Extended TAM Research Problem.

Section 1.  Research Problem, Significance, Question(s), Title


 Research Study
State the research problem your study will investigate, including its background. See Instructions.

Significant developments in understanding information technology (IT) security measures in information systems has been in existence for decades (Kim, Tao, Shin, & Kim, 2010; Liang & Xue, 2010). Despite an increased investment in technology aimed at increasing system security whose lack is the main problem being addressed, striking failures that constitute much of the problem exist. Susing information systems withinin leading organizations like HP is one of such failures. The same issue exists in mobile technology (Subashini & Kavitha, 2011; Weber, 2010). Concern on the issue has increased especially in the digital age (Bélanger & Crossler, 2011). Nevertheless, increased investment in security has not contributed much in stopping security breaches as seen in previous studies and surveys (Subashini & Kavitha, 2011). Consequently, the problem to be addressed entails the ability to adopt information security systems’ measures as an aspect of end-user behavior when using an information security system. Armerding (2012) indicates that incidence and severity of data breaches are related to size of organization and industry, with large organizations and those operating in the financial sector most affected. Human factors pose the greatest threat to security issues, which is typically a major challenge to organizations since human conduct contributes to most system vulnerabilities as well as security breaches (Chiu, Lin, & Tang, 2005; Jones, McCarthy, & Halawi, 2010). This aspect raises great security concerns (Alice, 2010; D’Arcy, Hovav, & Galletta, 2009; PEW, 2013).

Bélanger and Crossler (2011) have conducted a study on security issues focusing on the digital age and indicated that information systems have a significant weakness. It has been difficult to determine whether participants provide the desirable answers expected of them or not with self-reported data. A major problem could be in adhering to information security policies as studied by Bulgurcu, Cavusoglu, and Benbasat (2010). Jones et al. (2010) intended to determine the mode of conducting study and its coverage in developing the sampling procedures. Similarly, no insights or empirical studies on employee adoption of information systems security measures based on specific industries, with studies assuming that adoption is similar across all sectors (Chuttur, 2009; Jones et al., 2010).

Get Professional Assignment Help Cheaply

fast coursework help

Are you busy and do not have time to handle your assignment? Are you scared that your paper will not make the grade? Do you have responsibilities that may hinder you from turning in your assignment on time? Are you tired and can barely handle your assignment? Are your grades inconsistent?

Whichever your reason may is, it is valid! You can get professional academic help from our service at affordable rates. We have a team of professional academic writers who can handle all your assignments.

Our essay writers are graduates with diplomas, bachelor's, masters, Ph.D., and doctorate degrees in various subjects. The minimum requirement to be an essay writer with our essay writing service is to have a college diploma. When assigning your order, we match the paper subject with the area of specialization of the writer.

Why Choose Our Academic Writing Service?

  • Plagiarism free papers
  • Timely delivery
  • Any deadline
  • Skilled, Experienced Native English Writers
  • Subject-relevant academic writer
  • Adherence to paper instructions
  • Ability to tackle bulk assignments
  • Reasonable prices
  • 24/7 Customer Support
  • Get superb grades consistently

How It Works

1.      Place an order

You fill all the paper instructions in the order form. Make sure you include all the helpful materials so that our academic writers can deliver the perfect paper. It will also help to eliminate unnecessary revisions.

2.      Pay for the order

Proceed to pay for the paper so that it can be assigned to one of our expert academic writers. The paper subject is matched with the writer’s area of specialization.

3.      Track the progress

You communicate with the writer and know about the progress of the paper. The client can ask the writer for drafts of the paper. The client can upload extra material and include additional instructions from the lecturer. Receive a paper.

4.      Download the paper

The paper is sent to your email and uploaded to your personal account. You also get a plagiarism report attached to your paper.



order custom essay paper

Leave a comment

Your email address will not be published. Required fields are marked *