{"id":1423,"date":"2023-02-18T14:25:47","date_gmt":"2023-02-18T14:25:47","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1423"},"modified":"2023-02-18T14:25:47","modified_gmt":"2023-02-18T14:25:47","slug":"%e8%8b%a5%e5%b9%b4%e5%b1%a4%e3%81%ab%e3%81%8a%e3%81%91%e3%82%8b%e3%83%91%e3%82%b9%e3%83%af%e3%83%bc%e3%83%89%e3%83%9e%e3%83%8d%e3%83%bc%e3%82%b8%e3%83%a3%e3%83%bc%e3%81%ae%e6%8e%a1%e7%94%a8%e6%84%8f","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ja\/%e3%83%91%e3%82%b9%e3%83%af%e3%83%bc%e3%83%89%e3%83%9e%e3%83%8d%e3%83%bc%e3%82%b8%e3%83%a3%e3%83%bc\/%e8%8b%a5%e5%b9%b4%e5%b1%a4%e3%81%ab%e3%81%8a%e3%81%91%e3%82%8b%e3%83%91%e3%82%b9%e3%83%af%e3%83%bc%e3%83%89%e3%83%9e%e3%83%8d%e3%83%bc%e3%82%b8%e3%83%a3%e3%83%bc%e3%81%ae%e6%8e%a1%e7%94%a8%e6%84%8f\/","title":{"rendered":"\u82e5\u5e74\u5c64\u306b\u304a\u3051\u308b\u30d1\u30b9\u30ef\u30fc\u30c9\u7ba1\u7406\u30bd\u30d5\u30c8\u306e\u5c0e\u5165\u610f\u5411\u3068\u4fe1\u983c\u5ea6"},"content":{"rendered":"<p>Username and password have long been used as a form of authentication, and despite all the known issues with passwords, they are still the primary option. Cybersecurity experts advise users to create passwords that are difficult to guess and not to reuse them across different accounts. Other recommendations include changing passwords at regular intervals and not writing them down or storing them on users\u2019 phones or computers.<\/p>\n\n\n\n<p>\u3053\u308c\u3089\u306e\u30d2\u30f3\u30c8\u306f\u3001\u4e00\u7dd2\u306b\u63a8\u5968\u3055\u308c\u308b\u3068\u3001\u30e6\u30fc\u30b6\u30fc\u3092\u5384\u4ecb\u306a\u72b6\u6cc1\u306b\u7f6e\u304f\u3053\u3068\u306b\u306a\u308a\u307e\u3059\u3002\u653b\u6483\u8005\u304c\u63a8\u6e2c\u3057\u306b\u304f\u3044\u30d1\u30b9\u30ef\u30fc\u30c9\u306f\u3001\u30e6\u30fc\u30b6\u30fc\u304c\u899a\u3048\u306b\u304f\u3044\u5834\u5408\u3082\u3042\u308a\u307e\u3059\u3002\u4eca\u65e5\u306e\u3088\u3046\u306b\u30a2\u30ab\u30a6\u30f3\u30c8\u306e\u6570\u304c\u5897\u3048\u308b\u3068\u3001\u30e6\u30fc\u30b6\u30fc\u306f\u3053\u308c\u307e\u3067\u4ee5\u4e0a\u306b\u591a\u304f\u306e\u30d1\u30b9\u30ef\u30fc\u30c9\u3092\u4f5c\u6210\u3057\u3001\u899a\u3048\u306a\u3051\u308c\u3070\u306a\u308a\u307e\u305b\u3093\u3002\u30e6\u30fc\u30b6\u30fc\u304c\u5b9a\u671f\u7684\u306b\u30d1\u30b9\u30ef\u30fc\u30c9\u3092\u5909\u66f4\u3057\u3001\u3069\u3053\u306b\u3082\u66f8\u304d\u7559\u3081\u306a\u3044\u3053\u3068\u3092\u6c42\u3081\u3089\u308c\u308b\u3068\u3001\u72b6\u6cc1\u306f\u3055\u3089\u306b\u56f0\u96e3\u306b\u306a\u308a\u307e\u3059\u3002.<\/p>\n\n\n\n<p>\u3053\u308c\u3089\u3059\u3079\u3066\u304c\u4e00\u7dd2\u306b\u306a\u308b\u3068\u3001\u30e6\u30fc\u30b6\u30fc\u306b\u3068\u3063\u3066\u5927\u304d\u306a\u8a8d\u77e5\u8ca0\u8377\u304c\u751f\u3058\u307e\u3059\u3002\u3053\u308c\u306b\u3088\u308a\u3001\u30e6\u30fc\u30b6\u30fc\u306f\u899a\u3048\u3084\u3059\u304f\u3001\u7570\u306a\u308b\u30a2\u30ab\u30a6\u30f3\u30c8\u3067\u518d\u5229\u7528\u3057\u3084\u3059\u3044\u5f31\u3044\u30d1\u30b9\u30ef\u30fc\u30c9\u3092\u4f5c\u6210\u3059\u308b\u3053\u3068\u306b\u306a\u308a\u3001\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u89b3\u70b9\u304b\u3089\u554f\u984c\u304c\u751f\u3058\u307e\u3059\u3002.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"password-managers-and-trust-improving-cybersecurity-habits\">\u30d1\u30b9\u30ef\u30fc\u30c9\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\u3068\u4fe1\u983c\uff1a\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7fd2\u6163\u306e\u6539\u5584<\/h2>\n\n\n<p>\u30d1\u30b9\u30ef\u30fc\u30c9\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\u306f\u3001\u30e6\u30fc\u30b6\u30fc\u540d\u3084\u30d1\u30b9\u30ef\u30fc\u30c9\u306a\u3069\u3001\u591a\u304f\u306e\u30e6\u30cb\u30fc\u30af\u306a\u8cc7\u683c\u60c5\u5831\u3092\u81ea\u52d5\u7684\u306b\u4f5c\u6210\u3001\u4fdd\u5b58\u3001\u5fc5\u8981\u306a\u3068\u304d\u306b\u5165\u529b\u3059\u308b\u3053\u3068\u3067\u3001\u30e6\u30fc\u30b6\u30fc\u306e\u8a8d\u77e5\u8ca0\u8377\u3092\u8efd\u6e1b\u3059\u308b\u30c4\u30fc\u30eb\u307e\u305f\u306f\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u3067\u3059\u3002\u30d1\u30b9\u30ef\u30fc\u30c9\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\u306f\u3001\u9577\u3055\u3001\u6587\u5b57\u306e\u7a2e\u985e\u3001\u305d\u306e\u4ed6\u306e\u7279\u5225\u306a\u5c5e\u6027\u306a\u3069\u3001\u5e0c\u671b\u3059\u308b\u30eb\u30fc\u30eb\u306b\u57fa\u3065\u3044\u3066\u5404\u30a2\u30ab\u30a6\u30f3\u30c8\u306e\u30e6\u30cb\u30fc\u30af\u3067\u5f37\u529b\u306a\u30d1\u30b9\u30ef\u30fc\u30c9\u3092\u4f5c\u6210\u3057\u307e\u3059\u3002\u30d1\u30b9\u30ef\u30fc\u30c9\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\u306f\u3001\u5b9f\u969b\u306b\u306f\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5c02\u9580\u5bb6\u306e\u9593\u3067\u6700\u3082\u4eba\u6c17\u306e\u3042\u308b\u5bfe\u7b56\u306e\u4e00\u3064\u3067\u3059\u3002\u3057\u304b\u3057\u3001\u4e00\u822c\u306e\u30a8\u30f3\u30c9\u30e6\u30fc\u30b6\u30fc\u306e\u9593\u3067\u306f\u540c\u3058\u4eba\u6c17\u3092\u5f97\u3066\u3044\u307e\u305b\u3093\u3002.