Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








34,132 Hits in 5.0 sec

The Data Protection Act 1998: an audit of its effect on surgical trainees' practice

Jill B Webb
2002 Annals of the Royal College of Surgeons of England  
for your computer Include a read-protect password on all files that have patient information in them ('options' in the 'save as' dialogue box in MS Word and Excel) Have a Windows password with the user  ...  There are no passwords and it requires excessive information I use a commercially available Psion-based programme.  ... 
doi:10.1308/003588402760452501 pmid:12398131 pmcid:PMC2504178 fatcat:uzawdxg6cnhsdh7fprssgy7dsi

Short-term and Long-term Effects of Fear Appeals in Improving Compliance with Password Guidelines

Florence Mwagwabi, Tanya McGill, Mike Dixon
2018 Communications of the Association for Information Systems  
In this paper, we extend the work of fear appeals use in the IS security domain to investigate their longer-term effects.  ...  Providing persuasive communication improved compliance with password guidelines and resulted in significantly stronger passwords, but the effects on compliance intentions were only short term.  ...  (1) = 1.85, p = 0.174). 6 Discussion and Implications Discussion In this study, investigate how perceptions about passwords and security threats affect compliance with password guidelines and explore  ... 
doi:10.17705/1cais.04207 fatcat:ovxxnhjjifbbfjbng3b55e2vve

Compliance with security guidelines in teenagers

Florence Mwagwabi, Jhee Hee Jiow
2021 Australasian Journal of Information Systems  
To our knowledge, this is the first password security study that applies PMT to examine computer-based security behaviours in teenagers.  ...  Our study contributes to understanding early security practices and highlights potential differences between adult and teenage behaviours to consider in future studies.  ...  This is achieved by first examining how perceptions about security and security behaviour recommendations influence teenage behaviours, and whether PMT can predict protective behaviour in teenagers.  ... 
doi:10.3127/ajis.v25i0.2953 fatcat:lbzc4xuzvbfdnnmhubcafspe2y

Applying Chunking Theory in Organizational Password Guidelines

Deborah Sater Carstens, Linda C. Malone, Pamela R. Mccauley-Bell
2006 Journal of Information, Information Technology, and Organizations  
This research evaluates the human impact that password authentication issues have on the security of information systems within organizations.  ...  This research resulted in the creation of password guidelines for authentication with passwords based on Miller's (1956) and Cowan's (2001) chunking theory research and a model for predicting the vulnerability  ...  Acknowledgements Sincere appreciation is given to the US federal government agency for providing subjects and information security experts for the research.  ... 
doi:10.28945/150 fatcat:snkpffo2krevncbthfsxps7bee

Review Paper Graphical Password Authentication Technique for Security

Mr. Shantanu Rangari, Prof. K. R. Ingole
2022 International Journal for Research in Applied Science and Engineering Technology  
Some graphical password schemes have been intended so far as it grows password usability and security. In this paper, we manner a wide survey of the current graphical password methods.  ...  Abstract: In modern age user authentication is a mandatory attribute in the area of data security.  ...  INTRODUCTION Data security and user identity is common factor for information system. A password is formally called as stealthy authentication that is used to grant access to user.  ... 
doi:10.22214/ijraset.2022.40969 fatcat:4jaa72rj6vgijegs4uvoyfgzoa

An information security ontology incorporating human-behavioural implications

Simon E. Parkin, Aad van Moorsel, Robert Coles
2009 Proceedings of the 2nd international conference on Security of information and networks - SIN '09  
We demonstrate use of our ontology with an applied example concerning management of an organisation's password policy, and how it may be perceived by individuals in the organisation.  ...  Security managers often regard human behaviour as a security liability, but they should accommodate it within their organisation's information security management procedures.  ...  ACKNOWLEDGEMENTS The authors are supported in part by EPSRC grant EP/F066937/1 ("Economics-inspired Instant Trust Mechanisms for the Service Industry") and UK Technology Strategy Board (TSB), grant nr.  ... 
doi:10.1145/1626195.1626209 dblp:conf/sin/ParkinMC09 fatcat:sehwbrhjgrbhji2iuazb4t3vii

Preliminary Findings from an Exploratory Qualitative Study of Security-Conscious Users of Mobile Authentication

Flynn Wolf, Ravi Kuber, Adam J. Aviv
2016 Symposium On Usable Privacy and Security  
This concern is especially prevalent in security information workers sensitized to mobile technology vulnerabilities by information about security risk.  ...  Implications for development of security methods derived from these views are discussed, such as the need for authentication rigor to be driven by more contextualized understanding of task and location-based  ...  This mental model of how a task and its associated personal data might relate to security threats forms the basis of a design implication, discussed later (Section 4.5), that suggests considering authentication  ... 
dblp:conf/soups/WolfKA16 fatcat:l6oz3qin7vewthzlqexkl5nkmi

