Evaluation of password pattern used by the students of health information technology

  • Somayeh Niazi Kaji Department of Health Information Technology, Faculty of Medicine, Ahvaz Jundishapur University of Medical Sciences, Ahvaz, Iran
  • Amir Jamshidnezhad Department of Health Information Technology, Faculty of Medicine, Ahvaz Jundishapur University of Medical Sciences, Ahvaz, Iran
  • Ali Talebi Shoushtarian Department of Medical Library and Information Sciences, Faculty of Allied Health Sciences, Ahvaz Jundishapur University of Medical Sciences, Ahvaz, Iran
Keywords: Password patterns, Authentication, Attack patterns, Security of account, Information Technology.

Abstract

Today, technology is used as an important and foremost tool to facilitate human life. Computers, tablets, smart phones and massive social networks have affected the health and medical professions. Keeping security in such environments is one of the important and critical issue. Choose of a proper password for user accounts is a challenging matter for security in the digital environment. This study was conducted to consider the authentication level for the academic users. The sample size was found using the Gregis Morgan formula. Therefore, the patterns of passwords used in cyber environments by 200 students of IT Sciences were investigated and considered. Descriptive statistics have been used to analyze the gathered data in this study. The results showed that the passwords selected by the students were poor and imaginable for breaking.

Downloads

Download data is not yet available.

Author Biographies

Somayeh Niazi Kaji, Department of Health Information Technology, Faculty of Medicine, Ahvaz Jundishapur University of Medical Sciences, Ahvaz, Iran

Department of Health Information Technology, Faculty of Medicine, Ahvaz Jundishapur University of Medical Sciences, Ahvaz, Iran

Amir Jamshidnezhad, Department of Health Information Technology, Faculty of Medicine, Ahvaz Jundishapur University of Medical Sciences, Ahvaz, Iran

Department of Health Information Technology, Faculty of Medicine, Ahvaz Jundishapur University of Medical Sciences, Ahvaz, Iran

Ali Talebi Shoushtarian, Department of Medical Library and Information Sciences, Faculty of Allied Health Sciences, Ahvaz Jundishapur University of Medical Sciences, Ahvaz, Iran

Department of Medical Library and Information Sciences, Faculty of Allied Health Sciences, Ahvaz Jundishapur University of Medical Sciences, Ahvaz, Iran

References

1- Sohrab, S. Ahsan, R. Faqih Mirzaee, S. 2014, Comparison of demographic and password individual using data mining in organization, case study IT institute of excellence Qom, the first congress of new technologies to achieve sustainable development, institution of higher education Mehr Arvand.

2-Qochani, M.M. Mosavi, A. Hosseinpor, D. 2015, Protection and security of information By providing a conceptual model of social engineering, journal of security information imam hossein computer sieve university of tehran;3(14):65-84.

2-Mousavi, M.A. Moshiri, M.E. 2014, Combining authentication methods for mobile transactions, National conference on new achievements in science, engineering and basic electronics, Islamic Azad University of Boroujerd, Amir Kabir University of Tehran.

3-Arian, P. Tabakhi Faryzany, S.R. 2015, Quality field study and how to choose passwords between users in Iran, second international congress of technology, connection and knowledge(ICTCK2015),Mashhad, Islamic azad university of Mashhad.

4- Nayeb, N. SHarifi, Y. 2012, Providing a safe method to create a single password OTP by using mobile phone, Iran mobile congress, Tehran, Sharif university of technology research center.

5- Karami, M. Safdari, R. Soltani, A. 2013, Patient right Information: Guidelines for the Security Information In the electronic environment. Journal of Medical Ethics.7 (25):83-96.

6- Asadi Zangeneh, M. Asadi Zangeneh, S.H. Pour Normandy, R. 2014, Presentation a combination of fingerprint and personal information using fuzzy logic to increase the security and user identity system in ATM system, National conference on computer engineering and information technology management. Tehran, company farzin Sunrise Science & Technology.

7- Norizadeh, J. 2012, Check user authentication through graphic password, First national conference on information and network technology university Payamnor, Tabbas, Iran.

8- Marris, R. Thompson, K. 1979. Password security: case history. Comm. ACM,

9-http://www.pcmage.com/article 2/0,2817,2386533,00.asp 2014.11.21

10- Florencio, D. Herley, C. 2007, A large-scale study of web password habits. Proceeding of the 16th international conference on World Wide Web. ACM.

11- Zamani Babgohari, E. Elahizade Mahani, N. 2013, Checking administrative bodies of security problems in Iran and solution by with introduction of the software password security, first national conference on emerging trends in computer engineering and data recovery Rodsar, Islamic Azad university Rodsar, Iran.

12- Heidary, M. Ahmadzadeh, M. 2013, New ways of using password authentication pattern, second national computer conference, sanandaj,vocational school samai sanandaj.
Published
2019-02-27
How to Cite
Kaji, S., Jamshidnezhad, A., & Shoushtarian, A. (2019). Evaluation of password pattern used by the students of health information technology. Amazonia Investiga, 8(18), 198-202. Retrieved from https://www.amazoniainvestiga.info/index.php/amazonia/article/view/296
Section
Articles
Bookmark and Share