Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Physical Sciences and Mathematics
Password Managers: Secure Passwords The Easy Way, Alexander Master
Password Managers: Secure Passwords The Easy Way, Alexander Master
CERIAS Technical Reports
Poor passwords are often the central problem identified when data breaches, ransomware attacks, and identity fraud cases occur. This Purdue Extension publication provides everyday users of Internet websites and computer systems with tools and strategies to protect their online accounts. Securing information access with password managers can be convenient and often free of cost, on a variety of devices and platforms. “Do’s and Don’ts” of password practices are highlighted, as well as the benefits of multi-factor authentication. The content is especially applicable for small businesses or non-profits, where employees often share access to systems or accounts.
An Evidence Based Cybersecurity Approach To Risk Management: Risk Management And "Market For Lemons", David Maimon
An Evidence Based Cybersecurity Approach To Risk Management: Risk Management And "Market For Lemons", David Maimon
EBCS Presentations
No abstract provided.
Using Labeling Theory As A Guide To Examine The Patterns, Characteristics, And Sanctions Given To Cybercrimes, Brian K. Payne, Brittany Hawkins, Chunsheng Xin
Using Labeling Theory As A Guide To Examine The Patterns, Characteristics, And Sanctions Given To Cybercrimes, Brian K. Payne, Brittany Hawkins, Chunsheng Xin
Sociology & Criminal Justice Faculty Publications
Over the past decade, reports of cybercrime have soared across the globe. Criminologists agree that the increase in cybercrime stems from technological advancements that have changed all facets of societal interactions. While it is agreed that technology has shaped cybercrime, there is less understanding about the dynamics of cybercrime. In particular, some researchers have explored whether these offenses are simply traditional types of crime that are now carried out through different strategies, while others have argued that cybercrimes are, in fact, new types of crime. This ambiguity potentially limits prevention and intervention strategies. In an effort to build our understanding …