Medlin, Vannoy, Winston Healthcare Workers: A Possible Insider Threat HEALTH CARE WORKERS: A POSSIBLE INSIDER THREAT B. Dawn Medlin Sandra A. Vannoy Elaine Winston Appalachian State University Hofstra University medlinbd@appstate.edu vannoysa@appstate.edu elaine.r.winston@hofstra.edu ABSTRACT Healthcare employees generally have access and the ability to view patient data whether in a chart or on a computer screen. With this type of accessibility comes a great deal of responsibility, Often viewing does not require multiple layers of security actions. With this type of accessibility, health care workers have the opportunity to view diagnosis, personal medical histories, as well as simple demographic information like age and gender. This information to a cybercriminal is like hitting t h e jackpot. Diagnosis could be used in blackmailing schemes and social engineering to obtain social security numbers that can be easily sold and used for a variety of credit and medical fraud incidents. Techniques such as social engineering or weak password usage can provide opportunities to a wealth of knowledge. In this paper, a presentation of social engineering techniques is explored as well as the password practices of actual health care workers. INTRODUCTION One of the largest threats to a healthcare systems security can be employees. Internal employees actually can pose the largest threat to the security and privacy of information as they can exploit the trust of their co-workers, and they generally are the individuals who have or have had authorized access to the health care organization’s network. As well, they are generally familiar with the internal policies and procedures of the organization. Additionally, internal employees can exploit that knowledge to facilitate attacks and even collude with external attackers (http://www.cert.org/insider_threat/). A patient’s personal information, such as address, phone number, and social security number, are all items that may be included and accessible to some or all healthcare employees. PHR (Personal Health Care Records) are available to many who neither touch nor need access to patient’s health care information. With the accessibility and sheer volume of patient’s data and information patient’s may be even more vulnerable to security breaches.. If the information is not easily accessible, hackers and social engineers have been very successful in founding ways to circumvent networked health data systems by simply asking for the information or by finding weaknesses within the system. Due to the number or increase to either losing or sharing information or the severity of these issues, HITECH or the Health Information Technology for Economic and Clinical Health Act of 2009 was enacted. Under Title XIII, HIPPA appears to remain the law that is most discussed in relation to privacy and security within the health care industry. One of the core aspects and a basic goal of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) is to provide more electronic medical information. Unfortunately, this can also result in more opportunities for crimes that can be committed using health care types of data and information. HIPAA regulations were enacted to protect the privacy and security of patients and their medical records; simply put, they make it illegal for unauthorized personnel to access or release information from someone's medical records. Information Institute Conferences, Las Vegas, NV, May 21-23, 2014 1 Medlin, Vannoy, Winston Healthcare Workers: A Possible Insider Threat HIPAA addresses security and privacy measures, either directly or indirectly, in the following noted standards below (http://www.hhs.gov/news/facts/privacy.html). These standards, include management processes, user education and training, and access control. Security Management Process [161.308(a)(1)] Healthcare organizations must show that they have a consistent set of internal processes, with implementation that is widespread and institutionalized. Processes range from establishing criteria for who has access to what, and who can request certain resources; to ensuring that access rights are revoked immediately upon employee termination. Security Awareness and Training [161.308(a)(5)] HIPAA requires that staff members be trained and educated concerning the proper handling of PHI. This basic-level security training should include measures such as password management. Access Control [161.312(a)] HIPAA security regulations require a definition of who has access to PHI within the organization, as well as the rules determining an individual’s right of access, and the reasons for denying access to some individuals. Despite its legal requirements, however, HIPAA standards have been known to be difficult to implement and are not always followed. As required by HIPAA, healthcare institutions are required to provide security methods in order to protect patient’s information. One such method is through the authentication of the individual requesting access. Healthcare employees are generally subjected to some type of authentication process. Although there are different ways of authenticating employees, most systems are based