Professional Safety

Improved Essays
Curry, D. G., Quinn, R. D., Atkins, D. R., & Carlson, T. C. (2004). Injuries & the experienced worker. Professional Safety, 49(9), 30-34.

This is an article on worker safety that examines three case studies. The studies were of an electrical worker with 15 years of experience, a construction worker with eight, and a boilermaker with over 30 years of experience. In each instance, the individual performed action they clearly knew was risky and it resulted in severe injuries to each worker. The authors attempt to analyze why the workers engaged in this risky behavior. The theory is that the exposure to risk is subjective and not objective. This means the more someone is around a particular danger, the less dangerous it will seem if they
…show more content…
In fact, many of the concerns and issues noted in the article are still quite prevalent today. All the bad password practices are still prevalent, and the use of passwords has done nothing but increase. It is interesting to note a study cited by the author where 12% of users at that time were accessing 10 or more systems. The author surmised if individual websites were factored into the analysis the percentage would grow substantially. He even related personal information to indicate that his number of passwords for systems and sites was well over 30. With the increased size and usage of the internet, it is hard to imagine this demand has done anything but increase. Therefore this article serves well as a snapshot of the state of passwords at the time while also offering astute observations and predictions that have stood the test of time. It is a well written and worthy article for anyone interested in password issues which clearly shows that users are being overwhelmed with too many …show more content…
Sites should not expect strong security passwords if they are not going to enforce the rules for them. Additionally, the author found little evidence of sites trying to educate users for a strong password creation. However, as good as this article is, it is important to note its publication date. Web services and sites are constantly changing, not only in what they require but also in their popularity. Still, this study clearly shows that relying completely on the users to self-govern their password creation behaviors is problematic at best and fatally flawed at worst. A similar but more recent study would be very interesting to see if web service sites have begun to understand that creating secure passwords truly needs to be a joint effort between users and services. This is yet another example of how security designers are not understanding the practical limitations of their all too human

Related Documents

  • Decent Essays

    A strong password would be a password with at least 12 characters, the more characters you have the less the chance of getting your account stolen. 3. Give examples of computer crime and cyber crime that illustrate…

    • 74 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 3 Term Paper

    • 621 Words
    • 3 Pages

    3. Use a Password Management Tool Phishing are made specially to gain usernames and passwords to steal sensitive or confidential information. The passwords management tool can be used to ease the staffs by changing their passwords after each important transactions and send messages for confirmation and their new and unique passwords. 4.…

    • 621 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    According to http://www.workplacesafetyadvice.co.uk/common-injuriescauses-accidents-work.html, there are 34 million workdays that have been lost due to a workplace accident or illness. Some common causes of workplace accidents are unsafe conditions, unsafe acts, personal beliefs, traps, and those that simply make the decision to work unsafe in the first place. Unsafe conditions can be caused by a person who was injured or made by an employee or a third party. An example of an unsafe act would be someone disregarding the company rules or an employee who is not paying attention.…

    • 244 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    In the film Blood on the Mountain, a health inspector details how he was abruptly sent away, to not report the dangers within the workplace (Evans, Freeman, & Wallace, 2016). It may not seem as though there are not as many workplace accidents, due to the statistics put out by The Association of Workers' Compensation Boards of Canada, yet this is not completely accurate (Whelan 2018b). There are numerous reasons for a decline in accidents, and not all are due to a safer workplace. The decline is mainly due to the exportation of these businesses to other countries and downplaying the accidents of the workers. (Whelan 2018b).…

    • 1021 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    In the end, the web is just a tool; how you use will determine if it has a positive or negative outcome. People are used to living in a deterministic world where they think that the human choices and decisions have sufficient causes. The process of technology being more reliable and iterative is being feared by the creator themselves. Cyber-security expert, Colin Williams, explained how technology has always reshaped society and that “we tell ourselves stories to try to understand why and how.” Nowadays, we depend more on technology than we do with our brain.…

    • 972 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    In its fiscal year 2016 assessment report, ICS-CERT listed the most prevalent critical infrastructure vulnerabilities and potential risk that may result from exploitation of these weaknesses. 1. Boundary protection: Weaker boundaries between industrial control systems and enterprise networks makes it difficult to detect unauthorized activity in critical systems. 2. Least functionality: It is important for organizations to minimize and close unused services, ports, protocols, applications and functions that increases vectors for malicious party to gain access to critical systems.…

