These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

194 related articles for article (PubMed ID: 24781874)

  • 1. Breaking the cyber-security dilemma: aligning security needs and removing vulnerabilities.
    Dunn Cavelty M
    Sci Eng Ethics; 2014 Sep; 20(3):701-15. PubMed ID: 24781874
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Privacy, confidentiality, and security in information systems of state health agencies.
    O'Brien DG; Yasnoff WA
    Am J Prev Med; 1999 May; 16(4):351-8. PubMed ID: 10493295
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Cyber resilience: a review of critical national infrastructure and cyber security protection measures applied in the UK and USA.
    Harrop W; Matteson A
    J Bus Contin Emer Plan; 2013-2014 Winter; 7(2):149-62. PubMed ID: 24457326
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Cyber security: a critical examination of information sharing versus data sensitivity issues for organisations at risk of cyber attack.
    Mallinder J; Drabwell P
    J Bus Contin Emer Plan; 2013-2014 Winter; 7(2):103-11. PubMed ID: 24457322
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Analysis of security and privacy challenges for DNA-genomics applications and databases.
    Arshad S; Arshad J; Khan MM; Parkinson S
    J Biomed Inform; 2021 Jul; 119():103815. PubMed ID: 34022422
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Preschool Cyber Security Management System Based on Intelligent Agents.
    Song J
    Comput Intell Neurosci; 2022; 2022():1992429. PubMed ID: 36248916
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Cyber security threats in the microbial genomics era: implications for public health.
    Fayans I; Motro Y; Rokach L; Oren Y; Moran-Gilad J
    Euro Surveill; 2020 Feb; 25(6):. PubMed ID: 32070468
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Empirical analysis of the effects of cyber security incidents.
    Davis G; Garcia A; Zhang W
    Risk Anal; 2009 Sep; 29(9):1304-16. PubMed ID: 19558397
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Network security vulnerabilities and personal privacy issues in Healthcare Information Systems: a case study in a private hospital in Turkey.
    Namoğlu N; Ulgen Y
    Stud Health Technol Inform; 2013; 190():126-8. PubMed ID: 23823398
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Automated Cyber and Privacy Risk Management Toolkit.
    Gonzalez-Granadillo G; Menesidou SA; Papamartzivanos D; Romeu R; Navarro-Llobet D; Okoh C; Nifakos S; Xenakis C; Panaousis E
    Sensors (Basel); 2021 Aug; 21(16):. PubMed ID: 34450935
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Privacy Law Protection Based on the Information Security Assurance Algorithm.
    Wang Z; Yue Q
    Comput Intell Neurosci; 2022; 2022():8006605. PubMed ID: 36120696
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Safe: a status update on information security and the hospital community.
    Fundner R
    Hosp Q; 2003; 7(1):60-6. PubMed ID: 14674180
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Implementing technological safeguards to ensure patient privacy.
    Leestma R
    Caring; 2003 Feb; 22(2):16-8. PubMed ID: 12625255
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Cyber-physical systems security: Limitations, issues and future trends.
    Yaacoub JA; Salman O; Noura HN; Kaaniche N; Chehab A; Malli M
    Microprocess Microsyst; 2020 Sep; 77():103201. PubMed ID: 32834204
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.
    Nifakos S; Chandramouli K; Nikolaou CK; Papachristou P; Koch S; Panaousis E; Bonacina S
    Sensors (Basel); 2021 Jul; 21(15):. PubMed ID: 34372354
    [No Abstract]   [Full Text] [Related]  

  • 16. Security Privacy and Policy for Cryptographic Based Electronic Medical Information System.
    Chen HY; Wu ZY; Chen TL; Huang YM; Liu CH
    Sensors (Basel); 2021 Jan; 21(3):. PubMed ID: 33494288
    [TBL] [Abstract][Full Text] [Related]  

  • 17. The cyber threat, trophy information and the fortress mentality.
    Scully T
    J Bus Contin Emer Plan; 2011 Oct; 5(3):195-207. PubMed ID: 22130338
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Sneaks and leaks sink privacy policies.
    Sarudi D
    Hosp Health Netw; 2000 Aug; 74(8):40-4. PubMed ID: 10983223
    [No Abstract]   [Full Text] [Related]  

  • 19. Cyberinfo: privacy and personal health data in cyberspace.
    Day J
    J Contemp Dent Pract; 2000 Nov; 1(4):87-96. PubMed ID: 12167953
    [TBL] [Abstract][Full Text] [Related]  

  • 20. IT security: developing a response to increasing risks.
    Waegemann CP
    Int J Biomed Comput; 1996 Oct; 43(1-2):5-8. PubMed ID: 8960915
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 10.