{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T23:13:01Z","timestamp":1654125181636},"reference-count":27,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,4,1]]},"abstract":"<p>Due to the Internet and applications that can access the Internet, healthcare employees can benefit from the ability to view patient data almost anywhere and at any time. Data and information is also being shared among third party vendors, partners and supplies. With this type of accessibility of information which generally does include very personal information such as diagnosis and social security numbers, data can easily be obtained either through social engineering techniques or weak password usage. In this paper, a presentation of social engineering techniques is explored as well as the password practices of actual health care workers.<\/p>","DOI":"10.4018\/ijcwt.2013040104","type":"journal-article","created":{"date-parts":[[2014,2,25]],"date-time":"2014-02-25T18:45:19Z","timestamp":1393353919000},"page":"58-70","source":"Crossref","is-referenced-by-count":1,"title":["Social Engineering Techniques and Password Security"],"prefix":"10.4018","volume":"3","author":[{"given":"B. Dawn","family":"Medlin","sequence":"first","affiliation":[{"name":"Department of Computer Information Systems, Walker College of Business, Appalachian State University, Boone, NC, USA"}]}],"member":"2432","reference":[{"key":"ijcwt.2013040104-0","unstructured":"Analytics, I. D. (2007). Data breach harm analysis from ID Analytics uncovers new patterns of misuse arising from breaches of identity data. Retrieved November 12, 2009, from http:\/\/www.idanalytics.com\/news_and_events\/20071107.html"},{"key":"ijcwt.2013040104-1","unstructured":"Andrews, L. W. (2004). Passwords reveal your personality. Retrieved March 13, 2007, from http:\/\/cms.psychologytoday.com\/articles\/pto- 20020101-000006.html"},{"key":"ijcwt.2013040104-2","doi-asserted-by":"crossref","unstructured":"Brostoff, S., & Sasse, M. A. (2001). Safe and sound: A safety-critical approach to security. In Proceedings of the New Security Paradigms Workshop 2001, Cloudcroft, NM.","DOI":"10.1145\/508171.508178"},{"key":"ijcwt.2013040104-3","author":"M.Burnett","year":"2006","journal-title":"Perfect passwords. Selection, protection, authentication"},{"key":"ijcwt.2013040104-4","unstructured":"CERT. (2009). Insider threat research. Retrieved December 1, 2009, from http:\/\/www.cert.org\/insider_threat"},{"key":"ijcwt.2013040104-5","unstructured":"Department of Defense. (1985). Password management guideline. Retrieved September 2004, from http:\/\/www.alw.nih.gov\/Security\/FIRST\/papers\/password\/dodpwman.txt"},{"key":"ijcwt.2013040104-6","unstructured":"Emory Health Care, Atlanta, Georgia. (n.d.). Retrieved August 4, 2013, from http:\/\/healthitsecurity.com\/2013\/07\/23\/healthcare-data-breaches-reviewing-the-ramifications\/"},{"key":"ijcwt.2013040104-7","unstructured":"Experian: A world of insight. (n.d.). Data breach resolution. Retrieved August 13, 2013, from http:\/\/www.experian.com\/blogs\/data-breach\/2013\/05\/01\/medical-data-breaches-a-source-of-chronic-pain%E2%80%8E"},{"key":"ijcwt.2013040104-8","first-page":"132","author":"L. O.Gostin","year":"2000","journal-title":"Public health law: Power, duty, restraint"},{"key":"ijcwt.2013040104-9","unstructured":"Gragg, D. (2007). A multi-level defense against social engineering. SANS. Retrieved July 1, 2009, from http:\/\/www.sans.org\/reading_room\/whitepapers\/engineering\/920.php"},{"key":"ijcwt.2013040104-10","unstructured":"Intelegen, Inc. (2008). Human memory. Retrieved on December 1, 2009, from http:\/\/brain.web-us.com\/memory\/human_memory.htm"},{"key":"ijcwt.2013040104-11","unstructured":"Kanaley, R. (2001). Login error trouble keeping track of all your sign-ons? Here\u2019s a place to keep your electronic keys, but you better remember the password. San Jose Mercury News, 3G."