{"id":1423,"date":"2023-02-18T14:25:47","date_gmt":"2023-02-18T14:25:47","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1423"},"modified":"2023-02-18T14:25:47","modified_gmt":"2023-02-18T14:25:47","slug":"a-jelszokezelo-elfogadasi-szandekaba-vetett-bizalom-fiatal-felnottek-koreben","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/hu\/jelszokezelo\/a-jelszokezelo-elfogadasi-szandekaba-vetett-bizalom-fiatal-felnottek-koreben\/","title":{"rendered":"A jelsz\u00f3kezel\u0151 alkalmaz\u00e1s sz\u00e1nd\u00e9k\u00e1nak bizalma fiatal feln\u0151ttek k\u00f6r\u00e9ben"},"content":{"rendered":"<p>Username and password have long been used as a form of authentication, and despite all the known issues with passwords, they are still the primary option. Cybersecurity experts advise users to create passwords that are difficult to guess and not to reuse them across different accounts. Other recommendations include changing passwords at regular intervals and not writing them down or storing them on users\u2019 phones or computers.<\/p>\n\n\n\n<p>Ezek a tippek, ha egy\u00fctt aj\u00e1nlj\u00e1k \u0151ket, ragad\u00f3s helyzetbe hozz\u00e1k a felhaszn\u00e1l\u00f3kat. Azok a jelszavak, amelyeket neh\u00e9z a t\u00e1mad\u00f3knak kital\u00e1lni, a felhaszn\u00e1l\u00f3knak is neh\u00e9z lehet megjegyezni. Ahogy a fi\u00f3kok sz\u00e1ma n\u00f6vekszik, ahogy ma is, a felhaszn\u00e1l\u00f3knak sokkal t\u00f6bb jelsz\u00f3t kell l\u00e9trehozniuk \u00e9s megjegyezni\u00fck, mint valaha. A helyzetet m\u00e9g nehezebb\u00e9 teszi, ha a felhaszn\u00e1l\u00f3kt\u00f3l megk\u00f6vetelik, hogy rendszeres id\u0151k\u00f6z\u00f6nk\u00e9nt v\u00e1ltoztass\u00e1k meg jelszavaikat, \u00e9s ne \u00edrj\u00e1k le \u0151ket sehov\u00e1.<\/p>\n\n\n\n<p>Mindez egy\u00fctt hatalmas kognit\u00edv terhel\u00e9st jelent a felhaszn\u00e1l\u00f3k sz\u00e1m\u00e1ra. Ez oda vezethet, hogy a felhaszn\u00e1l\u00f3k gyeng\u00e9bb jelszavakat hoznak l\u00e9tre, amelyeket k\u00f6nny\u0171 megjegyezni, \u00e9s \u00fajra felhaszn\u00e1lj\u00e1k \u0151ket k\u00fcl\u00f6nb\u00f6z\u0151 fi\u00f3kokban, ami probl\u00e9m\u00e1kat okoz a kiberbiztons\u00e1g szempontj\u00e1b\u00f3l.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"password-managers-and-trust-improving-cybersecurity-habits\">Jelsz\u00f3kezel\u0151k \u00e9s bizalom: A kiberbiztons\u00e1gi szok\u00e1sok jav\u00edt\u00e1sa<\/h2>\n\n\n<p>A jelsz\u00f3kezel\u0151 egy eszk\u00f6z vagy szoftver, amely megk\u00f6nny\u00edti a felhaszn\u00e1l\u00f3k sz\u00e1m\u00e1ra a sok egyedi hiteles\u00edt\u0151 adat, p\u00e9ld\u00e1ul felhaszn\u00e1l\u00f3nevek \u00e9s jelszavak l\u00e9trehoz\u00e1s\u00e1nak \u00e9s megjegyz\u00e9s\u00e9nek kognit\u00edv terhel\u00e9s\u00e9t az\u00e1ltal, hogy automatikusan l\u00e9trehozza, t\u00e1rolja \u00e9s kit\u00f6lti a sz\u00fcks\u00e9ges hiteles\u00edt\u0151 adatokat, amikor sz\u00fcks\u00e9ges. A jelsz\u00f3kezel\u0151k egyedi \u00e9s er\u0151s jelszavakat hoznak l\u00e9tre a k\u00edv\u00e1nt szab\u00e1lyok alapj\u00e1n, mint p\u00e9ld\u00e1ul hossz\u00fas\u00e1g, karaktert\u00edpusok \u00e9s b\u00e1rmilyen m\u00e1s speci\u00e1lis attrib\u00fatumok minden egyes fi\u00f3khoz. A jelsz\u00f3kezel\u0151k val\u00f3j\u00e1ban az egyik legn\u00e9pszer\u0171bb int\u00e9zked\u00e9s a kiberbiztons\u00e1gi szak\u00e9rt\u0151k k\u00f6r\u00e9ben. Azonban nem \u00e9rt\u00e9k el ugyanezt a n\u00e9pszer\u0171s\u00e9get a h\u00e9tk\u00f6znapi v\u00e9gfelhaszn\u00e1l\u00f3k k\u00f6r\u00e9ben.