| http://www.w3.org/ns/prov#value | - As the author pointed out in her book, we use weak and/or obvious passwords; we tend toward the use of weaker security infrastructure, if any at all, because it???s easier to implement, and we are often gullible enough to respond to phishing expeditions, clicking on fake links and providing our passwords and other data.
|