Professional Documents
Culture Documents
Phase 2 Abdirahman Ismail BAS-490 Professor Calvin 10/30/2023
Phase 2 Abdirahman Ismail BAS-490 Professor Calvin 10/30/2023
Abdirahman Ismail
BAS–490
Professor Calvin
10/30/2023
Methodology
Participants
People who are likely to be targeted by phishing attempts are the ones who will participate in this
study. Participant selection will include looking for people who meet the following criteria: are
at least 18 years old; have familiarity with online activities (such as email, social media, or
online banking); and are willing to take part in the research. In order to get a full picture of how
well multi-factor authentication (MFA) works in different user scenarios, we'll be recruiting
people from a wide variety of ages, gender identities, educational backgrounds, and degrees of
online experience. The participants for this research will be selected based on specific criteria to
ensure that they represent a diverse and relevant sample. Inclusion criteria include:
I. Age
Participants must be 18 years or older, as this age group is more likely to have significant online
activity.
Participants should have a history of using online platforms, including email, social media,
III. Consent
Participants are required to provide informed permission in order to take part in the research. The
will be selected to represent a wide variety of ages, sexes, educational attainment levels, and
professional fields in order to provide a representative sample. This variety is essential for testing
the efficacy of MFA in a wide range of user scenarios (Sun et al., 2023).
Study Design
Mixed-methods research, which incorporates both qualitative and quantitative approaches, will
be used in this investigation. The research will include two parts: a preliminary survey and a
subsequent interview (Gerholz et al., 2020). Mixed-methods research, including qualitative and
a) Survey Phase
During this stage, a quantitative methodology will be used to gather data from a substantial
number of individuals. This survey aims to gather valuable information into participants'
experiences, opinions, and actions pertaining to online security and MFA (Zhang & Cai, 2018).
b) Interview Phase
After conducting the survey, a specific group of participants will be chosen for further
interviews. The objective of this qualitative method is to get a more profound comprehension of
the intricacies of MFA use and its influence on users' perceptions of security.
c) Procedure-Recruitment
Recruitment of participants will be conducted via many online channels, such as social media
platforms, forums, and cybersecurity groups. Recruitment ads will provide comprehensive
information on the study's objectives and prerequisites. Prior to enrolling in the research,
informed consent forms will be sent to interested participants, who will also be given the chance
During the survey phase of this study, we will use an online survey as our main approach for
collecting data. The survey instrument will be meticulously crafted to gather a diverse array of
information that is pertinent to the study's aims. The following information provides an
I. Survey Phase
In the survey phase of this research, we will employ an online survey as our primary data
collection method. The survey instrument will be carefully designed to capture a wide range of
information relevant to the study's objectives. The following details outline this phase:
I. Survey Design
The survey will have a blend of closed-ended and open-ended questions. Closed-ended
questions facilitate the collection of quantitative data, enabling the acquisition of organized
replies that may be readily examined. The questions will cover many areas, including online
conduct, frequency of online activity, encounters with phishing assaults, and knowledge of
The survey will be conducted using proven online survey platforms that provide a user-friendly
interface for participants to complete the questionnaire. These platforms not only simplify the
process of collecting data but also guarantee the security and confidentiality of participants'
aspect of their involvement, and data confidentiality. Prior to proceeding with the survey, each
The survey will be available for a defined duration, usually lasting several weeks, in order to
The interview phase is a crucial component of this research, designed to provide deeper insights
Sampling Strategy
We will use a purposive sample technique to choose the interview participants. This
experiences that are in line with the aims of the research. Participants will be selected based on
Interview Protocol
and other interviewing aids will be crafted into a comprehensive process. Questions will range
communication while allowing interviewees to remain in their own homes or offices if they like.
Participants may respond to inquiries and give answers in more depth thanks to the adaptability
of video conferencing.
Informed Consent
Prior to the interview, participants will be provided with informed consent information,
including details about the interview process, data usage, and their rights as research subjects.
Consent will be obtained from each participant before the interview commences.