<\/p>\n\n\n\n<p>\u4f8b\u3048\u3070\u30012015\u5e74\u306b\u306f\u3001\u30d1\u30b9\u30ef\u30fc\u30c9\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\u304c\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5c02\u9580\u5bb6\u306b\u3088\u3063\u3066\u9069\u7528\u3055\u308c\u305f\u30c8\u30c3\u30d75\u306e\u5bfe\u7b56\u306e\u4e00\u3064\u3067\u3042\u3063\u305f\u3068\u304d\u3001\u4e00\u822c\u30e6\u30fc\u30b6\u30fc\u306e\u3046\u3061\u30d1\u30b9\u30ef\u30fc\u30c9\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\u3092\u4f7f\u7528\u3057\u3066\u3044\u308b\u306e\u306f\u308f\u305a\u304b24%\u3067\u3042\u308b\u3053\u3068\u304c\u5224\u660e\u3057\u307e\u3057\u305f\u3002\u6700\u8fd1\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5c02\u9580\u5bb6\u3068\u30e6\u30fc\u30b6\u30fc\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5b9f\u8df5\u3092\u6bd4\u8f03\u3057\u305f\u7814\u7a76\u3067\u306f\u3001\u56de\u7b54\u8005\u306e\u3046\u3061\u30d1\u30b9\u30ef\u30fc\u30c9\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\u3092\u4f7f\u7528\u3057\u3066\u3044\u308b\u306e\u306f\u308f\u305a\u304b31%\u3067\u3042\u308b\u3053\u3068\u304c\u793a\u3055\u308c\u3066\u304a\u308a\u3001\u72b6\u6cc1\u306f\u3055\u3089\u306b\u60aa\u5316\u3057\u3066\u3044\u308b\u3088\u3046\u3067\u3059\u3002.<\/p>\n\n\n\n<p>To understand the reasons for the unpopularity of password managers among users, studies have been conducted to identify the factors that prevent users from using a password manager. Trust has been found to be one of the main reasons why people don\u2019t use password management apps. This is based on the few studies that have been done on regular end users.<\/p>\n\n\n\n<p>\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7814\u7a76\u8005\u306f\u3001\u30d1\u30b9\u30ef\u30fc\u30c9\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\u306e\u63a1\u7528\u3092\u4fc3\u9032\u3059\u308b\u8981\u56e0\u3092\u7279\u5b9a\u3057\u3001\u4fe1\u983c\u304c\u30d1\u30b9\u30ef\u30fc\u30c9\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\u306e\u63a1\u7528\u610f\u56f3\u306b\u30d7\u30e9\u30b9\u306e\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u3053\u3068\u3092\u767a\u898b\u3057\u307e\u3057\u305f\u3002\u7814\u7a76\u306b\u3088\u308c\u3070\u3001\u4eba\u3005\u304c\u30d1\u30b9\u30ef\u30fc\u30c9\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\u3092\u63a1\u7528\u3057\u306a\u3044\u306e\u306f\u4fe1\u983c\u306e\u6b20\u5982\u304c\u539f\u56e0\u3067\u3042\u308b\u3053\u3068\u304c\u308f\u304b\u308a\u307e\u3057\u305f\u3002\u3057\u305f\u304c\u3063\u3066\u3001\u4fe1\u983c\u306f\u30d1\u30b9\u30ef\u30fc\u30c9\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\u306e\u63a1\u7528\u3092\u5897\u3084\u3059\u305f\u3081\u306e\u7b2c\u4e00\u6b69\u3068\u3057\u3066\u63d0\u6848\u3055\u308c\u3066\u3044\u307e\u3059\u3002.<\/p>\n\n\n\n<p>While trust has been found to be an important factor in password manager adoption, how trust can be established has not yet been investigated. For this, it is crucial to understand the factors that improve trust and favor their relationships with adoption. This leads to the conclusion that the basis for stimulating trust is to work on what is called \u201cInitial Trust\u201d.