Analyzing the Vulnerability of U.S. Hospitals to Social Engineering Attacks: How Many of Your Employees Would Share Their Password?
B. Dawn MedlinJoseph A. CazierDaniel P. FoulkPublished in: Int. J. Inf. Secur. Priv. (2008)
Keyphrases
- countermeasures
- buffer overflow
- information security
- security risks
- social networks
- social interaction
- social media
- engineering design
- denial of service
- information technology
- security vulnerabilities
- information systems
- attack detection
- security threats
- sharing information
- dos attacks
- social capital
- social networking
- artificial intelligence
- software engineering
- attack graphs
- electronic health records
- human resources
- design process
- computer science