Data Analysis
I. Survey Data
Quantitative data from the survey will be analyzed using statistical software. Descriptive
statistics and inferential statistics (e.g., regression analysis) will be used to identify patterns and
Qualitative data from the interviews will be transcribed and subjected to thematic analysis.
Themes and patterns related to participants' experiences and perceptions of MFA will be
identified.
Ethical Considerations
a) Informed Consent
Prior to participation in the research, all individuals will be required to give informed
permission. The participants will get detailed information on the study's objectives, methods of
b) Anonymity
Participants' identities will be protected, and data will be anonymized to ensure confidentiality.
c) Privacy
The gathered data will be kept securely and will only be available to the study team.
d) Voluntary Participation
It will be made clear to participants that they are free to withdraw from participation in the study
at any point and will not be subject to any penalties as a result of doing so.
Measures
I. Survey
The survey will have a combination of closed-ended and open-ended questions. The close-
ended questions will address subjects such as online conduct, use of MFA, and encounters with
II. Interviews
methodology. Typical questions may include asking about particular instances of phishing, the
methods participants use for multi-factor authentication (MFA), and their opinions on the
III. Limitations
Possible constraints include the dependence on data given by individuals themselves, the extent
to which the sample accurately represents the population, and the possibility for bias resulting
Reference:
Ali, G., Dida, M. A., & Elikana Sam, A. (2021, November 25). A Secure and Efficient Multi-
Factor Authentication Algorithm for Mobile Money Applications. Future Internet,
13(12), 299. https://doi.org/10.3390/fi13120299
Ashibani, Y., & Mahmoud, Q. H. (2020). A Multi-Feature User Authentication Model Based on
Mobile App Interactions. IEEE Access, 8, 96322–96339.
https://doi.org/10.1109/access.2020.2996233
Ometov, A., Bezzateev, S., Mäkitalo, N., Andreev, S., Mikkonen, T., & Koucheryavy, Y. (2018,
January 5). Multi-Factor Authentication: A Survey. Cryptography, 2(1), 1.
https://doi.org/10.3390/cryptography2010001
Purkait, S. (2012, November 23). Phishing counter measures and their effectiveness – literature
review. Information Management & Computer Security, 20(5), 382–420.
https://doi.org/10.1108/09685221211286548
Sajjad, M., Khan, S., Hussain, T., Muhammad, K., Sangaiah, A. K., Castiglione, A., Esposito, C.,
& Baik, S. W. (2019, September). CNN-based anti-spoofing two-tier multi-factor
authentication system. Pattern Recognition Letters, 126, 123–131.
https://doi.org/10.1016/j.patrec.2018.02.015
Sajjad, M., Khan, S., Hussain, T., Muhammad, K., Sangaiah, A. K., Castiglione, A., Esposito, C.,
& Baik, S. W. (2019, September). CNN-based anti-spoofing two-tier multi-factor
authentication system. Pattern Recognition Letters, 126, 123–131.
https://doi.org/10.1016/j.patrec.2018.02.015
Sun, J., Lenz, D., Yu, H., & Peterka, T. (2023, October 10). MFA-DVR: direct volume rendering
of MFA models. Journal of Visualization. https://doi.org/10.1007/s12650-023-00946-y
Gerholz, K. H., Ciolek, S., & Wagner, A. C. (2020, September 30). Digital design of design
processes – A case study of a design research study in vocational education. EDeR.
Educational Design Research, 4(1). https://doi.org/10.15460/eder.4.1.1452
Zhang, X., & Cai, W. (2018, October 6). BDS four frequency carrier phase combination models
and their characteristics. Survey Review, 52(371), 97–106.
https://doi.org/10.1080/00396265.2018.1527088
Hwang, S., Nam, T., & Ha, H. (2021, July 3). From evidence-based policy making to data-driven
administration: proposing the data vs. value framework. International Review of Public
Administration, 26(3), 291–307. https://doi.org/10.1080/12294659.2021.1974176
Cassidy, J., & Manor, I. (2016, May 26). Crafting strategic MFA communication policies during
times of political crisis: a note to MFA policy makers. Global Affairs, 2(3), 331–343.
https://doi.org/10.1080/23340460.2016.1239377