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"trust-as-a-consequence-of-security-the-importance-of-initial-trust-in-password-manager-adoption\">\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u7d50\u679c\u3068\u3057\u3066\u306e\u4fe1\u983c\uff1a\u30d1\u30b9\u30ef\u30fc\u30c9\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\u63a1\u7528\u306b\u304a\u3051\u308b\u521d\u671f\u4fe1\u983c\u306e\u91cd\u8981\u6027<\/h2>\n\n\n<p>\u4fe1\u983c\u306f\u547d\u4ee4\u3055\u308c\u308b\u3082\u306e\u3067\u306f\u306a\u304f\u3001\u69cb\u7bc9\u3055\u308c\u308b\u3082\u306e\u3067\u3042\u308a\u3001\u500b\u4eba\u3068\u30a2\u30fc\u30c6\u30a3\u30d5\u30a1\u30af\u30c8\u306e\u9593\u306b\u4fe1\u983c\u3092\u78ba\u7acb\u3059\u308b\u305f\u3081\u306b\u306f\u3001\u4fe1\u983c\u304c\u3069\u306e\u3088\u3046\u306b\u958b\u59cb\u3055\u308c\u3001\u69cb\u7bc9\u3055\u308c\u3001\u6539\u5584\u3055\u308c\u308b\u304b\u3092\u7406\u89e3\u3059\u308b\u3053\u3068\u304c\u91cd\u8981\u3067\u3059\u3002\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u304c\u4fe1\u983c\u3092\u3082\u305f\u3089\u3059\u306e\u3067\u3042\u308c\u3070\u3001\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u304c\u30b5\u30a4\u30d0\u30fc\u30c8\u30e9\u30b9\u30c8\u3092\u3082\u305f\u3089\u3059\u3068\u63a8\u6e2c\u3067\u304d\u307e\u3059\u3002\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5c02\u9580\u5bb6\u306f\u3001\u4fe1\u983c\u304c\u6bb5\u968e\u7684\u306b\u69cb\u7bc9\u3055\u308c\u308b\u3053\u3068\u3092\u793a\u3057\u3066\u304a\u308a\u3001\u4fe1\u983c\u69cb\u7bc9\u30d7\u30ed\u30bb\u30b9\u306f\u4eba\u3005\u304c\u672a\u77e5\u306e\u30a2\u30fc\u30c6\u30a3\u30d5\u30a1\u30af\u30c8\u306b\u51fa\u4f1a\u3063\u305f\u3068\u304d\u306b\u59cb\u307e\u308a\u307e\u3059\u3002\u3053\u306e\u521d\u671f\u6bb5\u968e\u306f\u521d\u671f\u4fe1\u983c\u3068\u547c\u3070\u308c\u3001\u5236\u5ea6\u7684\u3001\u500b\u4eba\u7684\u3001\u74b0\u5883\u7684\u8981\u56e0\u306b\u3088\u3063\u3066\u5f71\u97ff\u3092\u53d7\u3051\u307e\u3059\u3002.<\/p>\n\n\n\n<p>Once initial trust is established, people go through a personal experience, try the artifact, and then decide to accept or reject it. Therefore, the trust that is established after the use of an artifact is different from the initial trust that is established before the use of an artifact. That is, initial trust plays a crucial role in building trust between a user and an artifact, which can be a service, an application, or a piece of software. Therefore, we argue that initial trust formation is more relevant to understand in the context of password managers. The analytical understanding of this phenomenon contributes to the fact that the phrase that says \u201cThe first impression must be good for there to be acceptance by the receiver\u201d is a universal rule.<\/p>\n\n\n\n<p>\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u79d1\u5b66\u30b3\u30df\u30e5\u30cb\u30c6\u30a3\u306f\u73fe\u5728\u3001\u30d1\u30b9\u30ef\u30fc\u30c9\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\u306e\u88fd\u9020\u696d\u8005\u304c\u521d\u671f\u4fe1\u983c\u30e2\u30c7\u30eb\uff08ITM\uff09\u3092\u8003\u616e\u3059\u308b\u5fc5\u8981\u304c\u3042\u308b\u3053\u3068\u3092\u8a8d\u8b58\u3057\u3066\u3044\u307e\u3059\u3002\u5f7c\u3089\u306e\u7814\u7a76\u3067\u306f\u3001\u521d\u671f\u4fe1\u983c\u306b\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u4e09\u3064\u306e\u529b\u3092\u8aac\u660e\u3057\u3066\u3044\u307e\u3059\uff1a1) <strong>\u500b\u4eba\u7684<\/strong>, 2) <strong>\u5236\u5ea6\u7684<\/strong>, \u3001\u305d\u3057\u30663) <strong>\u74b0\u5883\u7684<\/strong>. <\/p>\n\n\n\n<p>\u500b\u4eba\u7684\u306a\u3082\u306e\u306f\u30e6\u30fc\u30b6\u30fc\u306b\u95a2\u9023\u3057\u3066\u304a\u308a\u3001\u4fe1\u983c\u3057\u3084\u3059\u3044\u500b\u4eba\u7684\u50be\u5411\u304c\u521d\u671f\u4fe1\u983c\u306b\u5927\u304d\u304f\u5f71\u97ff\u3057\u307e\u3059\u3002\u5236\u5ea6\u7684\u306a\u3082\u306e\u306b\u3064\u3044\u3066\u306f\u3001\u5e02\u5834\u3067\u306e\u898f\u6a21\u3001\u80fd\u529b\u3001\u8aa0\u5b9f\u3055\u3001\u5f79\u5272\u3001\u5584\u610f\u3001\u8a55\u5224\u3001\u30d6\u30e9\u30f3\u30c9\u306a\u3069\u304c\u3001\u30e6\u30fc\u30b6\u30fc\u306b\u3088\u308b\u30b5\u30fc\u30d3\u30b9\u3084\u88fd\u54c1\u306e\u8a8d\u8b58\u306b\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u53ef\u80fd\u6027\u304c\u3042\u308a\u307e\u3059\u3002\u74b0\u5883\u7684\u306a\u3082\u306e\u306b\u95a2\u3057\u3066\u306f\u3001\u30b5\u30fc\u30d3\u30b9\u306e\u69cb\u9020\u7684\u5b89\u5168\u6027\u3068\u4fe1\u983c\u6027\u306e\u5411\u4e0a\u304c\u5f37\u8abf\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u69cb\u9020\u7684\u4fdd\u8a3c\u306b\u306f\u3001\u30b5\u30fc\u30d3\u30b9\u4fdd\u8a3c\u306e\u53ef\u7528\u6027\u3001\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u30dd\u30ea\u30b7\u30fc\u3001\u7b2c\u4e09\u8005\u306e\u627f\u8a8d\u3068\u652f\u6301\u304c\u542b\u307e\u308c\u307e\u3059\u3002.