EconPapers    
Economics at your fingertips  
 

An Empirical Investigation: Health Care Employee Passwords and Their Crack Times in Relationship to HIPAA Security Standards

B. Dawn Medlin and Joseph A. Cazier
Additional contact information
B. Dawn Medlin: Appalachian State University, USA
Joseph A. Cazier: Appalachian State University, USA

International Journal of Healthcare Information Systems and Informatics (IJHISI), 2007, vol. 2, issue 3, 39-48

Abstract: The purpose of this article is to examine the passwords selected by health care professionals and the security and privacy standards in relationship to those passwords as addressed by the Health Insurance Portability and Accountability Act of 1996 (HIPAA). Examinations of these passwords have illustrated the connectivity between password length and strength and the need to educate employees as to the importance of their password choices. Through an empirical analysis, this article examines whether the passwords created by employees of a health care agency followed “strong” or “weak” password practices. The results should indicate to health care agencies the importance of comprehensive password policies and employee training.

Date: 2007
References: Add references at CitEc
Citations:

Downloads: (external link)
http://services.igi-global.com/resolvedoi/resolve. ... 018/jhisi.2007070104 (application/pdf)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:igg:jhisi0:v:2:y:2007:i:3:p:39-48

Access Statistics for this article

International Journal of Healthcare Information Systems and Informatics (IJHISI) is currently edited by Qiang (Shawn) Cheng

More articles in International Journal of Healthcare Information Systems and Informatics (IJHISI) from IGI Global
Bibliographic data for series maintained by Journal Editor ().

 
Page updated 2025-03-19
Handle: RePEc:igg:jhisi0:v:2:y:2007:i:3:p:39-48