Evaluación del patrón de contraseña utilizado por los estudiantes de tecnología de la información de salud

Autores/as

  • Somayeh Niazi Kaji Department of Health Information Technology, Faculty of Medicine, Ahvaz Jundishapur University of Medical Sciences, Ahvaz, Iran
  • Amir Jamshidnezhad Department of Health Information Technology, Faculty of Medicine, Ahvaz Jundishapur University of Medical Sciences, Ahvaz, Iran
  • Ali Talebi Shoushtarian Department of Medical Library and Information Sciences, Faculty of Allied Health Sciences, Ahvaz Jundishapur University of Medical Sciences, Ahvaz, Iran

Palabras clave:

Patrones de contraseña, Autenticación, Patrones de ataque, Seguridad de cuenta, Tecnología de la información.

Resumen

Hoy en día, la tecnología se utiliza como una herramienta importante y principal para facilitar la vida humana. Las computadoras, tabletas, teléfonos inteligentes y redes sociales masivas han afectado a la salud y las profesiones médicas. Mantener la seguridad en tales entornos es uno de los temas importantes y críticos. La elección de una contraseña adecuada para las cuentas de usuario es un tema difícil para la seguridad en el entorno digital. Este estudio se realizó para considerar el nivel de autenticación para los usuarios académicos. El tamaño de la muestra se encontró utilizando la fórmula de Gregis Morgan. Por lo tanto, se investigaron y consideraron los patrones de contraseñas utilizadas en los entornos cibernéticos por 200 estudiantes de ciencias de TI. Se han utilizado estadísticas descriptivas para analizar los datos recopilados en este estudio. Los resultados mostraron que las contraseñas seleccionadas por los estudiantes eran deficientes e imaginables para romperlas.

Descargas

Los datos de descargas todavía no están disponibles.

Biografía del autor/a

Somayeh Niazi Kaji, Department of Health Information Technology, Faculty of Medicine, Ahvaz Jundishapur University of Medical Sciences, Ahvaz, Iran

Department of Health Information Technology, Faculty of Medicine, Ahvaz Jundishapur University of Medical Sciences, Ahvaz, Iran

Amir Jamshidnezhad, Department of Health Information Technology, Faculty of Medicine, Ahvaz Jundishapur University of Medical Sciences, Ahvaz, Iran

Department of Health Information Technology, Faculty of Medicine, Ahvaz Jundishapur University of Medical Sciences, Ahvaz, Iran

Ali Talebi Shoushtarian, Department of Medical Library and Information Sciences, Faculty of Allied Health Sciences, Ahvaz Jundishapur University of Medical Sciences, Ahvaz, Iran

Department of Medical Library and Information Sciences, Faculty of Allied Health Sciences, Ahvaz Jundishapur University of Medical Sciences, Ahvaz, Iran

Citas

1- Sohrab, S. Ahsan, R. Faqih Mirzaee, S. 2014, Comparison of demographic and password individual using data mining in organization, case study IT institute of excellence Qom, the first congress of new technologies to achieve sustainable development, institution of higher education Mehr Arvand.

2-Qochani, M.M. Mosavi, A. Hosseinpor, D. 2015, Protection and security of information By providing a conceptual model of social engineering, journal of security information imam hossein computer sieve university of tehran;3(14):65-84.

2-Mousavi, M.A. Moshiri, M.E. 2014, Combining authentication methods for mobile transactions, National conference on new achievements in science, engineering and basic electronics, Islamic Azad University of Boroujerd, Amir Kabir University of Tehran.

3-Arian, P. Tabakhi Faryzany, S.R. 2015, Quality field study and how to choose passwords between users in Iran, second international congress of technology, connection and knowledge(ICTCK2015),Mashhad, Islamic azad university of Mashhad.

4- Nayeb, N. SHarifi, Y. 2012, Providing a safe method to create a single password OTP by using mobile phone, Iran mobile congress, Tehran, Sharif university of technology research center.

5- Karami, M. Safdari, R. Soltani, A. 2013, Patient right Information: Guidelines for the Security Information In the electronic environment. Journal of Medical Ethics.7 (25):83-96.

6- Asadi Zangeneh, M. Asadi Zangeneh, S.H. Pour Normandy, R. 2014, Presentation a combination of fingerprint and personal information using fuzzy logic to increase the security and user identity system in ATM system, National conference on computer engineering and information technology management. Tehran, company farzin Sunrise Science & Technology.

7- Norizadeh, J. 2012, Check user authentication through graphic password, First national conference on information and network technology university Payamnor, Tabbas, Iran.

8- Marris, R. Thompson, K. 1979. Password security: case history. Comm. ACM,

9-http://www.pcmage.com/article 2/0,2817,2386533,00.asp 2014.11.21

10- Florencio, D. Herley, C. 2007, A large-scale study of web password habits. Proceeding of the 16th international conference on World Wide Web. ACM.

11- Zamani Babgohari, E. Elahizade Mahani, N. 2013, Checking administrative bodies of security problems in Iran and solution by with introduction of the software password security, first national conference on emerging trends in computer engineering and data recovery Rodsar, Islamic Azad university Rodsar, Iran.

12- Heidary, M. Ahmadzadeh, M. 2013, New ways of using password authentication pattern, second national computer conference, sanandaj,vocational school samai sanandaj.

Descargas

Publicado

2019-02-27

Cómo citar

Kaji, S. N., Jamshidnezhad, A., & Shoushtarian, A. T. (2019). Evaluación del patrón de contraseña utilizado por los estudiantes de tecnología de la información de salud. Amazonia Investiga, 8(18), 198–202. Recuperado a partir de https://amazoniainvestiga.info/index.php/amazonia/article/view/296

Número

Sección

Articles