{"id":1423,"date":"2023-02-18T14:25:47","date_gmt":"2023-02-18T14:25:47","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1423"},"modified":"2023-02-18T14:25:47","modified_gmt":"2023-02-18T14:25:47","slug":"su-tin-tuong-vao-y-dinh-su-dung-trinh-quan-ly-mat-khau-trong-gioi-tre","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/vi\/quan-ly-mat-khau\/su-tin-tuong-vao-y-dinh-su-dung-trinh-quan-ly-mat-khau-trong-gioi-tre\/","title":{"rendered":"Ni\u1ec1m tin v\u00e0o \u00fd \u0111\u1ecbnh \u00e1p d\u1ee5ng Tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u \u1edf nh\u1eefng ng\u01b0\u1eddi tr\u1ebb tu\u1ed5i"},"content":{"rendered":"<p>T\u00ean ng\u01b0\u1eddi d\u00f9ng v\u00e0 m\u1eadt kh\u1ea9u t\u1eeb l\u00e2u \u0111\u00e3 \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng nh\u01b0 m\u1ed9t h\u00ecnh th\u1ee9c x\u00e1c th\u1ef1c, v\u00e0 m\u1eb7c d\u00f9 c\u00f3 t\u1ea5t c\u1ea3 c\u00e1c v\u1ea5n \u0111\u1ec1 \u0111\u00e3 bi\u1ebft v\u1edbi m\u1eadt kh\u1ea9u, ch\u00fang v\u1eabn l\u00e0 l\u1ef1a ch\u1ecdn ch\u00ednh. C\u00e1c chuy\u00ean gia an ninh m\u1ea1ng khuy\u00ean ng\u01b0\u1eddi d\u00f9ng t\u1ea1o m\u1eadt kh\u1ea9u kh\u00f3 \u0111o\u00e1n v\u00e0 kh\u00f4ng s\u1eed d\u1ee5ng l\u1ea1i ch\u00fang tr\u00ean c\u00e1c t\u00e0i kho\u1ea3n kh\u00e1c nhau. C\u00e1c khuy\u1ebfn ngh\u1ecb kh\u00e1c bao g\u1ed3m thay \u0111\u1ed5i m\u1eadt kh\u1ea9u \u0111\u1ecbnh k\u1ef3 v\u00e0 kh\u00f4ng vi\u1ebft ch\u00fang xu\u1ed1ng ho\u1eb7c l\u01b0u tr\u1eef ch\u00fang tr\u00ean \u0111i\u1ec7n tho\u1ea1i ho\u1eb7c m\u00e1y t\u00ednh c\u1ee7a ng\u01b0\u1eddi d\u00f9ng.<\/p>\n\n\n\n<p>Nh\u1eefng m\u1eb9o n\u00e0y, khi \u0111\u01b0\u1ee3c khuy\u1ebfn ngh\u1ecb c\u00f9ng nhau, \u0111\u1eb7t ng\u01b0\u1eddi d\u00f9ng v\u00e0o t\u00ecnh hu\u1ed1ng kh\u00f3 kh\u0103n. M\u1eadt kh\u1ea9u kh\u00f3 \u0111o\u00e1n \u0111\u1ed1i v\u1edbi k\u1ebb t\u1ea5n c\u00f4ng c\u0169ng c\u00f3 th\u1ec3 kh\u00f3 nh\u1edb \u0111\u1ed1i v\u1edbi ng\u01b0\u1eddi d\u00f9ng. Khi s\u1ed1 l\u01b0\u1ee3ng t\u00e0i kho\u1ea3n t\u0103ng l\u00ean, nh\u01b0 hi\u1ec7n nay, ng\u01b0\u1eddi d\u00f9ng ph\u1ea3i t\u1ea1o v\u00e0 nh\u1edb nhi\u1ec1u m\u1eadt kh\u1ea9u h\u01a1n bao gi\u1edd h\u1ebft. T\u00ecnh h\u00ecnh tr\u1edf n\u00ean kh\u00f3 kh\u0103n h\u01a1n khi ng\u01b0\u1eddi d\u00f9ng \u0111\u01b0\u1ee3c y\u00eau c\u1ea7u thay \u0111\u1ed5i m\u1eadt kh\u1ea9u \u0111\u1ecbnh k\u1ef3 v\u00e0 kh\u00f4ng vi\u1ebft ch\u00fang xu\u1ed1ng b\u1ea5t k\u1ef3 \u0111\u00e2u.<\/p>\n\n\n\n<p>T\u1ea5t c\u1ea3 nh\u1eefng \u0111i\u1ec1u n\u00e0y c\u00f9ng nhau t\u1ea1o ra m\u1ed9t g\u00e1nh n\u1eb7ng nh\u1eadn th\u1ee9c l\u1edbn cho ng\u01b0\u1eddi d\u00f9ng. \u0110i\u1ec1u n\u00e0y c\u00f3 th\u1ec3 d\u1eabn \u0111\u1ebfn vi\u1ec7c ng\u01b0\u1eddi d\u00f9ng t\u1ea1o ra m\u1eadt kh\u1ea9u y\u1ebfu h\u01a1n, d\u1ec5 nh\u1edb v\u00e0 s\u1eed d\u1ee5ng l\u1ea1i ch\u00fang tr\u00ean c\u00e1c t\u00e0i kho\u1ea3n kh\u00e1c nhau, g\u00e2y ra c\u00e1c v\u1ea5n \u0111\u1ec1 v\u1ec1 an ninh m\u1ea1ng.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"password-managers-and-trust-improving-cybersecurity-habits\">Tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u v\u00e0 s\u1ef1 tin t\u01b0\u1edfng: C\u1ea3i thi\u1ec7n th\u00f3i quen an ninh m\u1ea1ng<\/h2>\n\n\n<p>Tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u l\u00e0 m\u1ed9t c\u00f4ng c\u1ee5 ho\u1eb7c ph\u1ea7n m\u1ec1m gi\u00fap gi\u1ea3m b\u1edbt g\u00e1nh n\u1eb7ng nh\u1eadn th\u1ee9c cho ng\u01b0\u1eddi d\u00f9ng trong vi\u1ec7c t\u1ea1o v\u00e0 nh\u1edb nhi\u1ec1u th\u00f4ng tin \u0111\u0103ng nh\u1eadp duy nh\u1ea5t, ch\u1eb3ng h\u1ea1n nh\u01b0 t\u00ean ng\u01b0\u1eddi d\u00f9ng v\u00e0 m\u1eadt kh\u1ea9u, b\u1eb1ng c\u00e1ch t\u1ef1 \u0111\u1ed9ng t\u1ea1o, l\u01b0u tr\u1eef v\u00e0 ho\u00e0n th\u00e0nh th\u00f4ng tin \u0111\u0103ng nh\u1eadp c\u1ea7n thi\u1ebft khi c\u1ea7n. Tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u t\u1ea1o ra m\u1eadt kh\u1ea9u duy nh\u1ea5t v\u00e0 m\u1ea1nh m\u1ebd d\u1ef1a tr\u00ean c\u00e1c quy t\u1eafc mong mu\u1ed1n, ch\u1eb3ng h\u1ea1n nh\u01b0 \u0111\u1ed9 d\u00e0i, lo\u1ea1i k\u00fd t\u1ef1 v\u00e0 b\u1ea5t k\u1ef3 thu\u1ed9c t\u00ednh \u0111\u1eb7c bi\u1ec7t n\u00e0o kh\u00e1c, cho m\u1ed7i t\u00e0i kho\u1ea3n. Tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u th\u1ef1c s\u1ef1 l\u00e0 m\u1ed9t trong nh\u1eefng bi\u1ec7n ph\u00e1p ph\u1ed5 bi\u1ebfn nh\u1ea5t trong s\u1ed1 c\u00e1c chuy\u00ean gia an ninh m\u1ea1ng. Tuy nhi\u00ean, ch\u00fang ch\u01b0a \u0111\u1ea1t \u0111\u01b0\u1ee3c s\u1ef1 ph\u1ed5 bi\u1ebfn t\u01b0\u01a1ng t\u1ef1 \u0111\u1ed1i v\u1edbi ng\u01b0\u1eddi d\u00f9ng th\u00f4ng th\u01b0\u1eddng.