on the use of a physical token (something one has), secret knowledge (something one knows) or biometrics (something one is) (Burnett & Kleiman, 2006). Due to increased regulations and the increased opportunities for exploitation that exist in today’s digital world, it is even more important for healthcare providers to keep healthcare records and the information held within, safe and private. Governmental agencies have adopted initiatives that specifically address the issues and rights of healthcare patients. More specifically, the security and privacy of healthcare information is protected by the Health Insurance Portability and Accountability Act (HIPAA), requiring healthcare agencies to do everything possible to protect their information. There are many threats to the privacy of a patient’s information, and one of the largest threats is social engineering. Social engineering is generally defined to include the use of trickery, personal relationships and trust to obtain information; more specifically, it is the art of deceiving people into giving confidential, private or privileged information or access to a hacker (Gragg, 2007). BACKGROUND With the availability of information comes the opportunity for more fraudulent activity such as social engineering attacks. According to Christopher Hadnagy (2010), “social engineering is the art or better yet, science, of skillfully maneuvering human beings to take action in some aspect of their lives,” (Hadnagy, 2010, p. 10). For many social engineers the process of obtaining meaningful information may lead to the insight of the organization’s security policy, the countermeasures the organization has put in place and specifics relating to personnel and their level of security privilege. If a social engineer is attempting to find out about one particular patient, they may target that person’s medical health record. A patient’s medical record may include gender, race, family history, sexual history including types of birth control, sexual activity and treatment, any history or diagnosis of substance abuse, and diagnosis of mental illness. Other medical information, such as HIV status, may also be included. The accessibility of this confidential information may open the door to various forms of discrimination. For instance, chronic diseases such as HIV and AIDS may result in an increase in insurance rates or even denial of coverage, due to the extensive medical treatment usually needed by these patients. Individuals may even be ostracized or stigmatized because of their disease type. Patients expect the information contained in their records to remain secure and private, to be seen only by those individuals whose access is medically or administratively necessary. Unfortunately, patient’s medical records are being provided in public information and very easily accessed when a breach occurs. Table 1 represents some of the current security breaches that are occurring within the medical community. Information Institute Conferences, Las Vegas, NV, May 21-23, 2014 2 Medlin, Vannoy, Winston Healthcare Workers: A Possible Insider Threat Table 1. Examples of Security Breaches DATE ORGANIZATION EVENT 2014 A processing error on the L.A. Processing error could have either been No Number Care Health Plan payment website human or machine error. reported allowed some members to see the names, addresses and identification numbers of other members. Source: http://www.usatoday.com/story/ tech/2014/02/27/california-databreaches-hit-213-millionaccounts/5868191/ 2013 South Carolina Department of Former Medicaid employee 230,000 Health and Human Services Christopher Lykes transferred to his patients Columbia South Carolina SOURCE: personal Yahoo account 17 Excel http://healthitsecurity.com/2013/ spreadsheets. These spreadsheets 07/23/healthcare-data-breachescontained social security numbers and reviewing-the-ramifications/ other personal information. 2012 Utah Department of Health Salt Lake City, Utah SOURCE: http://healthitsecurity.com/2013/ 07/23/healthcare-data-breachesreviewing-the-ramifications/ The default network password was not 780,000 changed on a network server creating a patients weak password policy. Protected information, including social security numbers, was exposed. 2012 Emory Health Care Ten backup disks containing patient 315,000 information, over 17 years, were lost from a patients storage facility. Two-thirds of the disks contained patient social- security numbers, names, dates of surgery, diagnoses, medical procedures, and related doctors. . A non-password protected laptop was 4,503 patients stolen from a contractor’s automobile. These records contained patient social security numbers. Atlanta, Georgia SOURCE: 2012 http://healthitsecurity.com/2013/ 07/23/healthcare-data-breachesreviewing-the-ramifications/ Howard University Hospital Washington, D.C. SOURCE: 2011 RECORDS AFFECTED http://www.healthcarefinancene ws.com/news/top-10-data-securitybreaches-2012 Stanford Hospital Spreadsheets containing the names, 20,000 diagnosis codes, account numbers, Palo Alto, California SOUCE: patients admission and discharge dates, and billing charges of emergency patients were posted