IT Policy and Ethics 2013
DOI: 10.4018/978-1-4666-2919-6.ch002
|View full text |Cite
|
Sign up to set email alerts
|

Password Sharing and How to Reduce It

Abstract: Password sharing is a common security problem. Some application domains are more exposed than others and, by dealing with very sensitive information, the healthcare domain is definitely not exempt from this problem. This chapter presents a case study of a cross section of how healthcare professionals actually deal with password authentication in typical real world scenarios. It then compares the professionals’ actual practice with what they feel about password sharing and what are the most frequent problems as… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…Previous literature in IS and complementary fields has commented on the importance of addressing these domains of information security (Crossler et al, 2013;Ferreira et al, 2013;Stanton et al, 2005;Takabi et al, 2010;Vishwanath et al, 2011;Wright & Marett, 2010;Zviran & Haga, 1999). We also used this as the basis for focusing on training that revolved around these three threats.…”
Section: Action Research At Caregivermentioning
confidence: 99%
“…Previous literature in IS and complementary fields has commented on the importance of addressing these domains of information security (Crossler et al, 2013;Ferreira et al, 2013;Stanton et al, 2005;Takabi et al, 2010;Vishwanath et al, 2011;Wright & Marett, 2010;Zviran & Haga, 1999). We also used this as the basis for focusing on training that revolved around these three threats.…”
Section: Action Research At Caregivermentioning
confidence: 99%
“…Dropbox instead of proprietary encrypted one), and password sharing. Not surprisingly, previous literature in IS and complementary fields has commented on the importance of addressing these domains of information security (Crossler et al, 2013;Ferreira et al, 2013;Stanton et al, 2005;Takabi et al, 2010;Vishwanath et al, 2011;Wright & Marett, 2010;Zviran & Haga, 1999).…”
Section: Phase One: Assessmentmentioning
confidence: 99%
“…A well-known limitation of passwords is their capacity to be shared (or the inability to do so securely). For example, typical advice discourages users from sharing passwords, as this can compromise the security of their accounts [13]. However, prior work has shown that passwords are commonly shared due to need [41], convenience [38], or for social credit [11].…”
Section: Protecting Digital Datamentioning
confidence: 99%