<\/p>\n\n\n\n<p>\u4e0a\u8a18\u306b\u57fa\u3065\u3044\u3066\u3001\u30d1\u30b9\u30ef\u30fc\u30c9\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\u3092\u88fd\u9020\u3059\u308b\u3059\u3079\u3066\u306e\u4f01\u696d\u306f\u3001ITM\u54f2\u5b66\u306b\u57fa\u3065\u304f\u5fc5\u8981\u304c\u3042\u308a\u307e\u3059\u3002.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"the-icm-philosophy-and-the-factors-that-affect-initial-trust-in-password-managers\">ICM\u54f2\u5b66\u3068\u30d1\u30b9\u30ef\u30fc\u30c9\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\u306b\u304a\u3051\u308b\u521d\u671f\u4fe1\u983c\u306b\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u8981\u56e0<\/h2>\n\n\n<p>\u521d\u671f\u4fe1\u983c\u30e2\u30c7\u30eb\uff08ICM\uff09\u54f2\u5b66\u306f\u3001\u30a2\u30fc\u30c6\u30a3\u30d5\u30a1\u30af\u30c8\u306b\u5bfe\u3059\u308b\u521d\u671f\u4fe1\u983c\u306b\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u8981\u56e0\u3092\u7406\u89e3\u3059\u308b\u305f\u3081\u306e\u30d5\u30ec\u30fc\u30e0\u30ef\u30fc\u30af\u3067\u3059\u3002\u30d1\u30b9\u30ef\u30fc\u30c9\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\u306e\u5834\u5408\u3001ICM\u54f2\u5b66\u306f\u521d\u671f\u4fe1\u983c\u306b\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u4e8c\u3064\u306e\u4e3b\u8981\u306a\u8981\u56e0\u3092\u5f37\u8abf\u3057\u3066\u3044\u307e\u3059\uff1a\u4fe1\u983c\u3057\u3084\u3059\u3044\u500b\u4eba\u7684\u50be\u5411\u3068\u69cb\u9020\u7684\u4fdd\u8a3c\u3002.<\/p>\n\n\n\n<p>The personal propensity to trust reflects an individual\u2019s tendency to trust others in various situations. This tendency is part of a person\u2019s personality and develops during the early stage of a person\u2019s life. The propensity to trust takes two forms: faith in humanity and trust posture. In the first form, a person believes that people are trustworthy, and the second form describes a person\u2019s belief that they will be better off considering people to be trustworthy. It is suggested that the personal propensity to trust managers of passwords will represent the degree to which people have a trustworthy posture towards password managers. That is, the personal propensity to trust will affect the initial trust in the password manager.<\/p>\n\n\n\n<p>Structural guarantees, in general, are the guarantees, for example, promises, contracts, regulations, or guarantees, provided by the institutions to their clients. In a technological context, these safeguards are encryption, secure processes and procedures, third-party certifications, and the feedback mechanism. In the case of password managers, users care about their data and look for guarantees like the ones mentioned above. The structural guarantees will affect the initial trust in the password manager through the quality of service that cannot be determined without previous experience. In this situation, when an individual has no prior experience, referrals and word of mouth are the channels that influence an individual\u2019s perceptions.<\/p>\n\n\n\n<p>Individual perceptions are also affected by institutional signals. A good reputation is a guarantee of a company\u2019s integrity and goodwill, increasing the trust of potential customers even when they have no prior experience with the service provider and reducing uncertainty and risks associated with the application. The reputation of the company of the password managers will have a significant influence on the initial trust related to the password managers. So, the reputation of the company will positively affect the initial trust in the password managers. The initial trust reduces uncertainty and the risk and establishes a connection that leads to the use of a new application.<\/p>\n\n\n\n<p>\u77e5\u899a\u3055\u308c\u305f\u6709\u7528\u6027\u3068\u521d\u671f\u4fe1\u983c\u306f\u884c\u52d5\u610f\u56f3\u306b\u5f71\u97ff\u3092\u4e0e\u3048\u307e\u3059\u3002\u3057\u305f\u304c\u3063\u3066\u3001\u30d1\u30b9\u30ef\u30fc\u30c9\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\u88fd\u54c1\u3092\u751f\u6210\u3059\u308b\u74b0\u5883\u8981\u56e0\u3068\u6a5f\u95a2\u306f\u5bc6\u63a5\u306b\u95a2\u9023\u3057\u3066\u304a\u308a\u3001\u30b5\u30fc\u30d3\u30b9\u30d7\u30ed\u30d0\u30a4\u30c0\u30fc\u306b\u5b8c\u5168\u306b\u4f9d\u5b58\u3057\u3066\u304a\u308a\u3001\u30e6\u30fc\u30b6\u30fc\u306b\u306f\u4f9d\u5b58\u3057\u307e\u305b\u3093\u3002.