<\/p>\n\n\n\n<p>P\u00e9ld\u00e1ul 2015-ben, amikor a jelsz\u00f3kezel\u0151k az els\u0151 5 int\u00e9zked\u00e9s k\u00f6z\u00f6tt voltak, amelyeket a kiberbiztons\u00e1gi szak\u00e9rt\u0151k alkalmaztak, kider\u00fclt, hogy csak a h\u00e9tk\u00f6znapi felhaszn\u00e1l\u00f3k 24%-a haszn\u00e1lt jelsz\u00f3kezel\u0151t. A helyzet ma m\u00e9g rosszabbnak t\u0171nik, mivel a kiberbiztons\u00e1gi szak\u00e9rt\u0151k \u00e9s a felhaszn\u00e1l\u00f3k biztons\u00e1gi gyakorlatainak \u00f6sszehasonl\u00edt\u00e1s\u00e1ra ir\u00e1nyul\u00f3 leg\u00fajabb tanulm\u00e1nyok azt mutatj\u00e1k, hogy a v\u00e1laszad\u00f3k csak 31%-a haszn\u00e1l jelsz\u00f3kezel\u0151t.<\/p>\n\n\n\n<p>To understand the reasons for the unpopularity of password managers among users, studies have been conducted to identify the factors that prevent users from using a password manager. Trust has been found to be one of the main reasons why people don\u2019t use password management apps. This is based on the few studies that have been done on regular end users.<\/p>\n\n\n\n<p>A kiberbiztons\u00e1gi kutat\u00f3k meghat\u00e1rozt\u00e1k azokat a t\u00e9nyez\u0151ket, amelyek a jelsz\u00f3kezel\u0151k elfogad\u00e1s\u00e1t \u00f6szt\u00f6nzik, \u00e9s meg\u00e1llap\u00edtott\u00e1k, hogy a bizalom pozit\u00edv hat\u00e1ssal van a jelsz\u00f3kezel\u0151k elfogad\u00e1s\u00e1nak sz\u00e1nd\u00e9k\u00e1ra. A tanulm\u00e1nyok kimutatt\u00e1k, hogy az emberek nem fogadnak el jelsz\u00f3kezel\u0151t a bizalom hi\u00e1nya miatt. Ez\u00e9rt a bizalmat javasolt\u00e1k az els\u0151 l\u00e9p\u00e9snek a jelsz\u00f3kezel\u0151k elfogad\u00e1s\u00e1nak n\u00f6vel\u00e9se \u00e9rdek\u00e9ben.<\/p>\n\n\n\n<p>While trust has been found to be an important factor in password manager adoption, how trust can be established has not yet been investigated. For this, it is crucial to understand the factors that improve trust and favor their relationships with adoption. This leads to the conclusion that the basis for stimulating trust is to work on what is called \u201cInitial Trust\u201d.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"trust-as-a-consequence-of-security-the-importance-of-initial-trust-in-password-manager-adoption\">A bizalom mint a biztons\u00e1g k\u00f6vetkezm\u00e9nye: Az els\u0151dleges bizalom fontoss\u00e1ga a jelsz\u00f3kezel\u0151k elfogad\u00e1s\u00e1ban<\/h2>\n\n\n<p>A bizalmat nem lehet elrendelni, azt ki kell \u00e9p\u00edteni, \u00e9s ahhoz, hogy bizalmat lehessen kialak\u00edtani egy egy\u00e9n \u00e9s egy t\u00e1rgy k\u00f6z\u00f6tt, elengedhetetlen meg\u00e9rteni, hogyan indul el, \u00e9p\u00fcl fel \u00e9s javul a bizalom. Ha a biztons\u00e1g bizalmat eredm\u00e9nyez, akkor felt\u00e9telezhet\u0151, hogy a kiberbiztons\u00e1g kiberbizalmat eredm\u00e9nyez. A kiberbiztons\u00e1gi szak\u00e9rt\u0151k kimutatt\u00e1k, hogy a bizalom f\u00e1zisokban \u00e9p\u00fcl fel, \u00e9s a bizalom\u00e9p\u00edt\u00e9si folyamat akkor kezd\u0151dik, amikor az emberek egy ismeretlen t\u00e1rggyal tal\u00e1lkoznak. Ezt a kezdeti f\u00e1zist nevezz\u00fck Els\u0151dleges Bizalomnak, amelyet int\u00e9zm\u00e9nyi, szem\u00e9lyes \u00e9s k\u00f6rnyezeti t\u00e9nyez\u0151k befoly\u00e1solnak.