<\/p>\n\n\n\n<p>V\u00ed d\u1ee5, v\u00e0o n\u0103m 2015, khi tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u l\u00e0 m\u1ed9t trong 5 bi\u1ec7n ph\u00e1p h\u00e0ng \u0111\u1ea7u \u0111\u01b0\u1ee3c c\u00e1c chuy\u00ean gia an ninh m\u1ea1ng \u00e1p d\u1ee5ng, ch\u1ec9 c\u00f3 24% ng\u01b0\u1eddi d\u00f9ng th\u00f4ng th\u01b0\u1eddng s\u1eed d\u1ee5ng tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u. T\u00ecnh h\u00ecnh d\u01b0\u1eddng nh\u01b0 c\u00f2n t\u1ed3i t\u1ec7 h\u01a1n ng\u00e0y nay, khi c\u00e1c nghi\u00ean c\u1ee9u g\u1ea7n \u0111\u00e2y so s\u00e1nh c\u00e1c th\u1ef1c h\u00e0nh b\u1ea3o m\u1eadt c\u1ee7a c\u00e1c chuy\u00ean gia an ninh m\u1ea1ng v\u00e0 ng\u01b0\u1eddi d\u00f9ng cho th\u1ea5y ch\u1ec9 c\u00f3 31% ng\u01b0\u1eddi tr\u1ea3 l\u1eddi s\u1eed d\u1ee5ng tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u.<\/p>\n\n\n\n<p>\u0110\u1ec3 hi\u1ec3u l\u00fd do cho s\u1ef1 kh\u00f4ng ph\u1ed5 bi\u1ebfn c\u1ee7a tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u trong s\u1ed1 ng\u01b0\u1eddi d\u00f9ng, c\u00e1c nghi\u00ean c\u1ee9u \u0111\u00e3 \u0111\u01b0\u1ee3c th\u1ef1c hi\u1ec7n \u0111\u1ec3 x\u00e1c \u0111\u1ecbnh c\u00e1c y\u1ebfu t\u1ed1 ng\u0103n c\u1ea3n ng\u01b0\u1eddi d\u00f9ng s\u1eed d\u1ee5ng tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u. Ni\u1ec1m tin \u0111\u00e3 \u0111\u01b0\u1ee3c t\u00ecm th\u1ea5y l\u00e0 m\u1ed9t trong nh\u1eefng l\u00fd do ch\u00ednh khi\u1ebfn m\u1ecdi ng\u01b0\u1eddi kh\u00f4ng s\u1eed d\u1ee5ng \u1ee9ng d\u1ee5ng qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u. \u0110i\u1ec1u n\u00e0y d\u1ef1a tr\u00ean m\u1ed9t s\u1ed1 \u00edt nghi\u00ean c\u1ee9u \u0111\u00e3 \u0111\u01b0\u1ee3c th\u1ef1c hi\u1ec7n tr\u00ean ng\u01b0\u1eddi d\u00f9ng th\u00f4ng th\u01b0\u1eddng.<\/p>\n\n\n\n<p>C\u00e1c nh\u00e0 nghi\u00ean c\u1ee9u an ninh m\u1ea1ng \u0111\u00e3 x\u00e1c \u0111\u1ecbnh c\u00e1c y\u1ebfu t\u1ed1 th\u00fac \u0111\u1ea9y vi\u1ec7c \u00e1p d\u1ee5ng tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u v\u00e0 th\u1ea5y r\u1eb1ng ni\u1ec1m tin c\u00f3 t\u00e1c \u0111\u1ed9ng t\u00edch c\u1ef1c \u0111\u1ebfn \u00fd \u0111\u1ecbnh \u00e1p d\u1ee5ng tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u. C\u00e1c nghi\u00ean c\u1ee9u cho th\u1ea5y m\u1ecdi ng\u01b0\u1eddi kh\u00f4ng \u00e1p d\u1ee5ng tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u do thi\u1ebfu ni\u1ec1m tin. Do \u0111\u00f3, ni\u1ec1m tin \u0111\u00e3 \u0111\u01b0\u1ee3c \u0111\u1ec1 xu\u1ea5t l\u00e0 b\u01b0\u1edbc \u0111\u1ea7u ti\u00ean \u0111\u1ec3 t\u0103ng c\u01b0\u1eddng vi\u1ec7c \u00e1p d\u1ee5ng tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u.<\/p>\n\n\n\n<p>M\u1eb7c d\u00f9 ni\u1ec1m tin \u0111\u00e3 \u0111\u01b0\u1ee3c t\u00ecm th\u1ea5y l\u00e0 m\u1ed9t y\u1ebfu t\u1ed1 quan tr\u1ecdng trong vi\u1ec7c \u00e1p d\u1ee5ng tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u, c\u00e1ch th\u1ee9c thi\u1ebft l\u1eadp ni\u1ec1m tin v\u1eabn ch\u01b0a \u0111\u01b0\u1ee3c \u0111i\u1ec1u tra. V\u00ec \u0111i\u1ec1u n\u00e0y, \u0111i\u1ec1u quan tr\u1ecdng l\u00e0 ph\u1ea3i hi\u1ec3u c\u00e1c y\u1ebfu t\u1ed1 c\u1ea3i thi\u1ec7n ni\u1ec1m tin v\u00e0 \u1ee7ng h\u1ed9 m\u1ed1i quan h\u1ec7 c\u1ee7a ch\u00fang v\u1edbi vi\u1ec7c \u00e1p d\u1ee5ng. \u0110i\u1ec1u n\u00e0y d\u1eabn \u0111\u1ebfn k\u1ebft lu\u1eadn r\u1eb1ng c\u01a1 s\u1edf \u0111\u1ec3 k\u00edch th\u00edch ni\u1ec1m tin l\u00e0 l\u00e0m vi\u1ec7c tr\u00ean c\u00e1i g\u1ecdi l\u00e0 \u201cNi\u1ec1m tin ban \u0111\u1ea7u\u201d.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"trust-as-a-consequence-of-security-the-importance-of-initial-trust-in-password-manager-adoption\">Ni\u1ec1m tin nh\u01b0 m\u1ed9t h\u1ec7 qu\u1ea3 c\u1ee7a b\u1ea3o m\u1eadt: T\u1ea7m quan tr\u1ecdng c\u1ee7a Ni\u1ec1m tin ban \u0111\u1ea7u trong vi\u1ec7c \u00e1p d\u1ee5ng tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u<\/h2>\n\n\n<p>Ni\u1ec1m tin kh\u00f4ng \u0111\u01b0\u1ee3c ban h\u00e0nh, n\u00f3 \u0111\u01b0\u1ee3c x\u00e2y d\u1ef1ng, v\u00e0 \u0111\u1ec3 thi\u1ebft l\u1eadp ni\u1ec1m tin gi\u1eefa m\u1ed9t c\u00e1 nh\u00e2n v\u00e0 m\u1ed9t hi\u1ec7n v\u1eadt, \u0111i\u1ec1u quan tr\u1ecdng l\u00e0 ph\u1ea3i hi\u1ec3u c\u00e1ch ni\u1ec1m tin \u0111\u01b0\u1ee3c kh\u1edfi t\u1ea1o, x\u00e2y d\u1ef1ng v\u00e0 c\u1ea3i thi\u1ec7n. N\u1ebfu b\u1ea3o m\u1eadt d\u1eabn \u0111\u1ebfn ni\u1ec1m tin, th\u00ec c\u00f3 th\u1ec3 suy ra r\u1eb1ng an ninh m\u1ea1ng d\u1eabn \u0111\u1ebfn ni\u1ec1m tin m\u1ea1ng. C\u00e1c chuy\u00ean gia an ninh m\u1ea1ng \u0111\u00e3 ch\u1ec9 ra r\u1eb1ng ni\u1ec1m tin \u0111\u01b0\u1ee3c x\u00e2y d\u1ef1ng theo giai \u0111o\u1ea1n, v\u00e0 qu\u00e1 tr\u00ecnh x\u00e2y d\u1ef1ng ni\u1ec1m tin b\u1eaft \u0111\u1ea7u khi m\u1ecdi ng\u01b0\u1eddi g\u1eb7p ph\u1ea3i m\u1ed9t hi\u1ec7n v\u1eadt ch\u01b0a bi\u1ebft. Giai \u0111o\u1ea1n ban \u0111\u1ea7u n\u00e0y \u0111\u01b0\u1ee3c g\u1ecdi l\u00e0 Ni\u1ec1m tin ban \u0111\u1ea7u, b\u1ecb \u1ea3nh h\u01b0\u1edfng b\u1edfi c\u00e1c y\u1ebfu t\u1ed1 th\u1ec3 ch\u1ebf, c\u00e1 nh\u00e2n v\u00e0 m\u00f4i tr\u01b0\u1eddng.