Mnemonic Passwords Practices in Corporate Sites in Nigerian

Egwali Annie Oghenerukevbe
2009 Social Science Research Network  
Her area of interests includes Information Technology, Software Engineering, Gender studies, E-commerce, Electronic Marketing and Software Security.  ...  Human resources and malicious applications steal user identity, potentially resulting in a direct loss of highly sensitive information and hard currency to affected victims.  ...  The system checks the password against information in a database to ensure its correctness and thereby 'authenticates' the user.  ... 
doi:10.2139/ssrn.1430854 fatcat:s6fhwexcijd5xjytqo7ebhdge4

Information security

Aleksandar Erceg
2019 Tehnički glasnik  
In the research, the personal behaviour of health care professionals and workers in a Croatian production company in relation to information security was tested.  ...  Information security inside the organization is becoming a major issue in the modern and global world.  ...  In cases when information security risk is recognized and is stable, it is necessary to create a policy for information security.  ... 
doi:10.31803/tg-20180717222848 fatcat:dsi5dvtd7jhbnkjg4wdjkjclvu

Evaluation of the Human Impact of Password Authentication

Deborah Sater Carstens, Pamela R. Mccauley-Bell, Linda C. Malone, Ronald F. Demara
2004 Informing Science  
The research objective was to develop a model for evaluating the human impact that password authentication issues are having on the security of information systems.  ...  Through distributing a survey and conducting an experiment, researchers created a model for predicting the vulnerability that a particular set of conditions will have on the likelihood of error in an information  ...  Acknowledgement Sincere appreciation is given to the US federal government agency for providing subjects and information security experts for the research.  ... 
doi:10.28945/503 fatcat:popndw2jtngwfjdbrqkmesskbm

The Cryptographic Implications of the LinkedIn Data Breach [article]

Aditya Gune
2017 arXiv   pre-print
Data security and personal privacy are difficult to maintain in the Internet age.  ...  This manuscript dissects the cryptographic failures implicated in the breach, and explores more secure methods of storing passwords.  ...  With over 400 million members as of 2017 [10] , any data leak risks the personal and professional information of millions of people.  ... 
arXiv:1703.06586v1 fatcat:nqrwnp2e5nfstb6mcn65w3nciu

Information Security Awareness among youth in Klang Valley: A Focus Group Discussion

Siti Zobidah Omar, Krishnapriyaa Kovalan, Jusang Bolong
2020 International Journal of Academic Research in Business and Social Sciences  
Generally, most of the youth have a basic knowledge on information security awareness, particularly on having a secure password usage and information sharing.  ...  Results show that there were few themes emerge on the awareness of information security, such as secure password usage, information sharing, safe online shopping website, and safe online banking website  ...  Acknowledgements The authors would like to thank the Ministry of Higher Education Malaysia for sponsoring this project under Fundamental Research Grants Scheme, Project Code 05-01-18-2036FR and FRGS/1/  ... 
doi:10.6007/ijarbss/v10-i16/8302 fatcat:nazyo3ciz5bf7e6siksahvp3d4

Password-based authentication: a system perspective

A. Conklin, G. Dietrich, D. Walz
2004 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the  
A preliminary analysis of the implications of this user centric interconnection of security models is presented.  ...  One of the key elements in the password solution for security is a reliance on human cognitive ability to remember the shared secret.  ...  Common memory aids include password lists in wallets, lists in personal digital assistants, common personal items such as child name and birth date, pet names, etc.  ... 
doi:10.1109/hicss.2004.1265412 dblp:conf/hicss/ConklinDW04 fatcat:6pfbezttfjddvkwlotrdyl54xm

Passwords Selected by Hospital Employees: An Investigative Study

B Dawn, Ken Corley, B. Adriana
2011 International Journal of Advanced Computer Science and Applications  
of personal and non-personal data with the wrong person.  ...  Access to and transmission of patient data may improve care, increase delivery time of services and reduce health care costs, security of that information may be jeopardized due to the innocent sharing  ...  Economic and Clinical Health Act (HITECH Act): implications for the adoption of health information technology, HIPAA, and privacy and security issues, 2009).  ... 
doi:10.14569/ijacsa.2011.021113 fatcat:5qltb6ib4jf2jjhctgoojqwnfu

Quality evidence, quality decisions: Ways to improve security and privacy of EHR systems

Hamzah Osop, Tony Sahama
2016 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)  
However, privacy and security breaches potentially impact the integrity of data captured in electronic health records, and this invalidates its perceived usefulness in providing evidence to support care  ...  In order to design a secure and effective EHR system for the adoption of practice-based evidence approaches, recommendations for privacy and security measures can follow the security control protocol of  ...  By understanding these possible privacy and security breach scenarios, we get to understand the weakness of information systems in use and the implications that can arise from it.  ... 
doi:10.1109/healthcom.2016.7749424 dblp:conf/healthcom/OsopS16a fatcat:csiob72we5cb5azd6dddx2omrm
« Previous Showing results 1 — 15 out of 34,132 results