<\/p>\n\n\n\n<p>Once initial trust is established, people go through a personal experience, try the artifact, and then decide to accept or reject it. Therefore, the trust that is established after the use of an artifact is different from the initial trust that is established before the use of an artifact. That is, initial trust plays a crucial role in building trust between a user and an artifact, which can be a service, an application, or a piece of software. Therefore, we argue that initial trust formation is more relevant to understand in the context of password managers. The analytical understanding of this phenomenon contributes to the fact that the phrase that says \u201cThe first impression must be good for there to be acceptance by the receiver\u201d is a universal rule.<\/p>\n\n\n\n<p>A kiberbiztons\u00e1gi tudom\u00e1nyos k\u00f6z\u00f6ss\u00e9g most m\u00e1r elismerte, hogy b\u00e1rmely jelsz\u00f3kezel\u0151 gy\u00e1rt\u00f3j\u00e1nak figyelembe kell vennie az Els\u0151dleges Bizalom Modellj\u00e9t (ITM). Munk\u00e1jukban le\u00edrt\u00e1k az els\u0151dleges bizalmat befoly\u00e1sol\u00f3 h\u00e1rom er\u0151t: 1) <strong>Szem\u00e9lyes<\/strong>, 2) <strong>Int\u00e9zm\u00e9nyi<\/strong>, \u00e9s 3) <strong>K\u00f6rnyezeti<\/strong>. <\/p>\n\n\n\n<p>A Szem\u00e9lyes a felhaszn\u00e1l\u00f3hoz kapcsol\u00f3dik, amely k\u00f6z\u00f6tt a szem\u00e9lyes hajland\u00f3s\u00e1g a bizalomra jelent\u0151sen befoly\u00e1solja az els\u0151dleges bizalmat. Az Int\u00e9zm\u00e9nyi tekintet\u00e9ben a m\u00e9ret, kapacit\u00e1s, integrit\u00e1s, piaci szerep, j\u00f3akarat, h\u00edrn\u00e9v \u00e9s\/vagy m\u00e1rka, amelyek szint\u00e9n befoly\u00e1solhatj\u00e1k az int\u00e9zm\u00e9ny szolg\u00e1ltat\u00e1sainak vagy term\u00e9keinek felhaszn\u00e1l\u00f3i meg\u00edt\u00e9l\u00e9s\u00e9t. A K\u00f6rnyezet tekintet\u00e9ben pedig kiemelik a szolg\u00e1ltat\u00e1s struktur\u00e1lis biztons\u00e1g\u00e1t \u00e9s megb\u00edzhat\u00f3s\u00e1g\u00e1nak jav\u00edt\u00e1s\u00e1t. A struktur\u00e1lis garanci\u00e1k k\u00f6z\u00e9 tartozik a szolg\u00e1ltat\u00e1sgaranci\u00e1k rendelkez\u00e9sre \u00e1ll\u00e1sa, adatv\u00e9delmi szab\u00e1lyzatok, harmadik felek \u00e1ltali elismer\u00e9s \u00e9s t\u00e1mogat\u00e1s.<\/p>\n\n\n\n<p>A fentiek alapj\u00e1n minden jelsz\u00f3kezel\u0151t gy\u00e1rt\u00f3 c\u00e9gnek az ITM filoz\u00f3fi\u00e1j\u00e1ra kell alapoznia.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"the-icm-philosophy-and-the-factors-that-affect-initial-trust-in-password-managers\">Az ICM filoz\u00f3fia \u00e9s az els\u0151dleges bizalmat befoly\u00e1sol\u00f3 t\u00e9nyez\u0151k a jelsz\u00f3kezel\u0151k eset\u00e9ben<\/h2>\n\n\n<p>Az Els\u0151dleges Bizalom Modell (ICM) filoz\u00f3fia egy keretrendszer az els\u0151dleges bizalmat befoly\u00e1sol\u00f3 t\u00e9nyez\u0151k meg\u00e9rt\u00e9s\u00e9hez egy t\u00e1rgy eset\u00e9ben. A jelsz\u00f3kezel\u0151k eset\u00e9ben az ICM filoz\u00f3fia k\u00e9t f\u0151 t\u00e9nyez\u0151t emel ki, amelyek befoly\u00e1solj\u00e1k az els\u0151dleges bizalmat: a szem\u00e9lyes hajland\u00f3s\u00e1g a bizalomra \u00e9s a struktur\u00e1lis garanci\u00e1k.