[HTML][HTML] A survey exploring open source Intelligence for smarter password cracking
From the end of the last century to date, consumers are increasingly living their lives online.
In today's world, the average person spends a significant proportion of their time connecting …
In today's world, the average person spends a significant proportion of their time connecting …
Fifty years of information management research: A conceptual structure analysis using structural topic modeling
Abstract Information management is the management of organizational processes,
technologies, and people which collectively create, acquire, integrate, organize, process …
technologies, and people which collectively create, acquire, integrate, organize, process …
Cybersecurity risk analysis model using fault tree analysis and fuzzy decision theory
Cybersecurity, which is defined as information security aimed at averting cyberattacks, which
are among the main issues caused by the extensive use of networks in industrial control …
are among the main issues caused by the extensive use of networks in industrial control …
[HTML][HTML] LCCI: A framework for least cybersecurity controls to be implemented for small and medium enterprises (SMEs)
Abstract Globally Small and Medium Enterprises (SMEs) are the biggest contributors to the
economy by providing two-thirds of global employment opportunities and more than half the …
economy by providing two-thirds of global employment opportunities and more than half the …
Factors affecting cybersecurity awareness among university students
MA Alqahtani - Applied Sciences, 2022 - mdpi.com
One of the essential stages in increasing cyber security is implementing an effective security
awareness program. This work studies the present level of security knowledge among Imam …
awareness program. This work studies the present level of security knowledge among Imam …
A multidimensional approach to information security risk management using FMEA and fuzzy theory
Because of the evolution and widespread use of the Internet, organisations are becoming
more susceptible to attacks on Information Technology Systems. These attacks result in data …
more susceptible to attacks on Information Technology Systems. These attacks result in data …
Improving password memorability, while not inconveniencing the user
Passwords are the most frequently used authentication mechanism. However, due to
increased password numbers, there has been an increase in insecure password behaviors …
increased password numbers, there has been an increase in insecure password behaviors …
[HTML][HTML] How memory anxiety can influence password security behavior
Password reuse and modification are insecure password behaviors that are becoming
increasingly prevalent as users are obliged to remember more passwords to access various …
increasingly prevalent as users are obliged to remember more passwords to access various …
Securing online accounts and assets: An examination of personal investments and protection motivation
O Ogbanufe - International Journal of Information Management, 2023 - Elsevier
This paper examines how personal investment influence the use of multi-factor
authentication (MFA) for securing online accounts. We draw from the Protection Motivation …
authentication (MFA) for securing online accounts. We draw from the Protection Motivation …
Too many passwords? How understanding our memory can increase password memorability
Passwords are the most common authentication mechanism, that are only increasing with
time. Previous research suggests that users cannot remember multiple passwords …
time. Previous research suggests that users cannot remember multiple passwords …