A test of protection motivation theory in the information security literature: A meta-analytic structural equation modeling approach

J Mou, JF Cohen, A Bhattacherjee… - Journal of the Association …, 2022 - aisel.aisnet.org
Abstract Information security is one of the important domains of information systems
research today, with protection motivation theory (PMT) one of its most influential theoretical …

" Would you give the same priority to the bank and a game? I do {not!}" exploring credential management strategies and obstacles during password manager setup

S Klivan, S Höltervennhoff, N Huaman, Y Acar… - … Symposium on Usable …, 2023 - usenix.org
Password managers allow users to improve password security by handling large numbers of
strong and unique passwords without the burden of memorizing them. While users are …

Adaptive and Maladaptive Factors behind Password Manager Use: A Hope-Extended Protection Motivation Perspective

A Nehme, ML Li, M Warkentin - Computers & Security, 2024 - Elsevier
Robust password management is crucial for users' information security. The use of
password manager technology, which constitutes adaptive coping, is the dominant method …

Adoption of Cybersecurity Innovations—A Systematic Literature Review

A Vestad, B Yang - … on Cybersecurity, Situational Awareness and Social …, 2023 - Springer
The adoption of new cybersecurity capabilities in an organization can be seen as an
example of the adoption of technological innovations. While regulators use rules, standards …

MIGRANT: modeling smartphone password manager adoption using migration theory

N Alkaldi, K Renaud - ACM SIGMIS Database: the DATABASE for …, 2022 - dl.acm.org
Password manager applications have the potential to alleviate password pain and improve
password strength, yet they are not widely adopted. Password managers are dissimilar to …

An Analysis of Password Managers' Password Checkup Tools

A Hutchinson, CW Munyendo, AJ Aviv… - Extended Abstracts of the …, 2024 - dl.acm.org
Password managers (PMs) have been widely recommended to users to generate and store
random, secure, and unique passwords across websites. Using a PM is often not enough …

[HTML][HTML] Рекомендации по разработке менеджеров паролей для ОС Андроид

АВ Черников - Вестник Пермского университета. Серия …, 2021 - cyberleninka.ru
Рассматриваются существующие менеджеры паролей в операционной системе (далее
ОС) Андроид: функционал, возможности, проблемы применения. За предмет …

An Analysis of the Deployment of Synergistic Cyber Security Awareness Model for the Elderly (SCSAM-Elderly) in Malaysia

NA Azam, AG Buja, R Ahmad, SFA Latip… - …, 2024 - search.proquest.com
Kajian ini meneroka analisis pelaksanaan Model Sinergistik Kesedaran Keselamatan Siber
untuk Warga Emas (SCSAM-Elderly) di Malaysia. Kejadian berkaitan keselamatan siber …

Design and Evaluation of a Password Diversifier Tool

R Pathak, A Aggarwal, R Aiswarya… - Indian Conference on …, 2023 - Springer
Passwords can be well regarded as an integral aspect of our lives. However, reuse of
passwords is prominent, making various accounts vulnerable to attacks. Within reuse …

Strategies to Combat Cyberattacks: A Systematic Review

M Letchumanan, R Kamaruddin - Risk Assessment and …, 2024 - igi-global.com
Many consider the internet a safe environment for sharing information and performing online
transactions. However, they are unaware of the cyberattacks that occur in the cyber …