<\/p>\n\n\n\n<p>The personal propensity to trust reflects an individual\u2019s tendency to trust others in various situations. This tendency is part of a person\u2019s personality and develops during the early stage of a person\u2019s life. The propensity to trust takes two forms: faith in humanity and trust posture. In the first form, a person believes that people are trustworthy, and the second form describes a person\u2019s belief that they will be better off considering people to be trustworthy. It is suggested that the personal propensity to trust managers of passwords will represent the degree to which people have a trustworthy posture towards password managers. That is, the personal propensity to trust will affect the initial trust in the password manager.<\/p>\n\n\n\n<p>Structural guarantees, in general, are the guarantees, for example, promises, contracts, regulations, or guarantees, provided by the institutions to their clients. In a technological context, these safeguards are encryption, secure processes and procedures, third-party certifications, and the feedback mechanism. In the case of password managers, users care about their data and look for guarantees like the ones mentioned above. The structural guarantees will affect the initial trust in the password manager through the quality of service that cannot be determined without previous experience. In this situation, when an individual has no prior experience, referrals and word of mouth are the channels that influence an individual\u2019s perceptions.<\/p>\n\n\n\n<p>Individual perceptions are also affected by institutional signals. A good reputation is a guarantee of a company\u2019s integrity and goodwill, increasing the trust of potential customers even when they have no prior experience with the service provider and reducing uncertainty and risks associated with the application. The reputation of the company of the password managers will have a significant influence on the initial trust related to the password managers. So, the reputation of the company will positively affect the initial trust in the password managers. The initial trust reduces uncertainty and the risk and establishes a connection that leads to the use of a new application.<\/p>\n\n\n\n<p>Mind az \u00e9szlelt hasznoss\u00e1g, mind az els\u0151dleges bizalom befoly\u00e1solja a viselked\u00e9si sz\u00e1nd\u00e9kot. Ez\u00e9rt a jelsz\u00f3kezel\u0151 term\u00e9keket gener\u00e1l\u00f3 k\u00f6rnyezeti t\u00e9nyez\u0151k \u00e9s int\u00e9zm\u00e9nyek szorosan kapcsol\u00f3dnak egym\u00e1shoz, \u00e9s teljes m\u00e9rt\u00e9kben a szolg\u00e1ltat\u00f3ra, nem pedig a felhaszn\u00e1l\u00f3ra t\u00e1maszkodnak.<\/p>\n\n\n\n<p><strong>Az els\u0151dleges bizalom jelenlegi felfog\u00e1sa a kiberbiztons\u00e1g ter\u00e9n<\/strong><\/p>\n\n\n\n<p>In 2021, a prestigious group of cybersecurity experts from Finland\u2019s Turku University conducted a study on initial trust formation in the context of password managers and how initial trust relates to password manager adoption intention. Data was collected from 289 young adults in Europe (18-35 years old). The analysis was mainly carried out using Structural Structure Models (SEM) in SmartPLS 3.2 and with the support of SPSS v25.0. The results showed that the structural security and the reputation of the company play an important role in the initial formation of trust, but not the Personal Propensity. In conclusion, it is the last two factors, institutional and environmental, that affect initial trust, that is, the intention of users to adopt a password manager.