<\/p>\n\n\n\n<p><strong>\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u304a\u3051\u308b\u521d\u671f\u4fe1\u983c\u306e\u73fe\u5728\u306e\u6982\u5ff5<\/strong><\/p>\n\n\n\n<p>In 2021, a prestigious group of cybersecurity experts from Finland\u2019s Turku University conducted a study on initial trust formation in the context of password managers and how initial trust relates to password manager adoption intention. Data was collected from 289 young adults in Europe (18-35 years old). The analysis was mainly carried out using Structural Structure Models (SEM) in SmartPLS 3.2 and with the support of SPSS v25.0. The results showed that the structural security and the reputation of the company play an important role in the initial formation of trust, but not the Personal Propensity. In conclusion, it is the last two factors, institutional and environmental, that affect initial trust, that is, the intention of users to adopt a password manager.<\/p>\n\n\n\n<p>\u30c8\u30a5\u30eb\u30af\u5927\u5b66\u306e\u5c02\u9580\u5bb6\u306f\u3001\u4ed6\u306e\u7814\u7a76\u8005\u3001\u54f2\u5b66\u8005\u3001\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5c02\u9580\u5bb6\u3068\u5171\u306b\u3001\u30d1\u30b9\u30ef\u30fc\u30c9\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\u306b\u304a\u3051\u308b\u521d\u671f\u4fe1\u983c\u306b\u306f\u307e\u3060\u591a\u304f\u306e\u8981\u56e0\u304c\u3042\u308b\u3053\u3068\u3092\u6307\u6458\u3057\u3066\u304a\u308a\u3001\u3053\u306e\u70b9\u306b\u3064\u3044\u3066\u306f\u307e\u3060\u591a\u304f\u306e\u7814\u7a76\u304c\u5fc5\u8981\u3067\u3059\u3002\u4f8b\u3048\u3070\u3001\u30d1\u30b9\u30ef\u30fc\u30c9\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\u306e\u63a1\u7528\u3068\u521d\u671f\u4fe1\u983c\u306e\u80cc\u666f\u306b\u304a\u3051\u308b\u793e\u4f1a\u7684\u898f\u7bc4\u306e\u5f79\u5272\u3092\u898b\u308b\u3053\u3068\u306f\u8208\u5473\u6df1\u3044\u3067\u3057\u3087\u3046\u3002\u3055\u3089\u306b\u3001\u4fe1\u983c\u306e\u521d\u671f\u5f62\u6210\u306b\u91cd\u8981\u306a\u5f79\u5272\u3092\u679c\u305f\u3059\u53ef\u80fd\u6027\u306e\u3042\u308b\u4ed6\u306e\u8981\u56e0\u3082\u8003\u616e\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002\u305d\u306e\u8981\u56e0\u306e\u4e00\u3064\u3068\u3057\u3066\u3001\u30d1\u30b9\u30ef\u30fc\u30c9\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\u306e\u77e5\u8b58\u304c\u3042\u308a\u307e\u3059\u3002\u8a8d\u8b58\u306f\u3001\u7279\u5b9a\u306e\u884c\u52d5\u3092\u5b9f\u884c\u3059\u308b\u305f\u3081\u306b\u5fc5\u8981\u306a\u30b9\u30ad\u30eb\u3092\u5b66\u3076\u63a8\u9032\u529b\u3067\u3042\u308b\u3053\u3068\u304c\u5224\u660e\u3057\u3066\u304a\u308a\u3001\u6027\u5225\u3082\u540c\u69d8\u3067\u3059\u3002\u5973\u6027\u306f\u7537\u6027\u3088\u308a\u3082\u521d\u671f\u4fe1\u983c\u306e\u63a1\u7528\u306b\u304a\u3044\u3066\u3088\u308a\u8981\u6c42\u304c\u53b3\u3057\u3044\u3053\u3068\u304c\u5224\u660e\u3057\u3066\u304a\u308a\u3001\u82e5\u3044\u5973\u6027\u306f\u82e5\u3044\u7537\u6027\u3088\u308a\u3082\u3055\u3089\u306b\u8981\u6c42\u304c\u53b3\u3057\u3044\u3067\u3059\u3002\u3053\u306e\u5206\u91ce\u3067\u306f\u307e\u3060\u591a\u304f\u306e\u7814\u7a76\u304c\u5fc5\u8981\u3067\u3059\u3002.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"the-current-conception-of-initial-trust-for-cybersecurity-in-the-context-of-password-managers\">\u30d1\u30b9\u30ef\u30fc\u30c9\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\u306e\u6587\u8108\u306b\u304a\u3051\u308b\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u521d\u671f\u4fe1\u983c\u306e\u73fe\u5728\u306e\u6982\u5ff5<\/h2>\n\n\n<p>In 2021, a prestigious group of cybersecurity experts from Finland\u2019s Turku University conducted a study on initial trust formation in the context of password managers and how initial trust relates to password manager adoption intention. The study collected data from 289 young adults in Europe between 18-35 years old, and the analysis was mainly carried out using Structural Structure Models (SEM) in SmartPLS3.2 and with the support of SPSS v25.0.<\/p>\n\n\n\n<p>The results showed that the structural security and the reputation of the company play an important role in the initial formation of trust, but not the Personal Propensity. In conclusion, it is the last two factors \u2013 Institutional and Environmental \u2013 that affect initial trust, that is, the intention of users to adopt a password manager.