@ARTICLE{Lakhno_Valerii_Analysis_2024, author={Lakhno, Valerii and Kurbaiyazov, Nurgazy and Lakhno, Miroslav and Kryvoruchko, Olena and Desiatko, Alona and Tsiutsiura, Svitlana and Tsiutsiura, Mykola}, volume={vol. 70}, number={No 3}, journal={International Journal of Electronics and Telecommunications}, pages={673-682}, howpublished={online}, year={2024}, publisher={Polish Academy of Sciences Committee of Electronics and Telecommunications}, abstract={The analysis of digital footprints (DF) related to the cybersecurity (cyber risk) user behavior of university information and education systems (UIES) involves the study and evaluation of various aspects of activity in the systems. In particular, such analysis includes the study of typical patterns (patterns) of access to UIES, password usage, network activity, compliance with security policies, identification of anomalous behavior, and more. It is shown that user behavior in UIES is represented by sequences of actions and can be analyzed using the sequential analysis method. Such analysis will allow information security (IS) systems of UIES to efficiently process categorical data associated with sequential patterns of user actions. It is shown that analyzing sequential patterns of cyberthreatening user behavior will allow UIES IS systems to identify more complex threats that may be hidden in chains of actions, not just individual events. This will allow for more effective identification of potential threats and prevention of security incidents in the UIES.}, type={Article}, title={Analysis of digital footprints associated with cybersecurity behavior patterns of users of University Information and Education Systems}, URL={http://czasopisma.pan.pl/Content/132229/21-4585-Lakhno-sk.pdf}, doi={10.24425/ijet.2024.149596}, keywords={digital footprints, behavior patterns, users, university information and educational system}, }