<\/p>\n\n\n\n<p>Khi ni\u1ec1m tin ban \u0111\u1ea7u \u0111\u01b0\u1ee3c thi\u1ebft l\u1eadp, m\u1ecdi ng\u01b0\u1eddi tr\u1ea3i qua m\u1ed9t tr\u1ea3i nghi\u1ec7m c\u00e1 nh\u00e2n, th\u1eed nghi\u1ec7m hi\u1ec7n v\u1eadt v\u00e0 sau \u0111\u00f3 quy\u1ebft \u0111\u1ecbnh ch\u1ea5p nh\u1eadn ho\u1eb7c t\u1eeb ch\u1ed1i n\u00f3. Do \u0111\u00f3, ni\u1ec1m tin \u0111\u01b0\u1ee3c thi\u1ebft l\u1eadp sau khi s\u1eed d\u1ee5ng m\u1ed9t hi\u1ec7n v\u1eadt kh\u00e1c v\u1edbi ni\u1ec1m tin ban \u0111\u1ea7u \u0111\u01b0\u1ee3c thi\u1ebft l\u1eadp tr\u01b0\u1edbc khi s\u1eed d\u1ee5ng m\u1ed9t hi\u1ec7n v\u1eadt. \u0110\u00f3 l\u00e0, ni\u1ec1m tin ban \u0111\u1ea7u \u0111\u00f3ng vai tr\u00f2 quan tr\u1ecdng trong vi\u1ec7c x\u00e2y d\u1ef1ng ni\u1ec1m tin gi\u1eefa ng\u01b0\u1eddi d\u00f9ng v\u00e0 hi\u1ec7n v\u1eadt, c\u00f3 th\u1ec3 l\u00e0 m\u1ed9t d\u1ecbch v\u1ee5, m\u1ed9t \u1ee9ng d\u1ee5ng ho\u1eb7c m\u1ed9t ph\u1ea7n m\u1ec1m. Do \u0111\u00f3, ch\u00fang t\u00f4i cho r\u1eb1ng vi\u1ec7c h\u00ecnh th\u00e0nh ni\u1ec1m tin ban \u0111\u1ea7u c\u00f3 li\u00ean quan h\u01a1n \u0111\u1ec3 hi\u1ec3u trong b\u1ed1i c\u1ea3nh c\u1ee7a tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u. S\u1ef1 hi\u1ec3u bi\u1ebft ph\u00e2n t\u00edch v\u1ec1 hi\u1ec7n t\u01b0\u1ee3ng n\u00e0y \u0111\u00f3ng g\u00f3p v\u00e0o th\u1ef1c t\u1ebf r\u1eb1ng c\u00e2u n\u00f3i \u201c\u1ea4n t\u01b0\u1ee3ng \u0111\u1ea7u ti\u00ean ph\u1ea3i t\u1ed1t \u0111\u1ec3 c\u00f3 s\u1ef1 ch\u1ea5p nh\u1eadn t\u1eeb ng\u01b0\u1eddi nh\u1eadn\u201d l\u00e0 m\u1ed9t quy t\u1eafc ph\u1ed5 qu\u00e1t.<\/p>\n\n\n\n<p>C\u1ed9ng \u0111\u1ed3ng khoa h\u1ecdc v\u1ec1 an ninh m\u1ea1ng hi\u1ec7n \u0111\u00e3 c\u00f4ng nh\u1eadn r\u1eb1ng b\u1ea5t k\u1ef3 nh\u00e0 s\u1ea3n xu\u1ea5t tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u n\u00e0o c\u0169ng ph\u1ea3i xem x\u00e9t M\u00f4 h\u00ecnh Ni\u1ec1m tin Ban \u0111\u1ea7u (ITM). Trong c\u00f4ng vi\u1ec7c c\u1ee7a h\u1ecd, h\u1ecd \u0111\u00e3 m\u00f4 t\u1ea3 ba l\u1ef1c l\u01b0\u1ee3ng \u1ea3nh h\u01b0\u1edfng \u0111\u1ebfn ni\u1ec1m tin ban \u0111\u1ea7u: 1) <strong>C\u00e1 nh\u00e2n<\/strong>, 2) <strong>Th\u1ec3 ch\u1ebf<\/strong>, v\u00e0 3) <strong>M\u00f4i tr\u01b0\u1eddng<\/strong>. <\/p>\n\n\n\n<p>C\u00e1 nh\u00e2n li\u00ean quan \u0111\u1ebfn ng\u01b0\u1eddi d\u00f9ng, trong \u0111\u00f3 xu h\u01b0\u1edbng c\u00e1 nh\u00e2n \u0111\u1ec3 tin t\u01b0\u1edfng \u1ea3nh h\u01b0\u1edfng \u0111\u00e1ng k\u1ec3 \u0111\u1ebfn ni\u1ec1m tin ban \u0111\u1ea7u. V\u1ec1 Th\u1ec3 ch\u1ebf, n\u00f3 \u0111\u1ec1 c\u1eadp \u0111\u1ebfn quy m\u00f4, n\u0103ng l\u1ef1c, t\u00ednh to\u00e0n v\u1eb9n, vai tr\u00f2 tr\u00ean th\u1ecb tr\u01b0\u1eddng, l\u00f2ng t\u1ed1t, danh ti\u1ebfng v\u00e0\/ho\u1eb7c th\u01b0\u01a1ng hi\u1ec7u, \u0111i\u1ec1u n\u00e0y c\u0169ng c\u00f3 th\u1ec3 \u1ea3nh h\u01b0\u1edfng \u0111\u1ebfn nh\u1eadn th\u1ee9c c\u1ee7a ng\u01b0\u1eddi d\u00f9ng v\u1ec1 d\u1ecbch v\u1ee5 ho\u1eb7c s\u1ea3n ph\u1ea9m c\u1ee7a m\u1ed9t t\u1ed5 ch\u1ee9c. V\u00e0 v\u1ec1 M\u00f4i tr\u01b0\u1eddng, h\u1ecd nh\u1ea5n m\u1ea1nh s\u1ef1 an to\u00e0n c\u1ea5u tr\u00fac v\u00e0 \u0111\u1ed9 tin c\u1eady \u0111\u01b0\u1ee3c c\u1ea3i thi\u1ec7n c\u1ee7a d\u1ecbch v\u1ee5. C\u00e1c \u0111\u1ea3m b\u1ea3o c\u1ea5u tr\u00fac bao g\u1ed3m s\u1ef1 s\u1eb5n c\u00f3 c\u1ee7a c\u00e1c \u0111\u1ea3m b\u1ea3o d\u1ecbch v\u1ee5, ch\u00ednh s\u00e1ch b\u1ea3o m\u1eadt, s\u1ef1 c\u00f4ng nh\u1eadn v\u00e0 ch\u1ee9ng th\u1ef1c c\u1ee7a b\u00ean th\u1ee9 ba.<\/p>\n\n\n\n<p>D\u1ef1a tr\u00ean nh\u1eefng \u0111i\u1ec1u tr\u00ean, t\u1ea5t c\u1ea3 c\u00e1c c\u00f4ng ty s\u1ea3n xu\u1ea5t tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u ph\u1ea3i d\u1ef1a tr\u00ean tri\u1ebft l\u00fd ITM.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"the-icm-philosophy-and-the-factors-that-affect-initial-trust-in-password-managers\">Tri\u1ebft l\u00fd ICM v\u00e0 c\u00e1c y\u1ebfu t\u1ed1 \u1ea3nh h\u01b0\u1edfng \u0111\u1ebfn ni\u1ec1m tin ban \u0111\u1ea7u trong tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u<\/h2>\n\n\n<p>Tri\u1ebft l\u00fd M\u00f4 h\u00ecnh Ni\u1ec1m tin Ban \u0111\u1ea7u (ICM) l\u00e0 m\u1ed9t khung \u0111\u1ec3 hi\u1ec3u c\u00e1c y\u1ebfu t\u1ed1 \u1ea3nh h\u01b0\u1edfng \u0111\u1ebfn ni\u1ec1m tin ban \u0111\u1ea7u v\u00e0o m\u1ed9t hi\u1ec7n v\u1eadt. Trong tr\u01b0\u1eddng h\u1ee3p c\u1ee7a tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u, tri\u1ebft l\u00fd ICM nh\u1ea5n m\u1ea1nh hai y\u1ebfu t\u1ed1 ch\u00ednh \u1ea3nh h\u01b0\u1edfng \u0111\u1ebfn ni\u1ec1m tin ban \u0111\u1ea7u: xu h\u01b0\u1edbng c\u00e1 nh\u00e2n \u0111\u1ec3 tin t\u01b0\u1edfng v\u00e0 c\u00e1c \u0111\u1ea3m b\u1ea3o c\u1ea5u tr\u00fac.