{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T05:49:39Z","timestamp":1761630579847},"reference-count":0,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,7,1]]},"abstract":"<p>One of the main threats to keeping health information secure in today\u2019s digital world is that of social engineering. The healthcare industry has benefitted from its employees\u2019 ability to view patient data. Although access to and transmission of patient data may improve care, increase delivery time of services and reduce health care costs, security of that information may be jeopardized due to the innocent sharing of personal and non-personal data with the wrong person. Through the tactic of social engineering, hackers are able to obtain information from employees that may allow them access into the hospitals networked information system. In this study we simulate a social engineering attack in five different hospitals of varying sizes with the goal of obtaining employees passwords. 73% of respondents shared their password. This raises serious concerns about the state of employee security awareness in our healthcare system.<\/p>","DOI":"10.4018\/jisp.2008070106","type":"journal-article","created":{"date-parts":[[2011,2,15]],"date-time":"2011-02-15T18:54:46Z","timestamp":1297796086000},"page":"71-83","source":"Crossref","is-referenced-by-count":14,"title":["Analyzing the Vulnerability of U.S. Hospitals to Social Engineering Attacks"],"prefix":"10.4018","volume":"2","author":[{"given":"B. Dawn","family":"Medlin","sequence":"first","affiliation":[{"name":"Appalachian State University, USA"}]},{"given":"Joseph A.","family":"Cazier","sequence":"additional","affiliation":[{"name":"Appalachian State University, USA"}]},{"given":"Daniel P.","family":"Foulk","sequence":"additional","affiliation":[{"name":"Appalachian State University, USA"}]}],"member":"2432","container-title":["International Journal of Information Security and Privacy"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=2488","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T02:16:52Z","timestamp":1654136212000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jisp.2008070106"}},"subtitle":["How Many of Your Employees Would Share Their Password?"],"short-title":[],"issued":{"date-parts":[[2008,7,1]]},"references-count":0,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2008,7]]}},"URL":"https:\/\/doi.org\/10.4018\/jisp.2008070106","relation":{},"ISSN":["1930-1650","1930-1669"],"issn-type":[{"value":"1930-1650","type":"print"},{"value":"1930-1669","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,7,1]]}}}