Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Physical Sciences and Mathematics

Password Managers: Secure Passwords The Easy Way, Alexander Master Jan 2022

Password Managers: Secure Passwords The Easy Way, Alexander Master

CERIAS Technical Reports

Poor passwords are often the central problem identified when data breaches, ransomware attacks, and identity fraud cases occur. This Purdue Extension publication provides everyday users of Internet websites and computer systems with tools and strategies to protect their online accounts. Securing information access with password managers can be convenient and often free of cost, on a variety of devices and platforms. “Do’s and Don’ts” of password practices are highlighted, as well as the benefits of multi-factor authentication. The content is especially applicable for small businesses or non-profits, where employees often share access to systems or accounts.


An Evidence Based Cybersecurity Approach To Risk Management: Risk Management And "Market For Lemons", David Maimon Jan 2019

An Evidence Based Cybersecurity Approach To Risk Management: Risk Management And "Market For Lemons", David Maimon

EBCS Presentations

No abstract provided.


Using Labeling Theory As A Guide To Examine The Patterns, Characteristics, And Sanctions Given To Cybercrimes, Brian K. Payne, Brittany Hawkins, Chunsheng Xin Jan 2019

Using Labeling Theory As A Guide To Examine The Patterns, Characteristics, And Sanctions Given To Cybercrimes, Brian K. Payne, Brittany Hawkins, Chunsheng Xin

Sociology & Criminal Justice Faculty Publications

Over the past decade, reports of cybercrime have soared across the globe. Criminologists agree that the increase in cybercrime stems from technological advancements that have changed all facets of societal interactions. While it is agreed that technology has shaped cybercrime, there is less understanding about the dynamics of cybercrime. In particular, some researchers have explored whether these offenses are simply traditional types of crime that are now carried out through different strategies, while others have argued that cybercrimes are, in fact, new types of crime. This ambiguity potentially limits prevention and intervention strategies. In an effort to build our understanding …