<\/p>\n\n\n\n<p>Xu h\u01b0\u1edbng c\u00e1 nh\u00e2n \u0111\u1ec3 tin t\u01b0\u1edfng ph\u1ea3n \u00e1nh xu h\u01b0\u1edbng c\u1ee7a m\u1ed9t c\u00e1 nh\u00e2n \u0111\u1ec3 tin t\u01b0\u1edfng ng\u01b0\u1eddi kh\u00e1c trong c\u00e1c t\u00ecnh hu\u1ed1ng kh\u00e1c nhau. Xu h\u01b0\u1edbng n\u00e0y l\u00e0 m\u1ed9t ph\u1ea7n c\u1ee7a t\u00ednh c\u00e1ch c\u1ee7a m\u1ed9t ng\u01b0\u1eddi v\u00e0 ph\u00e1t tri\u1ec3n trong giai \u0111o\u1ea1n \u0111\u1ea7u c\u1ee7a cu\u1ed9c s\u1ed1ng c\u1ee7a m\u1ed9t ng\u01b0\u1eddi. Xu h\u01b0\u1edbng \u0111\u1ec3 tin t\u01b0\u1edfng c\u00f3 hai h\u00ecnh th\u1ee9c: ni\u1ec1m tin v\u00e0o nh\u00e2n lo\u1ea1i v\u00e0 t\u01b0 th\u1ebf tin t\u01b0\u1edfng. Trong h\u00ecnh th\u1ee9c \u0111\u1ea7u ti\u00ean, m\u1ed9t ng\u01b0\u1eddi tin r\u1eb1ng m\u1ecdi ng\u01b0\u1eddi \u0111\u00e1ng tin c\u1eady, v\u00e0 h\u00ecnh th\u1ee9c th\u1ee9 hai m\u00f4 t\u1ea3 ni\u1ec1m tin c\u1ee7a m\u1ed9t ng\u01b0\u1eddi r\u1eb1ng h\u1ecd s\u1ebd t\u1ed1t h\u01a1n khi coi m\u1ecdi ng\u01b0\u1eddi l\u00e0 \u0111\u00e1ng tin c\u1eady. Ng\u01b0\u1eddi ta \u0111\u1ec1 xu\u1ea5t r\u1eb1ng xu h\u01b0\u1edbng c\u00e1 nh\u00e2n \u0111\u1ec3 tin t\u01b0\u1edfng ng\u01b0\u1eddi qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u s\u1ebd \u0111\u1ea1i di\u1ec7n cho m\u1ee9c \u0111\u1ed9 m\u00e0 m\u1ecdi ng\u01b0\u1eddi c\u00f3 t\u01b0 th\u1ebf tin t\u01b0\u1edfng \u0111\u1ed1i v\u1edbi tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u. \u0110\u00f3 l\u00e0, xu h\u01b0\u1edbng c\u00e1 nh\u00e2n \u0111\u1ec3 tin t\u01b0\u1edfng s\u1ebd \u1ea3nh h\u01b0\u1edfng \u0111\u1ebfn ni\u1ec1m tin ban \u0111\u1ea7u v\u00e0o tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u.<\/p>\n\n\n\n<p>C\u00e1c \u0111\u1ea3m b\u1ea3o c\u1ea5u tr\u00fac, n\u00f3i chung, l\u00e0 c\u00e1c \u0111\u1ea3m b\u1ea3o, v\u00ed d\u1ee5, l\u1eddi h\u1ee9a, h\u1ee3p \u0111\u1ed3ng, quy \u0111\u1ecbnh ho\u1eb7c \u0111\u1ea3m b\u1ea3o, do c\u00e1c t\u1ed5 ch\u1ee9c cung c\u1ea5p cho kh\u00e1ch h\u00e0ng c\u1ee7a h\u1ecd. Trong b\u1ed1i c\u1ea3nh c\u00f4ng ngh\u1ec7, nh\u1eefng b\u1ea3o \u0111\u1ea3m n\u00e0y l\u00e0 m\u00e3 h\u00f3a, quy tr\u00ecnh v\u00e0 th\u1ee7 t\u1ee5c an to\u00e0n, ch\u1ee9ng nh\u1eadn c\u1ee7a b\u00ean th\u1ee9 ba, v\u00e0 c\u01a1 ch\u1ebf ph\u1ea3n h\u1ed3i. Trong tr\u01b0\u1eddng h\u1ee3p c\u1ee7a tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u, ng\u01b0\u1eddi d\u00f9ng quan t\u00e2m \u0111\u1ebfn d\u1eef li\u1ec7u c\u1ee7a h\u1ecd v\u00e0 t\u00ecm ki\u1ebfm c\u00e1c \u0111\u1ea3m b\u1ea3o nh\u01b0 \u0111\u00e3 \u0111\u1ec1 c\u1eadp \u1edf tr\u00ean. C\u00e1c \u0111\u1ea3m b\u1ea3o c\u1ea5u tr\u00fac s\u1ebd \u1ea3nh h\u01b0\u1edfng \u0111\u1ebfn ni\u1ec1m tin ban \u0111\u1ea7u v\u00e0o tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u th\u00f4ng qua ch\u1ea5t l\u01b0\u1ee3ng d\u1ecbch v\u1ee5 m\u00e0 kh\u00f4ng th\u1ec3 x\u00e1c \u0111\u1ecbnh \u0111\u01b0\u1ee3c n\u1ebfu kh\u00f4ng c\u00f3 kinh nghi\u1ec7m tr\u01b0\u1edbc \u0111\u00f3. Trong t\u00ecnh hu\u1ed1ng n\u00e0y, khi m\u1ed9t c\u00e1 nh\u00e2n kh\u00f4ng c\u00f3 kinh nghi\u1ec7m tr\u01b0\u1edbc \u0111\u00f3, c\u00e1c k\u00eanh gi\u1edbi thi\u1ec7u v\u00e0 truy\u1ec1n mi\u1ec7ng l\u00e0 nh\u1eefng k\u00eanh \u1ea3nh h\u01b0\u1edfng \u0111\u1ebfn nh\u1eadn th\u1ee9c c\u1ee7a c\u00e1 nh\u00e2n.<\/p>\n\n\n\n<p>Nh\u1eadn th\u1ee9c c\u00e1 nh\u00e2n c\u0169ng b\u1ecb \u1ea3nh h\u01b0\u1edfng b\u1edfi c\u00e1c t\u00edn hi\u1ec7u th\u1ec3 ch\u1ebf. M\u1ed9t danh ti\u1ebfng t\u1ed1t l\u00e0 m\u1ed9t \u0111\u1ea3m b\u1ea3o v\u1ec1 t\u00ednh to\u00e0n v\u1eb9n v\u00e0 thi\u1ec7n ch\u00ed c\u1ee7a m\u1ed9t c\u00f4ng ty, t\u0103ng c\u01b0\u1eddng ni\u1ec1m tin c\u1ee7a kh\u00e1ch h\u00e0ng ti\u1ec1m n\u0103ng ngay c\u1ea3 khi h\u1ecd kh\u00f4ng c\u00f3 kinh nghi\u1ec7m tr\u01b0\u1edbc \u0111\u00f3 v\u1edbi nh\u00e0 cung c\u1ea5p d\u1ecbch v\u1ee5 v\u00e0 gi\u1ea3m s\u1ef1 kh\u00f4ng ch\u1eafc ch\u1eafn v\u00e0 r\u1ee7i ro li\u00ean quan \u0111\u1ebfn \u1ee9ng d\u1ee5ng. Danh ti\u1ebfng c\u1ee7a c\u00f4ng ty c\u1ee7a c\u00e1c tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u s\u1ebd c\u00f3 \u1ea3nh h\u01b0\u1edfng \u0111\u00e1ng k\u1ec3 \u0111\u1ebfn ni\u1ec1m tin ban \u0111\u1ea7u li\u00ean quan \u0111\u1ebfn tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u. V\u00ec v\u1eady, danh ti\u1ebfng c\u1ee7a c\u00f4ng ty s\u1ebd \u1ea3nh h\u01b0\u1edfng t\u00edch c\u1ef1c \u0111\u1ebfn ni\u1ec1m tin ban \u0111\u1ea7u v\u00e0o tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u. Ni\u1ec1m tin ban \u0111\u1ea7u gi\u1ea3m s\u1ef1 kh\u00f4ng ch\u1eafc ch\u1eafn v\u00e0 r\u1ee7i ro v\u00e0 thi\u1ebft l\u1eadp m\u1ed9t k\u1ebft n\u1ed1i d\u1eabn \u0111\u1ebfn vi\u1ec7c s\u1eed d\u1ee5ng m\u1ed9t \u1ee9ng d\u1ee5ng m\u1edbi.