http://www.nytimes.com/2011/0 9/09/us/09breach.html?pagewan on a commercial website called Student of Fortune (a website which allows students to ted=all&_r=0 seek paid assistance on their school assignments). The information was available online for approximately 1 year. The spreadsheets were originally in the possession of the hospital’s vendor documented as Multi-Specialty Collection Services. Information Institute Conferences, Las Vegas, NV, May 21-23, 2014 3 Medlin, Vannoy, Winston Healthcare Workers: A Possible Insider Threat As noted above, thousands of health care information are being made very public, and sometimes through simple carelessness or through the use of social engineering techniques. Numbers are growing as more and more medical records are going online and becoming accessible to both patients and health care providers. In 2013 alone, 199 data breaches were reported to the U.S. Department of Health and Human Services, impacting more than 7 million patient records -- that's a 138 percent increase over 2012 (Goldman, 2014). Passwords and their effect A second threat as an insider is the usage of a week password. The authentication method of individuals creating their own passwords is not atypical. For healthcare organizations the password functions like the key to a lock, anyone who has it can get in to see the patient’s information. Toward that end, there have been recommendations from governmental agencies to hospitals on how to construct a password. One of the first guidelines in creating good passwords was published in1985 by the Department of Defense and is still relevant today (http://www.alw.nih.gov/Security/FIRST/papers/password/dodpwman.txt). Their guidelines recommended the following: 1) passwords must be memorized; 2) passwords must be at least six characters long, 3) passwords must be replaced periodically, and 4) passwords must contain a mixture of letters (both upper- and lowercase), numbers, and punctuation characters. Essentially, there are two types of passwords – strong passwords and weak passwords. If the password is a strong password then it can offer momentous benefits, but a weak password can only offer significant risks. Even though most hospitals or health care agencies require a two-factor authentication system like a badge to prove you are an employee, still , the most common authentication mechanism is simply the use of a password (something one knows or creates). This type of authentication method can offer to employees the ability to quickly enter into a system, but human practices such as using the same password on different systems and writing down a password may degrade the quality of password security (Pfleeger and Pfleeger, 2007). Suggestions concerning strong and weak password creation are currently typified by web pages such as the Georgetown University Information Security Office web site athttp://security.georgetown.edu/passwords.html. Their password guidelines include the following: "When selecting passwords, keep the following guidelines in mind: Choose a password that is at least eight characters in length. Create passwords that contain all of the following: uppercase and lowercase letters, numbers, and punctuation and symbol characters (e.g. !@#$%^&*()_+|~-=\`{}[]:";'<>?,./ ). Avoid using dictionary words in your passwords. This includes foreign language words, slang, jargon, and proper names. Avoid using passwords that contain words associated with Georgetown University, such as georgetown, hoyas, jesuit, or healy. Avoid common misspellings and substitutions in your passwords (e.g. replacing “e” with “3”or “i” with “1”) Avoid using passwords that are based on your name, userid, birthdates, addresses, phone numbers, relatives’ names, or other personal information." Problems Many of the deficiencies of password authentication systems arise from the limitations of human cognitive ability (Pond et al., 2000). If humans were not required to remember a password, a maximally secure password would be one with maximum length that could consist of a string of numbers, character, and symbols. In fact, the requirements to remember long and complicated passwords are contrary to the way the human memory functions. First, the capacity of human memory in its capacity to remember a sequence of items is temporally limited, with a short-term capacity of around seven items plus or minus two (Kanaley, R., 2001). Second, when humans remember a sequence of items, Information Institute Conferences, Las Vegas, NV, May 21-23, 2014 4 Medlin, Vannoy, Winston Healthcare Workers: A Possible Insider Threat those items cannot be drawn from an arbitrary and unfamiliar rang, but must be familiar 'chunks' such as words or familiar symbols. Third, the human memory thrives on redundancy. In fact, studies have shown that individuals’ short term memory will retain a password for approximately 30 seconds thereby requiring individuals to attempt to immediately memorize their passwords. It has also been shown that if an individual is interrupted before they fully memorize the password; it will fall out of their working memory and most likely be lost. Also, if an individual is in a hurry when the system