},{"key":"ijcwt.2013040104-12","unstructured":"Kleyman, B. (2013). Healthcare data breaches: Reviewing the ramifications. Retrieved August 13, 2013, from http:\/\/healthitsecurity.com\/2013\/07\/23\/healthcare-data-breaches-reviewing-the-ramifications\/"},{"key":"ijcwt.2013040104-13","unstructured":"Medical Data Breaches. (2013). A source of chronic pain. Retrieved August 15, 2013, from http:\/\/www.experian.com\/blogs\/data-breach\/2013\/05\/01\/medical-data-breaches-a-source-of-chronic-pain"},{"key":"ijcwt.2013040104-14","unstructured":"Mickle, M. (2012). Top ten security breaches in 2012. Retrieved on July 21, 2013 from http:\/\/www.healthcarefinancenews.com\/news\/top-10-data-security-breaches-2012"},{"key":"ijcwt.2013040104-15","unstructured":"Nixon Peabody. (2009). Health law alert. Retrieved November 15, 2009, from http:\/\/www.nixonpeabody.com\/publications_detail3.asp?ID=2621"},{"key":"ijcwt.2013040104-16","author":"C. P.Pfleeger","year":"2007","journal-title":"Security in computing"},{"key":"ijcwt.2013040104-17","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(00)07023-1"},{"key":"ijcwt.2013040104-18","doi-asserted-by":"publisher","DOI":"10.1097\/00006247-200212000-00017"},{"key":"ijcwt.2013040104-19","unstructured":"South Carolina Department of Health and Human Services, Columbia South Carolina. (n.d.). Retrived August 5, 2013, from http:\/\/healthitsecurity.com\/2013\/07\/23\/healthcare-data-breaches-reviewing-the-ramifications\/"},{"key":"ijcwt.2013040104-20","unstructured":"Stanford Hospital. Palo Alto, CA. (n.d.). Retrieved August 3, 2013, from http:\/\/www.nytimes.com\/2011\/09\/09\/us\/09breach.html?pagewanted=all&_r=0"},{"issue":"4","key":"ijcwt.2013040104-21","doi-asserted-by":"crossref","first-page":"222","DOI":"10.6017\/ital.v25i4.3355","article-title":"Helping the hacker? Library information, security, and social engineering.","volume":"25","author":"S. T.Thompson","year":"2006","journal-title":"Information Technology and Libraries"},{"key":"ijcwt.2013040104-22","doi-asserted-by":"crossref","unstructured":"Thornburgh, T. (2004). Social engineering: The dark art. In Proceedings of the 1st Annual Conference on Information Security Curriculum Development, Kennesaw State University, Kennesaw, GA.","DOI":"10.1145\/1059524.1059554"},{"key":"ijcwt.2013040104-23","unstructured":"US Department of Health and Human Services. (2009). Protecting the privacy of patients' health information. Retrieved November 12, 2009, from http:\/\/www.hhs.gov\/news\/facts\/privacy.html"},{"key":"ijcwt.2013040104-24","unstructured":"Utah Department of Health, Salt Lake City, Utah. (n.d.). Retrieved August 2, 2013, from http:\/\/healthitsecurity.com\/2013\/07\/23\/healthcare-data-breaches-reviewing-the-ramifications\/"},{"key":"ijcwt.2013040104-25","unstructured":"Utimaco. (2009). Health IT data breaches: No harm, no foul. Retrieved November 12, 2009 from http:\/\/compliance.utimaco.com\/na\/tag\/hitech-act"},{"key":"ijcwt.2013040104-26","unstructured":"Welcome to AWPHD: Keeping Quality Care Local. (2013). Retrived August 20, 2013, from http:\/\/www.awphd.org\/presentations\/...\/Model%20Password%20Policy.doc"}],"container-title":["International Journal of Cyber Warfare and Terrorism"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=101940","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T22:37:43Z","timestamp":1654123063000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijcwt.2013040104"}},"subtitle":["Two Issues Relevant in the Case of Health Care Workers"],"short-title":[],"issued":{"date-parts":[[2013,4,1]]},"references-count":27,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,4]]}},"URL":"https:\/\/doi.org\/10.4018\/ijcwt.2013040104","relation":{},"ISSN":["1947-3435","1947-3443"],"issn-type":[{"value":"1947-3435","type":"print"},{"value":"1947-3443","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,4,1]]}}}