<\/p>\n\n\n\n<p>C\u1ea3 s\u1ef1 h\u1eefu \u00edch \u0111\u01b0\u1ee3c c\u1ea3m nh\u1eadn v\u00e0 ni\u1ec1m tin ban \u0111\u1ea7u \u0111\u1ec1u \u1ea3nh h\u01b0\u1edfng \u0111\u1ebfn \u00fd \u0111\u1ecbnh h\u00e0nh vi. Do \u0111\u00f3, c\u00e1c y\u1ebfu t\u1ed1 m\u00f4i tr\u01b0\u1eddng v\u00e0 c\u00e1c t\u1ed5 ch\u1ee9c t\u1ea1o ra s\u1ea3n ph\u1ea9m tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u c\u00f3 li\u00ean quan ch\u1eb7t ch\u1ebd v\u00e0 ho\u00e0n to\u00e0n ph\u1ee5 thu\u1ed9c v\u00e0o nh\u00e0 cung c\u1ea5p d\u1ecbch v\u1ee5 ch\u1ee9 kh\u00f4ng ph\u1ea3i ng\u01b0\u1eddi d\u00f9ng.<\/p>\n\n\n\n<p><strong>Quan ni\u1ec7m hi\u1ec7n t\u1ea1i v\u1ec1 ni\u1ec1m tin ban \u0111\u1ea7u cho an ninh m\u1ea1ng<\/strong><\/p>\n\n\n\n<p>V\u00e0o n\u0103m 2021, m\u1ed9t nh\u00f3m chuy\u00ean gia an ninh m\u1ea1ng uy t\u00edn t\u1eeb \u0110\u1ea1i h\u1ecdc Turku c\u1ee7a Ph\u1ea7n Lan \u0111\u00e3 th\u1ef1c hi\u1ec7n m\u1ed9t nghi\u00ean c\u1ee9u v\u1ec1 vi\u1ec7c h\u00ecnh th\u00e0nh ni\u1ec1m tin ban \u0111\u1ea7u trong b\u1ed1i c\u1ea3nh c\u1ee7a tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u v\u00e0 c\u00e1ch ni\u1ec1m tin ban \u0111\u1ea7u li\u00ean quan \u0111\u1ebfn \u00fd \u0111\u1ecbnh \u00e1p d\u1ee5ng tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u. D\u1eef li\u1ec7u \u0111\u01b0\u1ee3c thu th\u1eadp t\u1eeb 289 ng\u01b0\u1eddi tr\u1ebb tu\u1ed5i \u1edf Ch\u00e2u \u00c2u (18-35 tu\u1ed5i). Ph\u00e2n t\u00edch ch\u1ee7 y\u1ebfu \u0111\u01b0\u1ee3c th\u1ef1c hi\u1ec7n b\u1eb1ng c\u00e1ch s\u1eed d\u1ee5ng M\u00f4 h\u00ecnh C\u1ea5u tr\u00fac C\u1ea5u tr\u00fac (SEM) trong SmartPLS 3.2 v\u00e0 v\u1edbi s\u1ef1 h\u1ed7 tr\u1ee3 c\u1ee7a SPSS v25.0. K\u1ebft qu\u1ea3 cho th\u1ea5y r\u1eb1ng an ninh c\u1ea5u tr\u00fac v\u00e0 danh ti\u1ebfng c\u1ee7a c\u00f4ng ty \u0111\u00f3ng vai tr\u00f2 quan tr\u1ecdng trong vi\u1ec7c h\u00ecnh th\u00e0nh ni\u1ec1m tin ban \u0111\u1ea7u, nh\u01b0ng kh\u00f4ng ph\u1ea3i l\u00e0 Xu h\u01b0\u1edbng C\u00e1 nh\u00e2n. K\u1ebft lu\u1eadn, \u0111\u00f3 l\u00e0 hai y\u1ebfu t\u1ed1 cu\u1ed1i c\u00f9ng, Th\u1ec3 ch\u1ebf v\u00e0 M\u00f4i tr\u01b0\u1eddng, \u1ea3nh h\u01b0\u1edfng \u0111\u1ebfn ni\u1ec1m tin ban \u0111\u1ea7u, t\u1ee9c l\u00e0 \u00fd \u0111\u1ecbnh c\u1ee7a ng\u01b0\u1eddi d\u00f9ng \u0111\u1ec3 \u00e1p d\u1ee5ng tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u.<\/p>\n\n\n\n<p>C\u00e1c chuy\u00ean gia t\u1eeb \u0110\u1ea1i h\u1ecdc Turku c\u00f9ng v\u1edbi c\u00e1c nh\u00e0 nghi\u00ean c\u1ee9u, tri\u1ebft gia v\u00e0 chuy\u00ean gia an ninh m\u1ea1ng kh\u00e1c ch\u1ec9 ra r\u1eb1ng v\u1eabn c\u00f2n c\u00e1c y\u1ebfu t\u1ed1 trong ni\u1ec1m tin ban \u0111\u1ea7u v\u00e0o tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u, v\u00ec v\u1eady c\u00f2n nhi\u1ec1u \u0111i\u1ec1u c\u1ea7n nghi\u00ean c\u1ee9u v\u1ec1 v\u1ea5n \u0111\u1ec1 n\u00e0y, v\u00ed d\u1ee5, s\u1ebd r\u1ea5t th\u00fa v\u1ecb khi xem vai tr\u00f2 c\u1ee7a c\u00e1c chu\u1ea9n m\u1ef1c x\u00e3 h\u1ed9i trong b\u1ed1i c\u1ea3nh c\u1ee7a vi\u1ec7c \u00e1p d\u1ee5ng v\u00e0 ni\u1ec1m tin ban \u0111\u1ea7u c\u1ee7a tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u. Ngo\u00e0i ra, c\u00e1c nghi\u00ean c\u1ee9u c\u0169ng c\u00f3 th\u1ec3 xem x\u00e9t c\u00e1c y\u1ebfu t\u1ed1 kh\u00e1c c\u00f3 th\u1ec3 \u0111\u00f3ng vai tr\u00f2 quan tr\u1ecdng trong vi\u1ec7c h\u00ecnh th\u00e0nh ni\u1ec1m tin ban \u0111\u1ea7u, m\u1ed9t trong nh\u1eefng y\u1ebfu t\u1ed1 \u0111\u00f3 l\u00e0 ki\u1ebfn th\u1ee9c v\u1ec1 tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u. Nh\u1eadn th\u1ee9c \u0111\u00e3 \u0111\u01b0\u1ee3c t\u00ecm th\u1ea5y l\u00e0 m\u1ed9t l\u1ef1c l\u01b0\u1ee3ng th\u00fac \u0111\u1ea9y trong vi\u1ec7c h\u1ecdc c\u00e1c k\u1ef9 n\u0103ng c\u1ea7n thi\u1ebft \u0111\u1ec3 th\u1ef1c hi\u1ec7n m\u1ed9t lo\u1ea1i h\u00e0nh vi nh\u1ea5t \u0111\u1ecbnh, c\u0169ng nh\u01b0 gi\u1edbi t\u00ednh, v\u00ec gi\u1edbi t\u00ednh n\u1eef \u0111\u00e3 \u0111\u01b0\u1ee3c t\u00ecm th\u1ea5y l\u00e0 \u0111\u00f2i h\u1ecfi nhi\u1ec1u h\u01a1n trong vi\u1ec7c \u00e1p d\u1ee5ng ni\u1ec1m tin ban \u0111\u1ea7u so v\u1edbi gi\u1edbi t\u00ednh nam, v\u00e0 ph\u1ee5 n\u1eef tr\u1ebb th\u1eadm ch\u00ed c\u00f2n \u0111\u00f2i h\u1ecfi nhi\u1ec1u h\u01a1n so v\u1edbi nam gi\u1edbi tr\u1ebb. V\u00ec v\u1eady, trong l\u0129nh v\u1ef1c n\u00e0y, v\u1eabn c\u00f2n nhi\u1ec1u \u0111i\u1ec1u c\u1ea7n nghi\u00ean c\u1ee9u.