These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

140 related articles for article (PubMed ID: 23113795)

  • 1. Cyberterrorism: is the U.S. healthcare system safe?
    Harries D; Yellowlees PM
    Telemed J E Health; 2013 Jan; 19(1):61-6. PubMed ID: 23113795
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Cyber threats to health information systems: A systematic review.
    Luna R; Rhine E; Myhra M; Sullivan R; Kruse CS
    Technol Health Care; 2016; 24(1):1-9. PubMed ID: 26578272
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Healthcare cyber-attacks and the COVID-19 pandemic: an urgent threat to global health.
    Muthuppalaniappan M; Stevenson K
    Int J Qual Health Care; 2021 Feb; 33(1):. PubMed ID: 33351134
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Health Care Organizations: Soft Target during COVID-19 Pandemic.
    De Cauwer HG; Somville F
    Prehosp Disaster Med; 2021 Jun; 36(3):344-347. PubMed ID: 33622431
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Cybersecurity Challenges in Healthcare.
    Sendelj R; Ognjanovic I
    Stud Health Technol Inform; 2022 Oct; 300():190-202. PubMed ID: 36300412
    [TBL] [Abstract][Full Text] [Related]  

  • 6. A Cyberterrorism Effect? Emotional Reactions to Lethal Attacks on Critical Infrastructure.
    Backhaus S; Gross ML; Waismel-Manor I; Cohen H; Canetti D
    Cyberpsychol Behav Soc Netw; 2020 Sep; 23(9):595-603. PubMed ID: 32640924
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Cyber Attacks and Terrorism: A Twenty-First Century Conundrum.
    Albahar M
    Sci Eng Ethics; 2019 Aug; 25(4):993-1006. PubMed ID: 28058619
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Public Opinion and Cyberterrorism.
    Shandler R; Kostyuk N; Oppenheimer H
    Public Opin Q; 2023; 87(1):92-119. PubMed ID: 37113998
    [TBL] [Abstract][Full Text] [Related]  

  • 9. HIPAA--a real world perspective.
    Nulan C
    Radiol Manage; 2001; 23(2):29-37; quiz 38-40. PubMed ID: 11302064
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Infotech. Cyber security. Health care learns to share scares and solutions.
    Colias M
    Hosp Health Netw; 2004 May; 78(5):60-4, 2. PubMed ID: 15192882
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Network security vulnerabilities and personal privacy issues in Healthcare Information Systems: a case study in a private hospital in Turkey.
    Namoğlu N; Ulgen Y
    Stud Health Technol Inform; 2013; 190():126-8. PubMed ID: 23823398
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Cyberterrorism as a global threat: a review on repercussions and countermeasures.
    Iftikhar S
    PeerJ Comput Sci; 2024; 10():e1772. PubMed ID: 38259881
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Critical issues for homeland security and health care sector readiness.
    Blair JD; Edwards JT
    J Healthc Risk Manag; 2005; 25(3):17-21. PubMed ID: 20200863
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Cyberterrorism: bytes, not bombs.
    Baker T; McKenzie R
    Md Med; 2001; 2(4):44. PubMed ID: 11759440
    [No Abstract]   [Full Text] [Related]  

  • 15. How is cyber threat evolving and what do organisations need to consider?
    Borrett M; Carter R; Wespi A
    J Bus Contin Emer Plan; 2013-2014 Winter; 7(2):163-71. PubMed ID: 24457327
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Healthcare teams over the Internet: towards a certificate-based approach.
    Georgiadis CK; Mavridis IK; Pangalos GI
    Stud Health Technol Inform; 2002; 90():184-8. PubMed ID: 15460685
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Creating value-focused healthcare delivery systems: Part three--Core competencies.
    Beveridge RN
    J Oncol Manag; 1997; 6(6):16-23. PubMed ID: 10174597
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Cyber-attacks and threats for healthcare - a multi-layer thread analysis.
    Spanakis EG; Bonomi S; Sfakianakis S; Santucci G; Lenti S; Sorella M; Tanasache FD; Palleschi A; Ciccotelli C; Sakkalis V; Magalini S
    Annu Int Conf IEEE Eng Med Biol Soc; 2020 Jul; 2020():5705-5708. PubMed ID: 33019270
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Cyber crime: can a standard risk analysis help in the challenges facing business continuity managers?
    Vande Putte D; Verhelst M
    J Bus Contin Emer Plan; 2013-2014 Winter; 7(2):126-37. PubMed ID: 24457324
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Development of a security vulnerability assessment process for the RAMCAP chemical sector.
    Moore DA; Fuller B; Hazzan M; Jones JW
    J Hazard Mater; 2007 Apr; 142(3):689-94. PubMed ID: 16920260
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.