demands a new password, individuals must sacrifice either the concentration of the critical task at hand or the recollection of the new password. Related to this issue is having to create the content for this new quickly demanded password. The pressure to choose creative and secure passwords quickly generally results in individuals failing in their attempt to memorize this new password. For healthcare organizations this can result in reset rates at one per reset per every four to five users per month (Brostoff and Sasse, 2001). In order to combat the issue of having to remember so many different passwords some users have resorted to the selecting familiar terms such as a pet or family name, their own name, their phone number, or other common terms that could be found in a dictionary. British psychologist Helen Petrie, Ph.D., a professor of human/computer interaction at City University in London analyzed the passwords of 1,200 British office workers who participated in a survey funded by CentralNic, an Internet domain-name company in 2001. She found that most individuals' passwords fell into one of four distinct password categories which were family, fan, fantasists, and cryptic. The first category of “family," comprised nearly half of the respondents. These individuals selected their own name, the name of a child, partner or pet, birth date, or significant number such as a social security number. Further, Dr. Petrie found that individuals also choose passwords that symbolized people or events with emotional value or ties. One third of the survey participants were identified as "fans," using the names of athletes, singers, movie stars, fictional characters, or sports teams. Dr. Petrie also found that these individuals wanted to align themselves with the lifestyle represented by or surrounded around a celebrity status. Two of the most popular names were Madonna and Homer Simpson. Fantasists made up eleven percent of survey responses. Dr. Petrie found that their passwords were comprised of sexual terms or topics. Some examples included in this category were terms such as "sexy," "stud" and "goddess." The final ten percent of participants were identified as "cryptics.” These users were seemingly the most security-conscious, but it should also be noted that they were also the smallest of all of the four identified categories. These individuals selected unintelligible passwords that included a random string of letters, numerals, and symbols such as Jxa+157. Self-created computer passwords are generally personal, and they reflect the personalities of millions of people as they attempt to summarize their life through a few taps on the keyboard. As psychologists know, people and personalities are often very predictable in the aggregate, as may be their choices of passwords. Psychologists have found that humans can store only five to nine random bits of information in their shortterm memory (Andrews, 2004), making it difficult to remember long and complicated passwords. Therefore, users have often chosen passwords with personal meanings that they can associate with something in their long-term memory. Most social engineers rely on employees to unknowingly help them attack company networks and systems by simply answering a series of simple questions. Today, most healthcare agencies have intrusion detection/prevention systems such as firewalls that can be used to alert organizations in the event of a security breach, but these systems cannot prevent employees from inadvertently sharing information with others. Therefore, the question still remains, “how much information might an employee provide to a stranger or to a co-worker?” In addition, social engineers can obtain information from the employee by pretending to innocently ask questions about hobbies, family members and pets, or the employee’s birth location, and can then assume the legitimate employee’s identity. Next, they are able to gain access to all of the information Information Institute Conferences, Las Vegas, NV, May 21-23, 2014 5 Medlin, Vannoy, Winston Healthcare Workers: A Possible Insider Threat that the employee is authorized to view. It is therefore imperative that employees be taught about the need for strong passwords and the tactics of social engineers. RESEARCH METHODOLOGY Instrument To simulate a real social engineering attack and to obtain a fair statistical representation of the security in relation to healthcare organizations, a survey was administered to employees of five hospitals. These hospitals consisted of varying sizes and were in different regions of the state. Hospital administration approval was obtained before administering the instrument, but the administration did not endorse the survey to respondents, nor did they ask them to participate. Data was gathered to not only determine how many employees would disclose their passwords and other personal information such as their address, phone number and email, but also simulated the types of information individuals were willing to share with co-workers, colleagues, or friends of colleagues. The information that employees were willing to share, including their passwords and other personal