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"the-current-conception-of-initial-trust-for-cybersecurity-in-the-context-of-password-managers\">Quan ni\u1ec7m hi\u1ec7n t\u1ea1i v\u1ec1 ni\u1ec1m tin ban \u0111\u1ea7u cho an ninh m\u1ea1ng trong b\u1ed1i c\u1ea3nh c\u1ee7a tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u<\/h2>\n\n\n<p>V\u00e0o n\u0103m 2021, m\u1ed9t nh\u00f3m chuy\u00ean gia an ninh m\u1ea1ng uy t\u00edn t\u1eeb \u0110\u1ea1i h\u1ecdc Turku c\u1ee7a Ph\u1ea7n Lan \u0111\u00e3 th\u1ef1c hi\u1ec7n m\u1ed9t nghi\u00ean c\u1ee9u v\u1ec1 vi\u1ec7c h\u00ecnh th\u00e0nh ni\u1ec1m tin ban \u0111\u1ea7u trong b\u1ed1i c\u1ea3nh c\u1ee7a tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u v\u00e0 c\u00e1ch ni\u1ec1m tin ban \u0111\u1ea7u li\u00ean quan \u0111\u1ebfn \u00fd \u0111\u1ecbnh \u00e1p d\u1ee5ng tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u. Nghi\u00ean c\u1ee9u \u0111\u00e3 thu th\u1eadp d\u1eef li\u1ec7u t\u1eeb 289 ng\u01b0\u1eddi tr\u1ebb tu\u1ed5i \u1edf Ch\u00e2u \u00c2u trong \u0111\u1ed9 tu\u1ed5i t\u1eeb 18-35, v\u00e0 ph\u00e2n t\u00edch ch\u1ee7 y\u1ebfu \u0111\u01b0\u1ee3c th\u1ef1c hi\u1ec7n b\u1eb1ng c\u00e1ch s\u1eed d\u1ee5ng M\u00f4 h\u00ecnh C\u1ea5u tr\u00fac C\u1ea5u tr\u00fac (SEM) trong SmartPLS3.2 v\u00e0 v\u1edbi s\u1ef1 h\u1ed7 tr\u1ee3 c\u1ee7a SPSS v25.0.<\/p>\n\n\n\n<p>K\u1ebft qu\u1ea3 cho th\u1ea5y r\u1eb1ng an ninh c\u1ea5u tr\u00fac v\u00e0 danh ti\u1ebfng c\u1ee7a c\u00f4ng ty \u0111\u00f3ng vai tr\u00f2 quan tr\u1ecdng trong vi\u1ec7c h\u00ecnh th\u00e0nh ni\u1ec1m tin ban \u0111\u1ea7u, nh\u01b0ng kh\u00f4ng ph\u1ea3i l\u00e0 Xu h\u01b0\u1edbng C\u00e1 nh\u00e2n. K\u1ebft lu\u1eadn, \u0111\u00f3 l\u00e0 hai y\u1ebfu t\u1ed1 cu\u1ed1i c\u00f9ng \u2013 Th\u1ec3 ch\u1ebf v\u00e0 M\u00f4i tr\u01b0\u1eddng \u2013 \u1ea3nh h\u01b0\u1edfng \u0111\u1ebfn ni\u1ec1m tin ban \u0111\u1ea7u, t\u1ee9c l\u00e0 \u00fd \u0111\u1ecbnh c\u1ee7a ng\u01b0\u1eddi d\u00f9ng \u0111\u1ec3 \u00e1p d\u1ee5ng tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u.<\/p>\n\n\n\n<p>C\u00e1c chuy\u00ean gia t\u1eeb \u0110\u1ea1i h\u1ecdc Turku, c\u00f9ng v\u1edbi c\u00e1c nh\u00e0 nghi\u00ean c\u1ee9u, tri\u1ebft gia v\u00e0 chuy\u00ean gia an ninh m\u1ea1ng kh\u00e1c, ch\u1ec9 ra r\u1eb1ng v\u1eabn c\u00f2n c\u00e1c y\u1ebfu t\u1ed1 trong ni\u1ec1m tin ban \u0111\u1ea7u v\u00e0o tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u, v\u00ec v\u1eady c\u00f2n nhi\u1ec1u \u0111i\u1ec1u c\u1ea7n nghi\u00ean c\u1ee9u v\u1ec1 v\u1ea5n \u0111\u1ec1 n\u00e0y. V\u00ed d\u1ee5, s\u1ebd r\u1ea5t th\u00fa v\u1ecb khi xem vai tr\u00f2 c\u1ee7a c\u00e1c chu\u1ea9n m\u1ef1c x\u00e3 h\u1ed9i trong b\u1ed1i c\u1ea3nh c\u1ee7a vi\u1ec7c \u00e1p d\u1ee5ng v\u00e0 ni\u1ec1m tin ban \u0111\u1ea7u c\u1ee7a tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u. Ngo\u00e0i ra, c\u00e1c nghi\u00ean c\u1ee9u c\u0169ng c\u00f3 th\u1ec3 xem x\u00e9t c\u00e1c y\u1ebfu t\u1ed1 kh\u00e1c c\u00f3 th\u1ec3 \u0111\u00f3ng vai tr\u00f2 quan tr\u1ecdng trong vi\u1ec7c h\u00ecnh th\u00e0nh ni\u1ec1m tin ban \u0111\u1ea7u, ch\u1eb3ng h\u1ea1n nh\u01b0 ki\u1ebfn th\u1ee9c v\u1ec1 tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u.<\/p>\n\n\n\n<p>Nh\u1eadn th\u1ee9c \u0111\u00e3 \u0111\u01b0\u1ee3c t\u00ecm th\u1ea5y l\u00e0 m\u1ed9t l\u1ef1c l\u01b0\u1ee3ng th\u00fac \u0111\u1ea9y trong vi\u1ec7c h\u1ecdc c\u00e1c k\u1ef9 n\u0103ng c\u1ea7n thi\u1ebft \u0111\u1ec3 th\u1ef1c hi\u1ec7n m\u1ed9t lo\u1ea1i h\u00e0nh vi nh\u1ea5t \u0111\u1ecbnh, c\u0169ng nh\u01b0 gi\u1edbi t\u00ednh. Gi\u1edbi t\u00ednh n\u1eef \u0111\u00e3 \u0111\u01b0\u1ee3c t\u00ecm th\u1ea5y l\u00e0 \u0111\u00f2i h\u1ecfi nhi\u1ec1u h\u01a1n trong vi\u1ec7c \u00e1p d\u1ee5ng ni\u1ec1m tin ban \u0111\u1ea7u so v\u1edbi gi\u1edbi t\u00ednh nam, v\u00e0 ph\u1ee5 n\u1eef tr\u1ebb th\u1eadm ch\u00ed c\u00f2n \u0111\u00f2i h\u1ecfi nhi\u1ec1u h\u01a1n so v\u1edbi nam gi\u1edbi tr\u1ebb. V\u00ec v\u1eady, trong l\u0129nh v\u1ef1c n\u00e0y, v\u1eabn c\u00f2n nhi\u1ec1u \u0111i\u1ec1u c\u1ea7n nghi\u00ean c\u1ee9u.