A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
The Data Protection Act 1998: an audit of its effect on surgical trainees' practice
2002
Annals of the Royal College of Surgeons of England
for your computer Include a read-protect password on all files that have patient information in them ('options' in the 'save as' dialogue box in MS Word and Excel) Have a Windows password with the user ...
There are no passwords and it requires excessive information I use a commercially available Psion-based programme. ...
doi:10.1308/003588402760452501
pmid:12398131
pmcid:PMC2504178
fatcat:uzawdxg6cnhsdh7fprssgy7dsi
Short-term and Long-term Effects of Fear Appeals in Improving Compliance with Password Guidelines
2018
Communications of the Association for Information Systems
In this paper, we extend the work of fear appeals use in the IS security domain to investigate their longer-term effects. ...
Providing persuasive communication improved compliance with password guidelines and resulted in significantly stronger passwords, but the effects on compliance intentions were only short term. ...
(1) = 1.85, p = 0.174). 6 Discussion and Implications
Discussion In this study, investigate how perceptions about passwords and security threats affect compliance with password guidelines and explore ...
doi:10.17705/1cais.04207
fatcat:ovxxnhjjifbbfjbng3b55e2vve
Compliance with security guidelines in teenagers
2021
Australasian Journal of Information Systems
To our knowledge, this is the first password security study that applies PMT to examine computer-based security behaviours in teenagers. ...
Our study contributes to understanding early security practices and highlights potential differences between adult and teenage behaviours to consider in future studies. ...
This is achieved by first examining how perceptions about security and security behaviour recommendations influence teenage behaviours, and whether PMT can predict protective behaviour in teenagers. ...
doi:10.3127/ajis.v25i0.2953
fatcat:lbzc4xuzvbfdnnmhubcafspe2y
Applying Chunking Theory in Organizational Password Guidelines
2006
Journal of Information, Information Technology, and Organizations
This research evaluates the human impact that password authentication issues have on the security of information systems within organizations. ...
This research resulted in the creation of password guidelines for authentication with passwords based on Miller's (1956) and Cowan's (2001) chunking theory research and a model for predicting the vulnerability ...
Acknowledgements Sincere appreciation is given to the US federal government agency for providing subjects and information security experts for the research. ...
doi:10.28945/150
fatcat:snkpffo2krevncbthfsxps7bee
Review Paper Graphical Password Authentication Technique for Security
2022
International Journal for Research in Applied Science and Engineering Technology
Some graphical password schemes have been intended so far as it grows password usability and security. In this paper, we manner a wide survey of the current graphical password methods. ...
Abstract: In modern age user authentication is a mandatory attribute in the area of data security. ...
INTRODUCTION Data security and user identity is common factor for information system. A password is formally called as stealthy authentication that is used to grant access to user. ...
doi:10.22214/ijraset.2022.40969
fatcat:4jaa72rj6vgijegs4uvoyfgzoa
An information security ontology incorporating human-behavioural implications
2009
Proceedings of the 2nd international conference on Security of information and networks - SIN '09
We demonstrate use of our ontology with an applied example concerning management of an organisation's password policy, and how it may be perceived by individuals in the organisation. ...
Security managers often regard human behaviour as a security liability, but they should accommodate it within their organisation's information security management procedures. ...
ACKNOWLEDGEMENTS The authors are supported in part by EPSRC grant EP/F066937/1 ("Economics-inspired Instant Trust Mechanisms for the Service Industry") and UK Technology Strategy Board (TSB), grant nr. ...
doi:10.1145/1626195.1626209
dblp:conf/sin/ParkinMC09
fatcat:sehwbrhjgrbhji2iuazb4t3vii
Preliminary Findings from an Exploratory Qualitative Study of Security-Conscious Users of Mobile Authentication
2016
Symposium On Usable Privacy and Security
This concern is especially prevalent in security information workers sensitized to mobile technology vulnerabilities by information about security risk. ...
Implications for development of security methods derived from these views are discussed, such as the need for authentication rigor to be driven by more contextualized understanding of task and location-based ...
This mental model of how a task and its associated personal data might relate to security threats forms the basis of a design implication, discussed later (Section 4.5), that suggests considering authentication ...
dblp:conf/soups/WolfKA16
fatcat:l6oz3qin7vewthzlqexkl5nkmi
Mnemonic Passwords Practices in Corporate Sites in Nigerian
2009
Social Science Research Network
Her area of interests includes Information Technology, Software Engineering, Gender studies, E-commerce, Electronic Marketing and Software Security. ...