information, would certainly make it easier to hack into a system instead of having to “guess” at the necessary authentication information. Data Collection The data set was comprised of 118 responses, with respondents working in small rural areas with approximately 5,000 people, to larger, more urban populations of 500,000. Fifty-three of the respondents filled out entry forms for a drawing, and thus provided the researchers with additional personal and identifiable information. Analysis and Results Interestingly, the findings noted in Table 2 indicate that most respondents were often required to use a password to access systems, but rarely changed their passwords. As further indicated, most of the respondents used the same password on multiple accounts. The practice of rarely changing passwords and/or using the same password for multiple accounts would assist social engineers, thus allowing them to easily attain access to one system and possibly more. Table 2: Password Statistics Variable Name Question Pass_Freq How often do you use a password to 1 = Very Often access systems? 5 = Never Pass_Change Reuse How often passwords? Answers do you change 5 = Never Most people use the same password Characters 1 = Very Often 5 = Never On average, do you choose your own 1 = Choose Own 0 = password or have one assigned? Assigned How many characters are in most commonly used password? Mean Std Dev 118 1.23 0.59 117 2.85 1.13 118 2.47 1.32 117 0.89 0.32 116 5.03 1.71 your 1 = Very Often on multiple accounts. How often do you do this? Choose_Pass N your 1 = 1-3, 2 = 4, 3 = 5, 4 = 6, 5 = 7, 6 = 8, 7 = 9, 8 = 10+ Information Institute Conferences, Las Vegas, NV, May 21-23, 2014 6 Medlin, Vannoy, Winston Numbers Special_Char Do your passwords numbers? Healthcare Workers: A Possible Insider Threat contain any 1 = Yes, 0 = No Do your passwords have any special 1 = Yes, 0 = No characters in them (@, #, %, &, etc) Please tell us your password Password 117 0.87 0.34 118 0.16 0.37 118 0.73 0.45 1 = Shared 0 = Did Not Share Analyzing the results related to employees’ other password practices found that eighty-nine percent (89%) were allowed to choose their own passwords, with the average password being about seven characters in length. In addition, only sixteen percent (16%) of the employees included special characters, adding to the problem of less than secure passwords. Most interesting, of the 118 respondents, seventy-three percent (73%) of the employees shared their passwords with a co-worker or the friend of a co-worker through this survey instrument. It should be noted that one of the largest threats is that of the internal employee and again, the confidentiality of the password. Internal employees can also act as social engineers to gain access to additional resources. As seen in Table 3, half of the respondents created passwords consisting of family names, including their own name or nickname, the name of a child, or significant other. It is obvious that a very small percentage of employees are using most of the best practices recommended by governmental, educational, and private organizations. Table 3: Password Categories The catego ry of Question Answers N Mean “other Does your password fit into this 1 = Yes, 0 = ,” Family category? No 118 0.50 0.50 with Does your password fit into this 1 = Yes, 0 = fortyCryptic category? No 118 0.05 0.22 five perce Does your password fit into this 1 = Yes, 0 = nt Number category? No 118 0.45 0.50 (45%) Does your password fit into this 1 = Yes, 0 = of the Fan category? No 118 0.15 0.95 respo Does your password fit into this 1 = Yes, 0 = ndent Faith category? No 118 0.03 0.18 s indica Does your password fit into this 1 = Yes, 0 = ted School category? No 118 0.02 0.13 that Does your password fit into this 1 = Yes, 0 = their Fantasy category? No 118 0.00 0.00 passw ords Does your password fit into this 1 = Yes, 0 = includ Place category? No 118 0.14 0.34 ed a Does your password fit into this 1 = Yes, 0 = numb Other category? No 118 0.51 0.50 er. The choice to integrate a number is important, but just as important is the placement of that number and whether or not the number relates to meaningful and informative information such as a phone number or birth date. Variable Name Std Dev Fifteen percent (15%) of the respondents self-reported the inclusion of “fan-based” words, which could include names of athletes, singers, movie stars, and fictional characters or sports teams. “Place” was the Information Institute Conferences, Las Vegas, NV, May 21-23, 2014 7 Medlin, Vannoy, Winston Healthcare Workers: A Possible Insider Threat next highest category, with fourteen percent (14%), using another identifiable piece of information such as the city where the employee works or lives. The smallest of all of the self-identified password categories was “fantasy,” followed closely by the categories of school and faith. Five percent (5%) of the employees selected the “cryptic” category, suggesting that these employees are security-conscious since that category includes passwords that are unintelligible or include a random string of letters, numbers, and symbols. Unfortunately, as noted earlier, is it also the