<\/p>\n\n\n\n<p><strong>K\u1ebft lu\u1eadn <\/strong><\/p>\n\n\n\n<p>B\u1eb1ng ch\u1ee9ng cho th\u1ea5y r\u1eb1ng ch\u1ec9 d\u1ef1a v\u00e0o b\u1ea3o v\u1ec7 m\u1eadt kh\u1ea9u kh\u00f4ng \u0111\u1ee7 \u0111\u1ec3 \u0111\u1ea3m b\u1ea3o ho\u1ea1t \u0111\u1ed9ng tr\u1ef1c tuy\u1ebfn an to\u00e0n. C\u00e1c chuy\u00ean gia an ninh m\u1ea1ng khuy\u1ebfn ngh\u1ecb t\u1ea1o m\u1eadt kh\u1ea9u kh\u00f3 \u0111o\u00e1n v\u00e0 thay \u0111\u1ed5i ch\u00fang th\u01b0\u1eddng xuy\u00ean \u0111\u1ec3 b\u1ea3o v\u1ec7 th\u00f4ng tin kh\u1ecfi c\u00e1c hacker ti\u1ec1m n\u0103ng. M\u1eb7c d\u00f9 c\u00f3 th\u1ec3 l\u00e0 m\u1ed9t qu\u00e1 tr\u00ecnh kh\u00f3 kh\u0103n, vi\u1ec7c s\u1eed d\u1ee5ng m\u1eadt kh\u1ea9u kh\u00e1c nhau cho m\u1ed7i t\u00e0i kho\u1ea3n l\u00e0 c\u1ea7n thi\u1ebft \u0111\u1ec3 b\u1ea3o v\u1ec7 b\u1ea3n th\u00e2n v\u00e0 c\u1ed9ng \u0111\u1ed3ng. May m\u1eafn thay, c\u00f3 nh\u1eefng c\u00e1ch \u0111\u1ec3 qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u m\u1ed9t c\u00e1ch hi\u1ec7u qu\u1ea3 v\u00e0 an to\u00e0n, m\u00e0 kh\u00f4ng th\u1eeba nh\u1eadn th\u1ea5t b\u1ea1i trong cu\u1ed9c chi\u1ebfn m\u1ea1ng kh\u00f4ng ng\u1eebng. Tuy nhi\u00ean, n\u1ebfu ng\u01b0\u1eddi d\u00f9ng kh\u00f4ng c\u1ea3nh gi\u00e1c khi t\u1ea1o m\u1eadt kh\u1ea9u, h\u1ecd c\u00f3 nguy c\u01a1 tr\u1edf th\u00e0nh n\u1ea1n nh\u00e2n c\u1ee7a tr\u1ed9m c\u1eafp m\u1ea1ng v\u00e0 gian l\u1eadn. <\/p>\n\n\n\n<p>\u0110\u1ec3 bi\u1ebft th\u00eam th\u00f4ng tin v\u1ec1 b\u1ea3o v\u1ec7 d\u1eef li\u1ec7u khi duy\u1ec7t internet, h\u00e3y tham kh\u1ea3o c\u00e1c b\u00e0i vi\u1ebft kh\u00e1c c\u1ee7a ch\u00fang t\u00f4i v\u1ec1 ch\u1ee7 \u0111\u1ec1 n\u00e0y.<\/p>","protected":false},"excerpt":{"rendered":"<p>T\u00ean ng\u01b0\u1eddi d\u00f9ng v\u00e0 m\u1eadt kh\u1ea9u t\u1eeb l\u00e2u \u0111\u00e3 \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng nh\u01b0 m\u1ed9t h\u00ecnh th\u1ee9c x\u00e1c th\u1ef1c v\u00e0 b\u1ea5t ch\u1ea5p m\u1ecdi v\u1ea5n \u0111\u1ec1 \u0111\u00e3 bi\u1ebft v\u1edbi m\u1eadt kh\u1ea9u, ch\u00fang v\u1eabn l\u00e0 l\u1ef1a ch\u1ecdn ch\u00ednh. C\u00e1c chuy\u00ean gia an ninh m\u1ea1ng khuy\u00ean ng\u01b0\u1eddi d\u00f9ng\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/vi\/quan-ly-mat-khau\/su-tin-tuong-vao-y-dinh-su-dung-trinh-quan-ly-mat-khau-trong-gioi-tre\/\">Ti\u1ebfp t\u1ee5c \u0111\u1ecdc <span class=\"screen-reader-text\">Ni\u1ec1m tin v\u00e0o \u00fd \u0111\u1ecbnh \u00e1p d\u1ee5ng Tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u \u1edf nh\u1eefng ng\u01b0\u1eddi tr\u1ebb tu\u1ed5i<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":1431,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[24],"tags":[],"class_list":["post-1423","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-password-manager","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Trust in Password Manager Adoption Among Young Adults<\/title>\n<meta name=\"description\" content=\"Explore the role of initial trust in password manager adoption among young adults. Learn how to protect yourself from cybertheft and fraud.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/vi\/quan-ly-mat-khau\/su-tin-tuong-vao-y-dinh-su-dung-trinh-quan-ly-mat-khau-trong-gioi-tre\/\" \/>\n<meta property=\"og:locale\" content=\"vi_VN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Trust in Password Manager Adoption Among Young Adults\" \/>\n<meta property=\"og:description\" content=\"Explore the role of initial trust in password manager adoption among young adults. Learn how to protect yourself from cybertheft and fraud.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/vi\/quan-ly-mat-khau\/su-tin-tuong-vao-y-dinh-su-dung-trinh-quan-ly-mat-khau-trong-gioi-tre\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-18T14:25:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Password-Managers-and-Trust-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"662\" \/>\n\t<meta property=\"og:image:height\" content=\"327\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 ph\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"The trust in Password manager adoption intention among young adults\",\"datePublished\":\"2023-02-18T14:25:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/\"},\"wordCount\":2001,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Password-Managers-and-Trust-1.jpg\",\"articleSection\":[\"Password Manager\"],\"inLanguage\":\"vi\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/\",\"url\":\"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/\",\"name\":\"Trust in Password Manager Adoption Among Young Adults\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Password-Managers-and-Trust-1.jpg\",\"datePublished\":\"2023-02-18T14:25:47+00:00\",\"description\":\"Explore the role of initial trust in password manager adoption among young adults. Learn how to protect yourself from cybertheft and fraud.