1. Introduction
A long-standing tenet of information security is the principle of least privilege, the concept that “every privileged user of the system should operate using the least amount of privilege necessary to complete the job” [42, p. 389]. However, many medical, financial, and personnel records systems are intentionally deployed with seemingly little regard for this principle. Rather than limiting access to specific areas, end users of these systems are given broad access to information.