    • 301 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Does OSHA Raise Penalties

    • 760 Words
    • 4 Pages

    How Does OSHA Raise Penalties 82% and We Don’t Notice? The two year Budget Agreement that president Obama signed in November 2 under closed doors, surprisingly included provisions that authorized Occupational Safety & Health Administration raised the penalties by as much as 50% to a new historic high level of 82%. This was the first time the penalty was being raised since Bush senior’s tenure in office, 15 years ago. In spite of the increase, Statistics indicate that OSHA fines are still relatively low compared to those charged by regulatory agencies like EPA.…

    • 760 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Response Essay Rewrite In recent times, Apple and the FBI have been arguing over the creation of software that would be able to reveal encrypted information. The author of the article Biting Apple Bruises Privacy Rights, argues the idea that by forcing Apple to hack their product will result in future violations of security and privacy. Personally, I strongly agree with the writer’s belief that forcing companies to reveal secured information is completely unwarranted and should not be allowed under any circumstance.…

    • 1482 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    The Jungle Urbanization

    • 1173 Words
    • 5 Pages

    One of the worst workplace safety was working at the steel mill. According to the documentary the river ran red, a single slip and fall could lose a man his life. When companies realized how much money they were making they wanted to keep it consistent or increase it. They then started making the men work long hours and do dangerous work. What made it even more dangerous was the cheap equipment and the hot environment they were working under.…

    • 1173 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Passwords exist for a reason. The second reason this view is nonsense is because someone who is aware that they are being monitored will consciously or unconsciously change their thoughts and behavior just because he/she is aware that they are being recorded. Johann Wolfgang von Goethe a German statesman from the 18th century said “none are more hopelessly enslaved than those who falsely believe they are free”.21…

    • 530 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Personal Safety

    • 954 Words
    • 4 Pages

    Personal Safety in the lab Personal Protective Equipment There is the possibility for safety concerns in the lab that may happen at any given moment. This could range from contact with a biological agent, splashing a hazardous chemical or even handling radioactive material. It is of the upmost importance that personal protective equipment be worn in the lab that should protect them from specific hazards of a hazardous substance. It should be noted that personal protective equipment used in the lab does not open the gates for a lacks in the protocols and measures one should be taking to ensure safety.…

    • 954 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Proper password security Passwords are is a convenient method of authentication the way it works is the system requires someone to enter a piece of information and then match it to the one that the system has if the information is correct the user will be able to access the system but there is some disadvantages of this some people may try to gain your password by looking over your shoulder or a brute force attack which implies that the person trying to require your password will try to maybe use a program that will automatically enter numbers and letters to try match it so some companies will have a method to prevent this for example they give you a certain number of tries to enter the password so this means that the person who entering the password will get a certain amount of tries this will prevent programs from searching for your password there is also the fact that you might have to type in more than one piece of information to gain access so this could be a password plus a security question that only you would…

    • 1392 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    In Ian Urbina’s article, the connection between passwords utilized by people and how they can hold deep meanings delving into a persons’ emotions, thought processes, personal past experiences, and the very essence of who they are, is explored at length. Urbina runs a study to create his thesis that people primarily utilize “Keepsake” passwords through collecting people’s passwords (either current or past) and why those specific passwords were chosen, as a proof that there is a deep connection between the passwords, the maker and the memories these helped to cement for individuals. With the use of a very emotional event, the destruction of the twin towers, Urbina grabs the effectively reader’s attention in explaining the difficulties of Howard…

    • 1617 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Before start work, the workers were not given instruction or briefing before starting work filming. Therefore, prone to unforeseen accident to employees as it related to safety underestimated. In doing a job we should be able to identify hazard in work environment. The first hazard is physical hazard of accidents such as falls.…

    • 1115 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Leadership in the Workplace 1. Introduction/Background In this assignment, I will be describing the transformational and transactional leadership behaviours, which supports the success to the safety program in my current workplace. I now work for a company by the name of “All Weather Windows Commercial Ltd”. I’ve been hired on as the Health and Safety Advisor and been employed under this role for over 3 years now.…

    • 831 Words
    • 4 Pages
    Improved Essays