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/#breadcrumb\"},\"inLanguage\":\"vi\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Password-Managers-and-Trust-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Password-Managers-and-Trust-1.jpg\",\"width\":662,\"height\":327,\"caption\":\"Password Managers and Trust\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The trust in Password manager adoption intention among young adults\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Your Gateway to Cyber Safety\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"vi\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/vi\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ni\u1ec1m tin trong vi\u1ec7c \u00e1p d\u1ee5ng tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u trong gi\u1edbi tr\u1ebb","description":"Kh\u00e1m ph\u00e1 vai tr\u00f2 c\u1ee7a ni\u1ec1m tin ban \u0111\u1ea7u trong vi\u1ec7c \u00e1p d\u1ee5ng tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u trong gi\u1edbi tr\u1ebb. T\u00ecm hi\u1ec3u c\u00e1ch b\u1ea3o v\u1ec7 b\u1ea3n th\u00e2n kh\u1ecfi tr\u1ed9m c\u1eafp m\u1ea1ng v\u00e0 gian l\u1eadn.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/vi\/quan-ly-mat-khau\/su-tin-tuong-vao-y-dinh-su-dung-trinh-quan-ly-mat-khau-trong-gioi-tre\/","og_locale":"vi_VN","og_type":"article","og_title":"Trust in Password Manager Adoption Among Young Adults","og_description":"Explore the role of initial trust in password manager adoption among young adults. Learn how to protect yourself from cybertheft and fraud.","og_url":"https:\/\/securitybriefing.net\/vi\/quan-ly-mat-khau\/su-tin-tuong-vao-y-dinh-su-dung-trinh-quan-ly-mat-khau-trong-gioi-tre\/","og_site_name":"Security Briefing","article_published_time":"2023-02-18T14:25:47+00:00","og_image":[{"width":662,"height":327,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Password-Managers-and-Trust-1.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi":"security","\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc":"10 ph\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"The trust in Password manager adoption intention among young adults","datePublished":"2023-02-18T14:25:47+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/"},"wordCount":2001,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Password-Managers-and-Trust-1.jpg","articleSection":["Password Manager"],"inLanguage":"vi"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/","url":"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/","name":"Ni\u1ec1m tin trong vi\u1ec7c \u00e1p d\u1ee5ng tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u trong gi\u1edbi tr\u1ebb","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Password-Managers-and-Trust-1.jpg","datePublished":"2023-02-18T14:25:47+00:00","description":"Kh\u00e1m ph\u00e1 vai tr\u00f2 c\u1ee7a ni\u1ec1m tin ban \u0111\u1ea7u trong vi\u1ec7c \u00e1p d\u1ee5ng tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u trong gi\u1edbi tr\u1ebb. T\u00ecm hi\u1ec3u c\u00e1ch b\u1ea3o v\u1ec7 b\u1ea3n th\u00e2n kh\u1ecfi tr\u1ed9m c\u1eafp m\u1ea1ng v\u00e0 gian l\u1eadn.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/#breadcrumb"},"inLanguage":"vi","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/"]}]},{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Password-Managers-and-Trust-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Password-Managers-and-Trust-1.jpg","width":662,"height":327,"caption":"Password Managers and Trust"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/password-manager\/the-trust-in-password-manager-adoption-intention-among-young-adults\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"The trust in Password manager adoption intention among young adults"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"B\u00e1o C\u00e1o An Ninh","description":"C\u1ed5ng K\u1ebft N\u1ed1i C\u1ee7a B\u1ea1n \u0110\u1ebfn An To\u00e0n M\u1ea1ng","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"vi"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"B\u00e1o C\u00e1o An Ninh","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"b\u1ea3o v\u1ec7","image":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin l\u00e0 m\u1ed9t bi\u00ean t\u1eadp vi\u00ean c\u1ea5p cao c\u1ee7a Government Technology. Tr\u01b0\u1edbc \u0111\u00e2y c\u00f4 \u0111\u00e3 vi\u1ebft cho PYMNTS v\u00e0 The Bay State Banner, v\u00e0 c\u00f3 b\u1eb1ng C\u1eed nh\u00e2n Ngh\u1ec7 thu\u1eadt s\u00e1ng t\u00e1c c\u1ee7a tr\u01b0\u1eddng Carnegie Mellon. C\u00f4 s\u1ed1ng \u1edf ngo\u1ea1i \u00f4 Boston.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/vi\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/1423","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/comments?post=1423"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/1423\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media\/1431"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media?parent=1423"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/categories?post=1423"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/tags?post=1423"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}