<\/p>\n\n\n\n<p>\u30c8\u30a5\u30eb\u30af\u5927\u5b66\u306e\u5c02\u9580\u5bb6\u306f\u3001\u4ed6\u306e\u7814\u7a76\u8005\u3001\u54f2\u5b66\u8005\u3001\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5c02\u9580\u5bb6\u3068\u5171\u306b\u3001\u30d1\u30b9\u30ef\u30fc\u30c9\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\u306b\u304a\u3051\u308b\u521d\u671f\u4fe1\u983c\u306b\u306f\u307e\u3060\u591a\u304f\u306e\u8981\u56e0\u304c\u3042\u308b\u3053\u3068\u3092\u6307\u6458\u3057\u3066\u304a\u308a\u3001\u3053\u306e\u70b9\u306b\u3064\u3044\u3066\u306f\u307e\u3060\u591a\u304f\u306e\u7814\u7a76\u304c\u5fc5\u8981\u3067\u3059\u3002\u4f8b\u3048\u3070\u3001\u30d1\u30b9\u30ef\u30fc\u30c9\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\u306e\u63a1\u7528\u3068\u521d\u671f\u4fe1\u983c\u306e\u80cc\u666f\u306b\u304a\u3051\u308b\u793e\u4f1a\u7684\u898f\u7bc4\u306e\u5f79\u5272\u3092\u898b\u308b\u3053\u3068\u306f\u8208\u5473\u6df1\u3044\u3067\u3057\u3087\u3046\u3002\u3055\u3089\u306b\u3001\u4fe1\u983c\u306e\u521d\u671f\u5f62\u6210\u306b\u91cd\u8981\u306a\u5f79\u5272\u3092\u679c\u305f\u3059\u53ef\u80fd\u6027\u306e\u3042\u308b\u4ed6\u306e\u8981\u56e0\u3082\u8003\u616e\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002\u4f8b\u3048\u3070\u3001\u30d1\u30b9\u30ef\u30fc\u30c9\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\u306e\u77e5\u8b58\u3067\u3059\u3002.<\/p>\n\n\n\n<p>\u8a8d\u8b58\u306f\u3001\u7279\u5b9a\u306e\u884c\u52d5\u3092\u5b9f\u884c\u3059\u308b\u305f\u3081\u306b\u5fc5\u8981\u306a\u30b9\u30ad\u30eb\u3092\u5b66\u3076\u63a8\u9032\u529b\u3067\u3042\u308b\u3053\u3068\u304c\u5224\u660e\u3057\u3066\u304a\u308a\u3001\u6027\u5225\u3082\u540c\u69d8\u3067\u3059\u3002\u5973\u6027\u306f\u7537\u6027\u3088\u308a\u3082\u521d\u671f\u4fe1\u983c\u306e\u63a1\u7528\u306b\u304a\u3044\u3066\u3088\u308a\u8981\u6c42\u304c\u53b3\u3057\u3044\u3053\u3068\u304c\u5224\u660e\u3057\u3066\u304a\u308a\u3001\u82e5\u3044\u5973\u6027\u306f\u82e5\u3044\u7537\u6027\u3088\u308a\u3082\u3055\u3089\u306b\u8981\u6c42\u304c\u53b3\u3057\u3044\u3067\u3059\u3002\u3053\u306e\u5206\u91ce\u3067\u306f\u307e\u3060\u591a\u304f\u306e\u7814\u7a76\u304c\u5fc5\u8981\u3067\u3059\u3002.<\/p>\n\n\n\n<p><strong>\u7d50\u8ad6\u3068\u3057\u3066 <\/strong><\/p>\n\n\n\n<p>\u8a3c\u62e0\u306f\u3001\u30d1\u30b9\u30ef\u30fc\u30c9\u4fdd\u8b77\u306e\u307f\u306b\u4f9d\u5b58\u3059\u308b\u3053\u3068\u304c\u5b89\u5168\u306a\u30aa\u30f3\u30e9\u30a4\u30f3\u6d3b\u52d5\u3092\u78ba\u4fdd\u3059\u308b\u306e\u306b\u5341\u5206\u3067\u306a\u3044\u3053\u3068\u3092\u793a\u3057\u3066\u3044\u307e\u3059\u3002\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5c02\u9580\u5bb6\u306f\u3001\u63a8\u6e2c\u3057\u306b\u304f\u3044\u30d1\u30b9\u30ef\u30fc\u30c9\u3092\u4f5c\u6210\u3057\u3001\u5b9a\u671f\u7684\u306b\u5909\u66f4\u3059\u308b\u3053\u3068\u3092\u63a8\u5968\u3057\u3066\u304a\u308a\u3001\u6f5c\u5728\u7684\u306a\u30cf\u30c3\u30ab\u30fc\u304b\u3089\u60c5\u5831\u3092\u4fdd\u8b77\u3057\u307e\u3059\u3002\u3053\u308c\u306f\u9aa8\u306e\u6298\u308c\u308b\u30d7\u30ed\u30bb\u30b9\u304b\u3082\u3057\u308c\u307e\u305b\u3093\u304c\u3001\u5404\u30a2\u30ab\u30a6\u30f3\u30c8\u306b\u7570\u306a\u308b\u30d1\u30b9\u30ef\u30fc\u30c9\u3092\u4f7f\u7528\u3059\u308b\u3053\u3068\u306f\u3001\u81ea\u5206\u81ea\u8eab\u3068\u30b3\u30df\u30e5\u30cb\u30c6\u30a3\u3092\u4fdd\u8b77\u3059\u308b\u305f\u3081\u306b\u5fc5\u8981\u3067\u3059\u3002\u5e78\u3044\u306a\u3053\u3068\u306b\u3001\u30d1\u30b9\u30ef\u30fc\u30c9\u3092\u52b9\u679c\u7684\u304b\u3064\u5b89\u5168\u306b\u7ba1\u7406\u3059\u308b\u65b9\u6cd5\u304c\u3042\u308a\u3001\u7d42\u308f\u308a\u306e\u306a\u3044\u30b5\u30a4\u30d0\u30fc\u6226\u4e89\u3067\u6557\u5317\u3092\u8a8d\u3081\u308b\u3053\u3068\u306a\u304f\u884c\u3046\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002\u3057\u304b\u3057\u3001\u30e6\u30fc\u30b6\u30fc\u304c\u30d1\u30b9\u30ef\u30fc\u30c9\u3092\u4f5c\u6210\u3059\u308b\u969b\u306b\u6ce8\u610f\u3092\u6020\u308b\u3068\u3001\u30b5\u30a4\u30d0\u30fc\u76d7\u96e3\u3084\u8a50\u6b3a\u306e\u88ab\u5bb3\u8005\u306b\u306a\u308b\u30ea\u30b9\u30af\u304c\u3042\u308a\u307e\u3059\u3002. <\/p>\n\n\n\n<p>\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u3092\u95b2\u89a7\u4e2d\u306b\u30c7\u30fc\u30bf\u3092\u4fdd\u8b77\u3059\u308b\u65b9\u6cd5\u306b\u3064\u3044\u3066\u306e\u8a73\u7d30\u306f\u3001\u3053\u306e\u30c8\u30d4\u30c3\u30af\u306b\u95a2\u3059\u308b\u4ed6\u306e\u8a18\u4e8b\u3092\u53c2\u7167\u3057\u3066\u304f\u3060\u3055\u3044\u3002.<\/p>","protected":false},"excerpt":{"rendered":"<p>\u30e6\u30fc\u30b6\u30fc\u540d\u3068\u30d1\u30b9\u30ef\u30fc\u30c9\u306f\u9577\u3044\u9593\u3001\u8a8d\u8a3c\u306e\u4e00\u624b\u6bb5\u3068\u3057\u3066\u4f7f\u308f\u308c\u3066\u304d\u305f\u3002\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u5c02\u9580\u5bb6\u306f\u3001\u30e6\u30fc\u30b6\u30fc\u306b\u5bfe\u3057\u3066... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ja\/%e3%83%91%e3%82%b9%e3%83%af%e3%83%bc%e3%83%89%e3%83%9e%e3%83%8d%e3%83%bc%e3%82%b8%e3%83%a3%e3%83%bc\/%e8%8b%a5%e5%b9%b4%e5%b1%a4%e3%81%ab%e3%81%8a%e3%81%91%e3%82%8b%e3%83%91%e3%82%b9%e3%83%af%e3%83%bc%e3%83%89%e3%83%9e%e3%83%8d%e3%83%bc%e3%82%b8%e3%83%a3%e3%83%bc%e3%81%ae%e6%8e%a1%e7%94%a8%e6%84%8f\/\">\u7d9a\u304d\u3092\u8aad\u3080 <span class=\"screen-reader-text\">\u82e5\u5e74\u5c64\u306b\u304a\u3051\u308b\u30d1\u30b9\u30ef\u30fc\u30c9\u7ba1\u7406\u30bd\u30d5\u30c8\u306e\u5c0e\u5165\u610f\u5411\u3068\u4fe1\u983c\u5ea6<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":1431,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[24],"tags":[],"class_list":["post-1423","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-password-manager","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Trust in Password Manager Adoption Among Young Adults<\/title>\n<meta name=\"description\" content=\"Explore the role of initial trust in password manager adoption among young adults. Learn how to protect yourself from cybertheft and fraud.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ja\/\u30d1\u30b9\u30ef\u30fc\u30c9\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\/\u82e5\u5e74\u5c64\u306b\u304a\u3051\u308b\u30d1\u30b9\u30ef\u30fc\u30c9\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\u306e\u63a1\u7528\u610f\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Trust in Password Manager Adoption Among Young Adults\" \/>\n<meta property=\"og:description\" content=\"Explore the role of initial trust in password manager adoption among young adults. Learn how to protect yourself from cybertheft and fraud.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ja\/\u30d1\u30b9\u30ef\u30fc\u30c9\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\/\u82e5\u5e74\u5c64\u306b\u304a\u3051\u308b\u30d1\u30b9\u30ef\u30fc\u30c9\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\u306e\u63a1\u7528\u610f\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-18T14:25:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Password-Managers-and-Trust-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"662\" \/>\n\t<meta property=\"og:image:height\" content=\"327\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u57f7\u7b46\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"10\u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"The trust in Password manager adoption intention among young adults\",\"datePublished\":\"2023-02-18T14:25:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/\"},\"wordCount\":2001,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Password-Managers-and-Trust-1.jpg\",\"articleSection\":[\"Password Manager\"],\"inLanguage\":\"ja\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/\",\"url\":\"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/\",\"name\":\"Trust in Password Manager Adoption Among Young Adults\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Password-Managers-and-Trust-1.jpg\",\"datePublished\":\"2023-02-18T14:25:47+00:00\",\"description\":\"Explore the role of initial trust in password manager adoption among young adults. Learn how to protect yourself from cybertheft and fraud.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Password-Managers-and-Trust-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Password-Managers-and-Trust-1.jpg\",\"width\":662,\"height\":327,\"caption\":\"Password Managers and Trust\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The trust in Password manager adoption intention among young adults\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Your Gateway to Cyber Safety\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/ja\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u82e5\u8005\u306e\u9593\u3067\u306e\u30d1\u30b9\u30ef\u30fc\u30c9\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\u63a1\u7528\u3078\u306e\u4fe1\u983c","description":"\u82e5\u8005\u306e\u9593\u3067\u306e\u30d1\u30b9\u30ef\u30fc\u30c9\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\u63a1\u7528\u306b\u304a\u3051\u308b\u521d\u671f\u4fe1\u983c\u306e\u5f79\u5272\u3092\u63a2\u308b\u3002\u30b5\u30a4\u30d0\u30fc\u76d7\u96e3\u3084\u8a50\u6b3a\u304b\u3089\u81ea\u5206\u3092\u5b88\u308b\u65b9\u6cd5\u3092\u5b66\u3073\u307e\u3057\u3087\u3046\u3002.