smallest of all of the eight self-reported categories. A T-test was conducted to show see if there were significant differences between those that shared their password versus those that did not share their password in relation to the categories established by Petri and others. Those that used family as a part of their password were also more willing to share their password (see Table 4). A significant difference was found between those who shared their passwords in comparison to those who did not in relation to how often they changed their passwords. Table 4: Employees Willing to Share or Not Share Passwords Pass_Freq Pass_Change Reuse Pass_Train Awar_Train Current_Train Choose_Pass Family Cryptic Number Fan Faith School Fantasy Place Other Characters Numbers Special_Char Shared Password Did Not Share Password Difference N 86 85 86 84 83 85 85 86 86 86 86 86 86 86 86 86 86 86 86 N 32 32 32 31 30 30 32 32 32 32 32 32 32 32 32 32 30 31 32 Mean Dif -0.33 -0.59 0.04 0.10 0.17 0.16 -0.15 0.30 -0.02 0.19 0.17 -0.04 -0.02 0.00 0.01 0.14 0.89 0.13 0.14 Mean 1.14 2.69 2.48 0.51 0.53 4.13 0.93 0.58 0.05 0.50 0.20 0.02 0.01 0.00 0.14 0.55 5.26 0.91 0.20 Std Dev 0.41 1.09 1.26 0.50 0.50 1.09 0.26 0.50 0.21 0.50 1.10 0.15 0.11 0.00 0.35 0.50 1.62 0.29 0.40 Mean 1.47 3.28 2.44 0.61 0.70 3.97 0.78 0.28 0.06 0.31 0.03 0.06 0.03 0.00 0.13 0.41 4.37 0.77 0.06 Std Dev 0.88 1.14 1.50 0.50 0.47 1.07 0.42 0.46 0.25 0.47 0.18 0.25 0.18 0.00 0.34 0.50 1.81 0.43 0.25 Sig. 0.01 0.01 0.89 0.34 0.11 0.48 0.02 0.00 0.73 0.07 0.40 0.30 0.47 NA 0.84 0.18 0.01 0.06 0.08 Several findings were significant. Sixty-three percent of those who included family as a part of their passwords were willing to share it. Even more surprisingly, those individuals who included numbers in their passwords were willing to share their passwords at a rate of 50%; this seems counter intuitive, as one would assume that employees who have created stronger passwords by including numbers would be less likely to share their passwords. As expected by most security experts, those who were more security conscious with the inclusion of a special character were not as willing to share it. DISCUSSION This study reveals several interesting findings. As noted earlier, most employees used the same passwords on multiple accounts, even though they frequently changed them. The actions of repeatedly using the same password are contrary to suggested recommendations by most security experts, because a hacker who gained access to one account could more easily access other systems. Requiring individuals to maintain a new password for each system or application would obviously make systems more secure but is in conflict with humans’ short-term human memory capabilities. Employees may consider it necessary to include familiar names, places, and numbers in their passwords so that they can easily recall them. Information Institute Conferences, Las Vegas, NV, May 21-23, 2014 8 Medlin, Vannoy, Winston Healthcare Workers: A Possible Insider Threat Though most employees indicated that their employers offered password security training either very often or often, it appears that either the types of training very not very effective or that the employees did not take it very seriously. As noted in Table 4 and on the positive side of good password practices, those employees offered password training were significantly more likely to NOT use a dictionary word as their password and were more likely to have a password that was at least 6 characters in length. On the negative side, however, those same employees were just as willing to share their passwords even after receiving the training as those that had not received training, suggesting that today’s training is deficient in some way. Other interesting findings emerged in relation to sharing or not sharing passwords. Employees who changed their password frequently were also more likely to share it. This action is contradictory in the fact that employees on one hand appear to be very security conscious while changing their password often and at the same time feeling secure enough to share it with others. Perhaps they were less concerned about sharing it because they thought it would be changed soon and so they perceived less risk. In comparison, those individuals who were assigned passwords were less likely to share them, which may be a question of remembrance, where they don’t share it because they don’t remember it. Another possibility may be that if assigned a password, they considered it mores sensitive and not to be shared. It may also be that those that are assigned passwords treat them with more respect due to the care the organization gives in giving it to them. Last, those respondents who had longer passwords were more likely to share them, giving credence to the idea that, because most individuals do not retain information for more than 30 seconds, they would not remember a long password even if told to them by another. Whether or not this is the case, it is inconsistency that on one hand the employee has the awareness of good security practices to create a long password, but on the other hand offers it freely to others. CONCLUSION Findings