<\/p>\n\n\n\n<p>A Turku Egyetem szak\u00e9rt\u0151i m\u00e1s kutat\u00f3kkal, filoz\u00f3fusokkal \u00e9s kiberbiztons\u00e1gi szak\u00e9rt\u0151kkel egy\u00fctt jelzik, hogy m\u00e9g mindig vannak t\u00e9nyez\u0151k a jelsz\u00f3kezel\u0151k els\u0151dleges bizalm\u00e1ban, \u00edgy m\u00e9g sokat kell tanulm\u00e1nyozni ebben a tekintetben, p\u00e9ld\u00e1ul \u00e9rdekes lenne l\u00e1tni a t\u00e1rsadalmi norm\u00e1k szerep\u00e9t a jelsz\u00f3kezel\u0151k elfogad\u00e1s\u00e1nak \u00e9s els\u0151dleges bizalm\u00e1nak h\u00e1tter\u00e9ben. Emellett a tanulm\u00e1nyok m\u00e1s t\u00e9nyez\u0151ket is figyelembe vehetnek, amelyek fontos szerepet j\u00e1tszhatnak a bizalom kezdeti kialakul\u00e1s\u00e1ban, p\u00e9ld\u00e1ul a jelsz\u00f3kezel\u0151k ismerete. Az ismeretts\u00e9get a sz\u00fcks\u00e9ges k\u00e9szs\u00e9gek elsaj\u00e1t\u00edt\u00e1s\u00e1nak hajt\u00f3erejek\u00e9nt tal\u00e1lt\u00e1k meg egy bizonyos t\u00edpus\u00fa viselked\u00e9s v\u00e9grehajt\u00e1s\u00e1hoz, valamint a nemi k\u00fcl\u00f6nbs\u00e9gek, mivel a n\u0151i nemr\u0151l kider\u00fclt, hogy ig\u00e9nyesebb az els\u0151dleges bizalom elfogad\u00e1s\u00e1ban, mint a f\u00e9rfi nem, \u00e9s a fiatalabb n\u0151k m\u00e9g ig\u00e9nyesebbek, mint a fiatalabb f\u00e9rfiak. Teh\u00e1t ezen a ter\u00fcleten m\u00e9g sokat kell tanulm\u00e1nyozni.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"the-current-conception-of-initial-trust-for-cybersecurity-in-the-context-of-password-managers\">Az els\u0151dleges bizalom jelenlegi felfog\u00e1sa a kiberbiztons\u00e1g ter\u00e9n a jelsz\u00f3kezel\u0151k kontextus\u00e1ban<\/h2>\n\n\n<p>In 2021, a prestigious group of cybersecurity experts from Finland\u2019s Turku University conducted a study on initial trust formation in the context of password managers and how initial trust relates to password manager adoption intention. The study collected data from 289 young adults in Europe between 18-35 years old, and the analysis was mainly carried out using Structural Structure Models (SEM) in SmartPLS3.2 and with the support of SPSS v25.0.<\/p>\n\n\n\n<p>The results showed that the structural security and the reputation of the company play an important role in the initial formation of trust, but not the Personal Propensity. In conclusion, it is the last two factors \u2013 Institutional and Environmental \u2013 that affect initial trust, that is, the intention of users to adopt a password manager.<\/p>\n\n\n\n<p>A Turku Egyetem szak\u00e9rt\u0151i m\u00e1s kutat\u00f3kkal, filoz\u00f3fusokkal \u00e9s kiberbiztons\u00e1gi szak\u00e9rt\u0151kkel egy\u00fctt jelzik, hogy m\u00e9g mindig vannak t\u00e9nyez\u0151k a jelsz\u00f3kezel\u0151k els\u0151dleges bizalm\u00e1ban, \u00edgy m\u00e9g sokat kell tanulm\u00e1nyozni ebben a tekintetben. P\u00e9ld\u00e1ul \u00e9rdekes lenne l\u00e1tni a t\u00e1rsadalmi norm\u00e1k szerep\u00e9t a jelsz\u00f3kezel\u0151k elfogad\u00e1s\u00e1nak \u00e9s els\u0151dleges bizalm\u00e1nak h\u00e1tter\u00e9ben. Emellett a tanulm\u00e1nyok m\u00e1s t\u00e9nyez\u0151ket is figyelembe vehetnek, amelyek fontos szerepet j\u00e1tszhatnak a bizalom kezdeti kialakul\u00e1s\u00e1ban, p\u00e9ld\u00e1ul a jelsz\u00f3kezel\u0151k ismerete.