[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Nyblom et al., 2020 - Google Patents

The Root Causes of Compromised Accounts at the University.

Nyblom et al., 2020

View PDF
Document ID
4717438036221427504
Author
Nyblom P
Wangen G
Kianpour M
Østby G
Publication year
Publication venue
ICISSP

External Links

Snippet

Compromised usernames and passwords are a continuous problem that several organizations struggle with even though this is a known problem with known solutions. Passwords remain a problem for the modern University as it struggles to balance the goals …
Continue reading at pdfs.semanticscholar.org (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Kokulu et al. Matched and mismatched SOCs: A qualitative study on security operations center issues
Flores et al. Shaping intention to resist social engineering through transformational leadership, information security culture and awareness
Crossler et al. The quest for complete security: An empirical analysis of users’ multi-layered protection from security threats
Hove et al. Information security incident management: identified practice in large organizations
Schinagl et al. A framework for designing a security operations centre (SOC)
Greitzer et al. Psychosocial modeling of insider threat risk based on behavioral and word use analysis
Nyblom et al. The Root Causes of Compromised Accounts at the University.
Sharma et al. Effectiveness of ISO 27001, as an information security management system: an analytical study of financial aspects
Choong et al. United States federal employees' password management behaviors: A Department of Commerce case study
Wright et al. PHISHING SUSCEPTIBILITY IN CONTEXT: A MULTILEVEL INFORMATION PROCESSING PERSPECTIVE ON DECEPTION DETECTION.
Consolvo et al. " Why wouldn't someone think of democracy as a target?": Security practices & challenges of people involved with {US}. political campaigns
Kirlappos Learning from" shadow security": understanding non-compliant behaviours to improve information security management
White Impact of protection motivation theory and general deterrence theory on the behavioral intention to implement and misuse active cyber defense
Hellesen et al. Empirical case studies of the root-cause analysis method in information security
Maahs Managerial strategies small businesses use to prevent cybercrime
Rightley et al. Revisiting the Computer Crime Index-Revised (CCI-R): Assessing Individual Differences and Cyber-deviant Behavior Two Decades Later
Amer et al. The impact of cyber security on preventing and mitigating electronic crimes in the Jordanian banking sector
Chrun Model-based support for information technology security decision making
Cornelius Online identity theft victimization: An assessment of victims and non-victims level of cyber security knowledge
Kim et al. A study on the impact analysis of security flaws between security controls: An empirical analysis of K-ISMS using case-control study
Bhattacharya Leadership styles and information security in small businesses: An empirical investigation
Rafaiani et al. A functional approach to cyber risk assessment
McLaughlin et al. Infosec research in prominent IS journals: Findings and implications for the CIO and Board of Directors
Kostic Information security awareness techniques that reduce data breaches caused by social engineering attacks
Madison Challenges with funding of information security projects per threat perceptions: A qualitative case study