of the present study indicate that employees are willing to share personal information with co-workers and friends of co-workers. Seventy-three percent (73%) of the employees shared information that a social engineer could use to create a profile of an employee and gain access to the employer’s network and other confidential patient information. It is imperative that employees understand the consequences of sharing information, as well as the importance of creating and maintaining strong passwords. The simulation that was carried out during this study demonstrated that many employees may currently be in violation of HIPAA and HITECH regulations due to their willingness to share their information and their practice of creating weak passwords, thus allowing for easy access into a system. Hospitals and other healthcare agencies must identify ways to educate employees regarding HIPAA and HITECH regulations to protect patients and prevent penalties for sharing or misusing information. REFERENCES Andrews, L. W. (2004). Passwords reveal your personality. Retrieved March 13, 2007, from http://cms.psychologytoday.com/articles/pto- 20020101-000006.html. Brostoff, S., & Sasse, M. A. (2001). Safe and sound: A safety-critical approach to security. Position paper presented at the New Security Paradigms Workshop 2001, Cloudcroft, New Mexico. Burnett, M., & Kleiman, D. (2006). Perfect passwords. Selection, protection, authentication.Syngress. CERT. (2013). Insider threat http://www.cert.org/insider_threat, research. Retrieved December 1, 2013 from Department of Defense. (1985). Password management guideline. Retrieved September 2004, from http://www.alw.nih.gov/Security/FIRST/papers/password/dodpwman.txt. Information Institute Conferences, Las Vegas, NV, May 21-23, 2014 9 Medlin, Vannoy, Winston Healthcare Workers: A Possible Insider Threat Emory Health Care, Atlanta, Georgia, Retrieved from http://healthitsecurity.com/2013/07/23/healthcaredata-breaches-reviewing-the-ramifications/ on August 4, 2013.Georgetown University. (2009). Information security. Retrieved November 12, 2013, from http://security.georgetown.edu/passwords.html. Goldman, J., (2014). 30 Million Americans Affected by Medical Data Breaches Since 2009. Retrieved February 19, 2014 from http://www.esecurityplanet.com/network-security/30-million- americansaffected-by-medical-data-breaches-since-2009.htm. Gostin, L. O. (2000). Public health law: Power, duty, restraint. (pp. 132-134). Berkeley, CA: University of California Press. Gragg, D. (2007). A multi-level defense against social engineering. SANS. Retrieved July 1, 2009, from http://www.sans.org/reading_room/whitepapers/engineering/920.php. Howard University Hospital, Washington, D.C. Retrieved July http://www.healthcarefinancenews.com/news/top-10-data-security-breaches-2012. 21, 2013 from ID Analytics. (2007). Data breach harm analysis from ID Analytics uncovers new patterns of misuse arising from breaches of identity data. Retrieved November 12, 2013, from http://www.idanalytics.com/news_and_events/20071107.html. Intelegen, Inc. (2008). Human memory. Retrieved December 1, 2009 from http://brain.webus.com/memory/human_memory.htm. Kanaley, R. (2001). Login error trouble keeping track of all your sign-ons? Here’s a place to keep your electronic keys, but you better remember the password. San Jose Mercury News, 3G Medical Data Breaches. A Source of Chronic Pain. Retrieved August 15, 2013 from http://www.experian.com/blogs/data-breach/2013/05/01/medical-data-breaches-a-source-of-chronicpain. Nixon Peabody. (2009). Health law alert. Retrieved http://www.nixonpeabody.com/publications_detail3.asp?ID=2621. November 15, 2009 from Pfleeger, C. P., & Pfleeger, S. L. (2007). Security in computing, 4th ed. Prentice Hall. Pond, R., Podd, J., Bunnell, J., & Henderson, R. (2000). Word association computer passwords: The effect of formulation techniques on recall and guessing rates. Computers & Security, 19, 645-656. South Carolina Department of Health and Human Services, Columbia South Carolina. Retrieved August 5, 2013 from http://healthitsecurity.com/2013/07/23/healthcare-data-breaches-reviewing-theramifications/ on. Simpson, R. L. (2002). Chicago. Nursing Management, 33(12), 46-48. Stanford Hospital, Palo Alto, California. Retrieved August 3, http://www.nytimes.com/2011/09/09/us/09breach.html?pagewanted=all&_r=0 on. 2013 from Thompson, S.T. (2006). Helping the Hacker? Library Information, Security, and Social Engineering. Information Technology and Libraries, 25(4), 222-226. st Thornburgh, T. (2004). Social engineering: The dark art. Proceedings of the 1 Annual Conference on Information Security Curriculum Development, Kennesaw State University, Kennesaw, GA, September 2004. US Department of Health and Human Services. (2009). Protecting the privacy of patients' health information. Retrieved December 12, 2013 from http://www.hhs.gov/news/facts/privacy.html. Utah Department of Health, Salt Lake City, Utah, Retrieved from Utimaco. (2009). Health IT data breaches: No harm, no foul. Retrieved November 12, 2013 from http://compliance.utimaco.com/na/tag/hitech-act. Information Institute Conferences, Las Vegas, NV, May 21-23, 2014 10