19
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

An Investigative Study: Health Care Workers as Security Threat Suppliers

&
Pages 30-46 | Published online: 10 Sep 2014

Reference

  • Ajzen, I., & Fishbein, M. (1980). Understanding attitudes and predicting social behavior. Englewood Cliffs, NJ: Prentice-Hall.
  • Atkinson, R.C., & Shiffrin, R.M. (1968). Human memory: A proposed system and its control processes. In Spence, K.W. & Spence, J.T. (Eds.), The Psychology of Learning and Motivation, New York: Academic Press.
  • Andrews, L.W. (2004). Passwords Reveal Your Personality.Retrieved February 1, 2005 from http://cms.psychologytoday.com/articles/pto-20020101-000006.html.
  • Cliff, A. (2001). Password Crackers - Ensuring the Security of Your Password.Retrieved September 10, 2005 from http://online.securityfocus.com/infocus/1192.
  • “Cyber crime bleeds U.S. corporations, survey shows; financial losses from attacks climb for third year in a row” (2002). Retrieved on October 15, 2006 from http://www.gocsi.com/press/20020407.jhtml.
  • Department of Defense. (1985). Password Management Guideline. Retrieved September 2004 from http://www.alw.nih.gov/Security/FIRST/papers/password/dodpwman.txt.
  • Dixon, P. (2006). Medical Identity Theft: The Information Crime that Can Kill You. Retrieved on October 28, 2006 from http://www.worldprivacyforum.org/pdf/wpf_exsum_medidtheft2006.pdf.
  • Donovan, C. (2000). Strong Passwords SANS Institute. Retrieved on October 12, 2005 from http://www.sans.org/infosecFAQ/policy/password.htm.
  • Federal Trade Commission for the Consumer FTC Consumer Alert Spyware. (2005). Retrieved on December 1, 2005 from http://www.ftc.gov/bcp/conline/pubs/alerts/spywarealrt.htm.
  • Fishbein, M. & Ajzen, I. (1975). Belief, attitude, intention, and behavior: An introduction to theory and research. Reading, Massachusetts: Addison-Wesley.
  • Georgetown University Information Security. Retrieved on September 12, 2005 from http://security.georgetown.edu/passwords.html.
  • Green, M. (2003). Securing the system. Best’s Review, 103 (10), 80–84.
  • Greenemeier, L. (2006). Put Up A Strong Defense. Retrieved on October 1, 2006 from http://www.informationweek.com/showArticle.jhtmlysessionid=MPM5QUA_UA3Z2KQSNDLRCKHSCJUNN2JVN?articleID=177102288&queryText=Computing+Technology+Industry+Association’s+2006+.
  • Grudin, J. (1994). Groupware and social dynamics: eight challenges for developers, Communications of the ACM, 37 (1), 92–105.
  • Hatlestad, L. (2006). Research: Privacy, Security Problems Alarming But Fixable. Retrieved on September 12, 2006 from http://www.informationweek.com/news/showArticle.jhtml?articleID=192500245.
  • “Healthcare bears brunt of spyware attacks.” (2006). Retrieved on October 16, 2006 from http://www.e-health-insider.com/news/item.cfm?ID=1769.
  • “Human Memory.” (2005). Retrieved on November 12, 2005 from http://brain.web_us.com/memory/human_memory.htm.
  • Kanaley, R. Login error trouble keeping track of all Your sign-ons? Here’s a place to keep your electronic keys, but you’d better remember the password. San Jose Mercury News (Feb. 4, 2001).
  • Keller, S., Powell, A., Horstmann, B., Predmore, C., & Crawford, M. (2005). Information Security Threats and Practices in Small Businesses. Information Systems Management, 22 (2), 7–19.
  • Kim, S. S., & Malhotra, N. K. (2005a). A longitudinal model of continued IS use: An integrative view of four mechanisms underlying postadoption phenomena. Management Science, 51 (5), 741–755.
  • “Medical Center Hospital Physician Portal Access.” (2005). Retrieved on October 28, 2006 from http://www.mchodessa.com/PhysiciansOnly/PhysicianPortalAccess.pdf.
  • Merkow, M. & Breithaupt, J. (2006). Computer Security Assurance Using the Common Criteria. Clifton, New Jersey: Thompson Delmar Learning.
  • Miller, George A. (1956). The magical number seven, plus or minus two: Some limits on our capacity for processing information. Psychological Review, 63, 81–97.
  • “Password Security.” (2004). Retrieved on August 15, 2005 from http://www.securitystats.com/tools/password.php.
  • Reason, J.T. (1990). Human Error. Cambridge, MA: Cambridge University Press
  • Reconnex Insider Threat Index. (2005). Retrieved on October 3, 2006 from http://www.reconnex.net/Threat/pdf/July_Threat_Index.pdf.
  • Romit, T. (2001). The Security Privacy Pendulum. CanCERT™ Bulletin, 4 (3), 1–22.
  • “Spyware or Adware.” (2005). Retrieved on May 12, 2006 from http://www.simplythebest.net/info/spyware/.
  • University of New Mexico. (2004). Password Methodology: How to make, remember and change good passwords. Retrieved on October 10, 2004 from http://www.unm.edu/cirt/accts/psswrdmethodology.html.
  • Volonino, L. & Robinson, S.R. (2004). Principles and Practice of Information Security. Upper Saddle River, New Jersey: Pearson Prentice Hall.
  • Vroom, C. & von Solms, R. (2004). Towards information security behavioural compliance. Computers & Security, 23 (3), 191–198.
  • Wilson, E. V., Mao, E., & Lankton, N. K. (2005). Predicting continuing acceptance of IT in conditions of sporadic use. In Proceedings of the 2005 Americas Conference on Information Systems (AMCIS), Omaha, NE. Kansas Medical Hospital http://www2.kumc.edu/ir/operationalprotocols/password.asp

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.