<\/p>\n\n\n\n<p>Az ismeretts\u00e9get a sz\u00fcks\u00e9ges k\u00e9szs\u00e9gek elsaj\u00e1t\u00edt\u00e1s\u00e1nak hajt\u00f3erejek\u00e9nt tal\u00e1lt\u00e1k meg egy bizonyos t\u00edpus\u00fa viselked\u00e9s v\u00e9grehajt\u00e1s\u00e1hoz, valamint a nemi k\u00fcl\u00f6nbs\u00e9gek. A n\u0151i nemr\u0151l kider\u00fclt, hogy ig\u00e9nyesebb az els\u0151dleges bizalom elfogad\u00e1s\u00e1ban, mint a f\u00e9rfi nem, \u00e9s a fiatalabb n\u0151k m\u00e9g ig\u00e9nyesebbek, mint a fiatalabb f\u00e9rfiak. Teh\u00e1t ezen a ter\u00fcleten m\u00e9g sokat kell tanulm\u00e1nyozni.<\/p>\n\n\n\n<p><strong>\u00d6sszegz\u00e9sk\u00e9ppen <\/strong><\/p>\n\n\n\n<p>A bizony\u00edt\u00e9kok azt mutatj\u00e1k, hogy a jelszavak v\u00e9delm\u00e9re val\u00f3 t\u00e1maszkod\u00e1s \u00f6nmag\u00e1ban nem elegend\u0151 a biztons\u00e1gos online tev\u00e9kenys\u00e9g biztos\u00edt\u00e1s\u00e1hoz. A kiberbiztons\u00e1gi szak\u00e9rt\u0151k azt javasolj\u00e1k, hogy nehezen kital\u00e1lhat\u00f3 jelszavakat hozzunk l\u00e9tre, \u00e9s rendszeresen v\u00e1ltoztassuk meg \u0151ket, hogy megv\u00e9dj\u00fck az inform\u00e1ci\u00f3kat a potenci\u00e1lis hackerekt\u0151l. B\u00e1r ez f\u00e1rads\u00e1gos folyamat lehet, az egyes fi\u00f3kokhoz k\u00fcl\u00f6n jelszavak haszn\u00e1lata sz\u00fcks\u00e9ges ahhoz, hogy megv\u00e9dj\u00fck magunkat \u00e9s a k\u00f6z\u00f6ss\u00e9get. Szerencs\u00e9re vannak m\u00f3dok a jelszavak hat\u00e9kony \u00e9s biztons\u00e1gos kezel\u00e9s\u00e9re, an\u00e9lk\u00fcl, hogy megadn\u00e1nk magunkat a v\u00e9gtelen kibercsat\u00e1ban. Azonban, ha a felhaszn\u00e1l\u00f3k nem figyelnek oda a jelszavak l\u00e9trehoz\u00e1sakor, akkor kock\u00e1ztatj\u00e1k, hogy a kiberlop\u00e1s \u00e9s csal\u00e1s \u00e1ldozat\u00e1v\u00e1 v\u00e1lnak. <\/p>\n\n\n\n<p>Tov\u00e1bbi inform\u00e1ci\u00f3k\u00e9rt az adatok v\u00e9delm\u00e9r\u0151l az internet b\u00f6ng\u00e9sz\u00e9se k\u00f6zben tekintse meg a t\u00e9m\u00e1val kapcsolatos egy\u00e9b cikkeinket.<\/p>","protected":false},"excerpt":{"rendered":"<p>A felhaszn\u00e1l\u00f3n\u00e9v \u00e9s jelsz\u00f3 r\u00e9g\u00f3ta haszn\u00e1latosak hiteles\u00edt\u00e9si formak\u00e9nt, \u00e9s a jelszavakkal kapcsolatos \u00f6sszes ismert probl\u00e9ma ellen\u00e9re m\u00e9g mindig az els\u0151dleges lehet\u0151s\u00e9gnek sz\u00e1m\u00edtanak. A kiberbiztons\u00e1gi szak\u00e9rt\u0151k azt tan\u00e1csolj\u00e1k a felhaszn\u00e1l\u00f3knak\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/hu\/jelszokezelo\/a-jelszokezelo-elfogadasi-szandekaba-vetett-bizalom-fiatal-felnottek-koreben\/\">Folytat\u00e1s <span class=\"screen-reader-text\">A jelsz\u00f3kezel\u0151 alkalmaz\u00e1s sz\u00e1nd\u00e9k\u00e1nak bizalma fiatal feln\u0151ttek k\u00f6r\u00e9ben<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":1431,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[24],"tags":[],"class_list":["post-1423","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-password-manager","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Trust in Password Manager Adoption Among Young Adults<\/title>\n<meta name=\"description\" content=\"Explore the role of initial trust in password manager adoption among young adults. Learn how to protect yourself from cybertheft and fraud.