Human resources and malicious applications steal user identity, potentially resulting in a direct loss of highly sensitive information and hard currency to affected victims. ...
The system checks the password against information in a database to ensure its correctness and thereby 'authenticates' the user. ...
doi:10.2139/ssrn.1430854
fatcat:s6fhwexcijd5xjytqo7ebhdge4
Information security
2019
Tehnički glasnik
In the research, the personal behaviour of health care professionals and workers in a Croatian production company in relation to information security was tested. ...
Information security inside the organization is becoming a major issue in the modern and global world. ...
In cases when information security risk is recognized and is stable, it is necessary to create a policy for information security. ...
doi:10.31803/tg-20180717222848
fatcat:dsi5dvtd7jhbnkjg4wdjkjclvu
Evaluation of the Human Impact of Password Authentication
2004
Informing Science
The research objective was to develop a model for evaluating the human impact that password authentication issues are having on the security of information systems. ...
Through distributing a survey and conducting an experiment, researchers created a model for predicting the vulnerability that a particular set of conditions will have on the likelihood of error in an information ...
Acknowledgement Sincere appreciation is given to the US federal government agency for providing subjects and information security experts for the research. ...
doi:10.28945/503
fatcat:popndw2jtngwfjdbrqkmesskbm
The Cryptographic Implications of the LinkedIn Data Breach
[article]
2017
arXiv
pre-print
Data security and personal privacy are difficult to maintain in the Internet age. ...
This manuscript dissects the cryptographic failures implicated in the breach, and explores more secure methods of storing passwords. ...
With over 400 million members as of 2017 [10] , any data leak risks the personal and professional information of millions of people. ...
arXiv:1703.06586v1
fatcat:nqrwnp2e5nfstb6mcn65w3nciu
Information Security Awareness among youth in Klang Valley: A Focus Group Discussion
2020
International Journal of Academic Research in Business and Social Sciences
Generally, most of the youth have a basic knowledge on information security awareness, particularly on having a secure password usage and information sharing. ...
Results show that there were few themes emerge on the awareness of information security, such as secure password usage, information sharing, safe online shopping website, and safe online banking website ...
Acknowledgements The authors would like to thank the Ministry of Higher Education Malaysia for sponsoring this project under Fundamental Research Grants Scheme, Project Code 05-01-18-2036FR and FRGS/1/ ...
doi:10.6007/ijarbss/v10-i16/8302
fatcat:nazyo3ciz5bf7e6siksahvp3d4
Password-based authentication: a system perspective
2004
37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the
A preliminary analysis of the implications of this user centric interconnection of security models is presented. ...
One of the key elements in the password solution for security is a reliance on human cognitive ability to remember the shared secret. ...
Common memory aids include password lists in wallets, lists in personal digital assistants, common personal items such as child name and birth date, pet names, etc. ...
doi:10.1109/hicss.2004.1265412
dblp:conf/hicss/ConklinDW04
fatcat:6pfbezttfjddvkwlotrdyl54xm
Passwords Selected by Hospital Employees: An Investigative Study
2011
International Journal of Advanced Computer Science and Applications
of personal and non-personal data with the wrong person. ...
Access to and transmission of patient data may improve care, increase delivery time of services and reduce health care costs, security of that information may be jeopardized due to the innocent sharing ...
Economic and Clinical Health Act (HITECH Act): implications for the adoption of health information technology, HIPAA, and privacy and security issues, 2009). ...
doi:10.14569/ijacsa.2011.021113
fatcat:5qltb6ib4jf2jjhctgoojqwnfu
Quality evidence, quality decisions: Ways to improve security and privacy of EHR systems
2016
2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)
However, privacy and security breaches potentially impact the integrity of data captured in electronic health records, and this invalidates its perceived usefulness in providing evidence to support care ...
In order to design a secure and effective EHR system for the adoption of practice-based evidence approaches, recommendations for privacy and security measures can follow the security control protocol of ...
By understanding these possible privacy and security breach scenarios, we get to understand the weakness of information systems in use and the implications that can arise from it. ...
doi:10.1109/healthcom.2016.7749424
dblp:conf/healthcom/OsopS16a
fatcat:csiob72we5cb5azd6dddx2omrm
« Previous
Showing results 1 — 15 out of 34,132 results