questionnaire Adaptation
Table 3.7.1: Sample Item for Reliability Test
+7

Referensi

Dokumen terkait

Bachelor of Information Systems Honours Business Information Systems Faculty of Information and Communication Technology Kampar Campus, UTAR 6 • To study the factor and effect of

27 Bachelor of Information Systems Honours Business Information Systems Faculty of Information and Communication Technology Kampar Campus, UTAR Use case Add Plant Purpose To

Bachelor of Information Systems Honours Information Systems Engineering Faculty of Information and Communication Technology Kampar Campus, UTAR xiii LIST OF TABLES Table Number

Bachelor of Information Systems Honours Information Systems Engineering Faculty of Information and Communication Technology Kampar Campus, UTAR 28 Table 3.3.7 Add Product Attribute

Bachelor of Information Systems Honours Information Systems Engineering Faculty of Information and Communication Technology Kampar Campus, UTAR xiii LIST OF TABLES Table Number

CHAPTER 2 LITERATURE REVIEW 14 Bachelor of Information Systems Honours Business Information Systems Faculty of Information and Communication Technology Kampar Campus, UTAR 2-2

Bachelor of Information Systems Honours Information Systems Engineering Faculty of Information and Communication Technology Kampar Campus, UTAR 14 Main Functions and Features of the

Bachelor of Information Systems Honours Business Information Systems Faculty of Information and Communication Technology Kampar Campus, UTAR vii TITLE PAGE i REPORT STATUS