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/hu\/jelszokezelo\/a-jelszokezelo-elfogadasi-szandekaba-vetett-bizalom-fiatal-felnottek-koreben\/\" \/>\n<meta property=\"og:locale\" content=\"hu_HU\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Trust in Password Manager Adoption Among Young Adults\" \/>\n<meta property=\"og:description\" content=\"Explore the role of initial trust in password manager adoption among young adults. Learn how to protect yourself from cybertheft and fraud.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/hu\/jelszokezelo\/a-jelszokezelo-elfogadasi-szandekaba-vetett-bizalom-fiatal-felnottek-koreben\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-18T14:25:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Password-Managers-and-Trust-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"662\" \/>\n\t<meta property=\"og:image:height\" content=\"327\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Szerz\u0151:\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Becs\u00fclt olvas\u00e1si id\u0151\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 perc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"The trust in Password manager adoption intention among young adults\",\"datePublished\":\"2023-02-18T14:25:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/\"},\"wordCount\":2001,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Password-Managers-and-Trust-1.jpg\",\"articleSection\":[\"Password Manager\"],\"inLanguage\":\"hu\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/\",\"url\":\"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/\",\"name\":\"Trust in Password Manager Adoption Among Young Adults\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Password-Managers-and-Trust-1.jpg\",\"datePublished\":\"2023-02-18T14:25:47+00:00\",\"description\":\"Explore the role of initial trust in password manager adoption among young adults. Learn how to protect yourself from cybertheft and fraud.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/#breadcrumb\"},\"inLanguage\":\"hu\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Password-Managers-and-Trust-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Password-Managers-and-Trust-1.jpg\",\"width\":662,\"height\":327,\"caption\":\"Password Managers and Trust\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The trust in Password manager adoption intention among young adults\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hu\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/hu\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A jelsz\u00f3kezel\u0151 alkalmaz\u00e1sok elfogad\u00e1s\u00e1ba vetett bizalom a fiatal feln\u0151ttek k\u00f6r\u00e9ben","description":"Fedezze fel a kezdeti bizalom szerep\u00e9t a jelsz\u00f3kezel\u0151k elfogad\u00e1s\u00e1ban fiatal feln\u0151ttek k\u00f6r\u00e9ben. Tanulja meg, hogyan v\u00e9dheti meg mag\u00e1t a kiberlop\u00e1st\u00f3l \u00e9s csal\u00e1st\u00f3l.