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ja\/\u30d1\u30b9\u30ef\u30fc\u30c9\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\/\u82e5\u5e74\u5c64\u306b\u304a\u3051\u308b\u30d1\u30b9\u30ef\u30fc\u30c9\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\u306e\u63a1\u7528\u610f\/","og_locale":"ja_JP","og_type":"article","og_title":"Trust in Password Manager Adoption Among Young Adults","og_description":"Explore the role of initial trust in password manager adoption among young adults. Learn how to protect yourself from cybertheft and fraud.","og_url":"https:\/\/securitybriefing.net\/ja\/\u30d1\u30b9\u30ef\u30fc\u30c9\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\/\u82e5\u5e74\u5c64\u306b\u304a\u3051\u308b\u30d1\u30b9\u30ef\u30fc\u30c9\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\u306e\u63a1\u7528\u610f\/","og_site_name":"Security Briefing","article_published_time":"2023-02-18T14:25:47+00:00","og_image":[{"width":662,"height":327,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Password-Managers-and-Trust-1.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"\u57f7\u7b46\u8005":"security","\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"10\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"The trust in Password manager adoption intention among young adults","datePublished":"2023-02-18T14:25:47+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/"},"wordCount":2001,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Password-Managers-and-Trust-1.jpg","articleSection":["Password Manager"],"inLanguage":"ja"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/","url":"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/","name":"\u82e5\u8005\u306e\u9593\u3067\u306e\u30d1\u30b9\u30ef\u30fc\u30c9\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\u63a1\u7528\u3078\u306e\u4fe1\u983c","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Password-Managers-and-Trust-1.jpg","datePublished":"2023-02-18T14:25:47+00:00","description":"\u82e5\u8005\u306e\u9593\u3067\u306e\u30d1\u30b9\u30ef\u30fc\u30c9\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\u63a1\u7528\u306b\u304a\u3051\u308b\u521d\u671f\u4fe1\u983c\u306e\u5f79\u5272\u3092\u63a2\u308b\u3002\u30b5\u30a4\u30d0\u30fc\u76d7\u96e3\u3084\u8a50\u6b3a\u304b\u3089\u81ea\u5206\u3092\u5b88\u308b\u65b9\u6cd5\u3092\u5b66\u3073\u307e\u3057\u3087\u3046\u3002.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Password-Managers-and-Trust-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Password-Managers-and-Trust-1.jpg","width":662,"height":327,"caption":"Password Managers and Trust"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"The trust in Password manager adoption intention among young adults"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30d6\u30ea\u30fc\u30d5\u30a3\u30f3\u30b0","description":"\u30b5\u30a4\u30d0\u30fc\u30bb\u30fc\u30d5\u30c6\u30a3\u3078\u306e\u30b2\u30fc\u30c8\u30a6\u30a7\u30a4","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30d6\u30ea\u30fc\u30d5\u30a3\u30f3\u30b0","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"\u30ac\u30d0\u30e1\u30f3\u30c8\u30fb\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u8a8c\u306e\u30b7\u30cb\u30a2\u30fb\u30b9\u30bf\u30c3\u30d5\u30fb\u30e9\u30a4\u30bf\u30fc\u3002\u4ee5\u524d\u306fPYMNTS\u3068The Bay State Banner\u306b\u5bc4\u7a3f\u3057\u3001\u30ab\u30fc\u30cd\u30ae\u30fc\u30e1\u30ed\u30f3\u5927\u5b66\u3067\u30af\u30ea\u30a8\u30a4\u30c6\u30a3\u30d6\u30fb\u30e9\u30a4\u30c6\u30a3\u30f3\u30b0\u306e\u5b66\u58eb\u53f7\u3092\u53d6\u5f97\u3002\u30dc\u30b9\u30c8\u30f3\u90ca\u5916\u306b\u62e0\u70b9\u3092\u7f6e\u304f\u3002","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/ja\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/posts\/1423","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/comments?post=1423"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/posts\/1423\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/media\/1431"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/media?parent=1423"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/categories?post=1423"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/tags?post=1423"}],"curies":[{"name":"\u30ef\u30fc\u30c9\u30d7\u30ec\u30b9","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}