Nyblom et al., 2020 - Google Patents
The Root Causes of Compromised Accounts at the University.Nyblom et al., 2020
View PDF- Document ID
- 4717438036221427504
- Author
- Nyblom P
- Wangen G
- Kianpour M
- Østby G
- Publication year
- Publication venue
- ICISSP
External Links
Snippet
Compromised usernames and passwords are a continuous problem that several organizations struggle with even though this is a known problem with known solutions. Passwords remain a problem for the modern University as it struggles to balance the goals …
- 230000001010 compromised 0 title abstract description 42
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kokulu et al. | Matched and mismatched SOCs: A qualitative study on security operations center issues | |
Flores et al. | Shaping intention to resist social engineering through transformational leadership, information security culture and awareness | |
Crossler et al. | The quest for complete security: An empirical analysis of users’ multi-layered protection from security threats | |
Hove et al. | Information security incident management: identified practice in large organizations | |
Schinagl et al. | A framework for designing a security operations centre (SOC) | |
Greitzer et al. | Psychosocial modeling of insider threat risk based on behavioral and word use analysis | |
Nyblom et al. | The Root Causes of Compromised Accounts at the University. | |
Sharma et al. | Effectiveness of ISO 27001, as an information security management system: an analytical study of financial aspects | |
Choong et al. | United States federal employees' password management behaviors: A Department of Commerce case study | |
Wright et al. | PHISHING SUSCEPTIBILITY IN CONTEXT: A MULTILEVEL INFORMATION PROCESSING PERSPECTIVE ON DECEPTION DETECTION. | |
Consolvo et al. | " Why wouldn't someone think of democracy as a target?": Security practices & challenges of people involved with {US}. political campaigns | |
Kirlappos | Learning from" shadow security": understanding non-compliant behaviours to improve information security management | |
White | Impact of protection motivation theory and general deterrence theory on the behavioral intention to implement and misuse active cyber defense | |
Hellesen et al. | Empirical case studies of the root-cause analysis method in information security | |
Maahs | Managerial strategies small businesses use to prevent cybercrime | |
Rightley et al. | Revisiting the Computer Crime Index-Revised (CCI-R): Assessing Individual Differences and Cyber-deviant Behavior Two Decades Later | |
Amer et al. | The impact of cyber security on preventing and mitigating electronic crimes in the Jordanian banking sector | |
Chrun | Model-based support for information technology security decision making | |
Cornelius | Online identity theft victimization: An assessment of victims and non-victims level of cyber security knowledge | |
Kim et al. | A study on the impact analysis of security flaws between security controls: An empirical analysis of K-ISMS using case-control study | |
Bhattacharya | Leadership styles and information security in small businesses: An empirical investigation | |
Rafaiani et al. | A functional approach to cyber risk assessment | |
McLaughlin et al. | Infosec research in prominent IS journals: Findings and implications for the CIO and Board of Directors | |
Kostic | Information security awareness techniques that reduce data breaches caused by social engineering attacks | |
Madison | Challenges with funding of information security projects per threat perceptions: A qualitative case study |