These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

168 related articles for article (PubMed ID: 19558397)

  • 1. Empirical analysis of the effects of cyber security incidents.
    Davis G; Garcia A; Zhang W
    Risk Anal; 2009 Sep; 29(9):1304-16. PubMed ID: 19558397
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Cyber security: a critical examination of information sharing versus data sensitivity issues for organisations at risk of cyber attack.
    Mallinder J; Drabwell P
    J Bus Contin Emer Plan; 2013-2014 Winter; 7(2):103-11. PubMed ID: 24457322
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Cyber crime: can a standard risk analysis help in the challenges facing business continuity managers?
    Vande Putte D; Verhelst M
    J Bus Contin Emer Plan; 2013-2014 Winter; 7(2):126-37. PubMed ID: 24457324
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Breaking down silos between business continuity and cyber security.
    Phillips R; Tanner B
    J Bus Contin Emer Plan; 2019 Jan; 12(3):224-232. PubMed ID: 30857581
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Business continuity strategies for cyber defence: battling time and information overload.
    Streufert J
    J Bus Contin Emer Plan; 2010 Nov; 4(4):303-16. PubMed ID: 21177217
    [TBL] [Abstract][Full Text] [Related]  

  • 6. What is a free customer worth? Armchair calculations of nonpaying customers' value can lead to flawed strategies.
    Gupta S; Mela CF
    Harv Bus Rev; 2008 Nov; 86(11):102-9, 138. PubMed ID: 19009724
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Breaking the cyber-security dilemma: aligning security needs and removing vulnerabilities.
    Dunn Cavelty M
    Sci Eng Ethics; 2014 Sep; 20(3):701-15. PubMed ID: 24781874
    [TBL] [Abstract][Full Text] [Related]  

  • 8. The cyber threat, trophy information and the fortress mentality.
    Scully T
    J Bus Contin Emer Plan; 2011 Oct; 5(3):195-207. PubMed ID: 22130338
    [TBL] [Abstract][Full Text] [Related]  

  • 9. The cyber security threat stops in the boardroom.
    Scully T
    J Bus Contin Emer Plan; 2013-2014 Winter; 7(2):138-48. PubMed ID: 24457325
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Cyber resilience: a review of critical national infrastructure and cyber security protection measures applied in the UK and USA.
    Harrop W; Matteson A
    J Bus Contin Emer Plan; 2013-2014 Winter; 7(2):149-62. PubMed ID: 24457326
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Cyber security risk assessment for SCADA and DCS networks.
    Ralston PA; Graham JH; Hieb JL
    ISA Trans; 2007 Oct; 46(4):583-94. PubMed ID: 17624350
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace.
    Pieters W; Hadžiosmanović D; Dechesne F
    Sci Eng Ethics; 2016 Jun; 22(3):831-50. PubMed ID: 25896029
    [TBL] [Abstract][Full Text] [Related]  

  • 13. What good cyber resilience looks like.
    Hult F; Sivanesan G
    J Bus Contin Emer Plan; 2013-2014 Winter; 7(2):112-25. PubMed ID: 24457323
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Data-Driven Cyber Security in Perspective-Intelligent Traffic Analysis.
    Coulter R; Han QL; Pan L; Zhang J; Xiang Y
    IEEE Trans Cybern; 2020 Jul; 50(7):3081-3093. PubMed ID: 31634146
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Defining a Cyber Resilience Investment Strategy in an Industrial Internet of Things Context.
    Carías JF; Labaka L; Sarriegi JM; Hernantes J
    Sensors (Basel); 2019 Jan; 19(1):. PubMed ID: 30609777
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Merging Datasets of CyberSecurity Incidents for Fun and Insight.
    Abbiati G; Ranise S; Schizzerotto A; Siena A
    Front Big Data; 2020; 3():521132. PubMed ID: 33693409
    [TBL] [Abstract][Full Text] [Related]  

  • 17. An exploratory risk perception study of attitudes toward homeland security systems.
    Sanquist TF; Mahy H; Morris F
    Risk Anal; 2008 Aug; 28(4):1125-33. PubMed ID: 18627541
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A macro-economic framework for evaluation of cyber security risks related to protection of intellectual property.
    Andrijcic E; Horowitz B
    Risk Anal; 2006 Aug; 26(4):907-23. PubMed ID: 16948685
    [TBL] [Abstract][Full Text] [Related]  

  • 19. How is cyber threat evolving and what do organisations need to consider?
    Borrett M; Carter R; Wespi A
    J Bus Contin Emer Plan; 2013-2014 Winter; 7(2):163-71. PubMed ID: 24457327
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Opportunities and challenges of Web 2.0 within the health care systems: an empirical exploration.
    Lupiáñez-Villanueva F; Mayer MA; Torrent J
    Inform Health Soc Care; 2009 Sep; 34(3):117-26. PubMed ID: 19670002
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 9.