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/hu\/jelszokezelo\/a-jelszokezelo-elfogadasi-szandekaba-vetett-bizalom-fiatal-felnottek-koreben\/","og_locale":"hu_HU","og_type":"article","og_title":"Trust in Password Manager Adoption Among Young Adults","og_description":"Explore the role of initial trust in password manager adoption among young adults. Learn how to protect yourself from cybertheft and fraud.","og_url":"https:\/\/securitybriefing.net\/hu\/jelszokezelo\/a-jelszokezelo-elfogadasi-szandekaba-vetett-bizalom-fiatal-felnottek-koreben\/","og_site_name":"Security Briefing","article_published_time":"2023-02-18T14:25:47+00:00","og_image":[{"width":662,"height":327,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Password-Managers-and-Trust-1.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"Szerz\u0151:":"security","Becs\u00fclt olvas\u00e1si id\u0151":"10 perc"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"The trust in Password manager adoption intention among young adults","datePublished":"2023-02-18T14:25:47+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/"},"wordCount":2001,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Password-Managers-and-Trust-1.jpg","articleSection":["Password Manager"],"inLanguage":"hu"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/","url":"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/","name":"A jelsz\u00f3kezel\u0151 alkalmaz\u00e1sok elfogad\u00e1s\u00e1ba vetett bizalom a fiatal feln\u0151ttek k\u00f6r\u00e9ben","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Password-Managers-and-Trust-1.jpg","datePublished":"2023-02-18T14:25:47+00:00","description":"Fedezze fel a kezdeti bizalom szerep\u00e9t a jelsz\u00f3kezel\u0151k elfogad\u00e1s\u00e1ban fiatal feln\u0151ttek k\u00f6r\u00e9ben. Tanulja meg, hogyan v\u00e9dheti meg mag\u00e1t a kiberlop\u00e1st\u00f3l \u00e9s csal\u00e1st\u00f3l.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/#breadcrumb"},"inLanguage":"hu","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/"]}]},{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Password-Managers-and-Trust-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Password-Managers-and-Trust-1.jpg","width":662,"height":327,"caption":"Password Managers and Trust"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"The trust in Password manager adoption intention among young adults"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hu"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"biztons\u00e1g","image":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin a Government Technology vezet\u0151 munkat\u00e1rsa. Kor\u00e1bban a PYMNTS \u00e9s a The Bay State Banner sz\u00e1m\u00e1ra \u00edrt, \u00e9s a Carnegie Mellon Egyetemen szerzett B.A. diplom\u00e1t kreat\u00edv \u00edr\u00e1sb\u00f3l. Boston k\u00f6rny\u00e9k\u00e9n \u00e9l.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/hu\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/1423","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/comments?post=1423"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/1423\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media\/1431"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media?parent=1423"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/categories?post=1423"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/tags?post=1423"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}