These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

170 related articles for article (PubMed ID: 25023560)

  • 21. Cyberthreats: A primer for healthcare professionals.
    Tin D; Hata R; Granholm F; Ciottone RG; Staynings R; Ciottone GR
    Am J Emerg Med; 2023 Jun; 68():179-185. PubMed ID: 37061434
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Major global cyber-attack hits NHS and delays treatment.
    O'Dowd A
    BMJ; 2017 May; 357():j2357. PubMed ID: 28507019
    [No Abstract]   [Full Text] [Related]  

  • 23. What caused the breach? An examination of use of information technology and health data breaches.
    Wikina SB
    Perspect Health Inf Manag; 2014; 11(Fall):1h. PubMed ID: 25593574
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Handling confusion regarding electronic health records and HIPAA-governed breach of patient information.
    Kay L
    J Okla Dent Assoc; 2011 Jun; 102(4):32-3. PubMed ID: 21834279
    [No Abstract]   [Full Text] [Related]  

  • 25. Privacy and security. Threats from within.
    Haugh R
    Hosp Health Netw; 2005 Sep; 79(9):16, 18. PubMed ID: 16240942
    [No Abstract]   [Full Text] [Related]  

  • 26. The law of unintended (financial) consequences: the expansion of HIPAA business associate liability.
    Tomes JP
    J Health Care Finance; 2013; 39(4):28-35. PubMed ID: 24003759
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Cyber crime: can a standard risk analysis help in the challenges facing business continuity managers?
    Vande Putte D; Verhelst M
    J Bus Contin Emer Plan; 2013-2014 Winter; 7(2):126-37. PubMed ID: 24457324
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Connectivity, privacy, and liability. What medical professionals must consider.
    Wernick AS
    J AHIMA; 2007 Apr; 78(4):64-5. PubMed ID: 17455849
    [No Abstract]   [Full Text] [Related]  

  • 29. Healthcare Data Breaches: Implications for Digital Forensic Readiness.
    Chernyshev M; Zeadally S; Baig Z
    J Med Syst; 2018 Nov; 43(1):7. PubMed ID: 30488291
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Disclosure of past crimes: an analysis of mental health professionals' attitudes towards breaching confidentiality.
    Wangmo T; Handtke V; Elger BS
    J Bioeth Inq; 2014 Sep; 11(3):347-58. PubMed ID: 24985686
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Cyber risk and liability.
    Keso LR
    J Okla Dent Assoc; 2014 Jun; 105(4):34, 36. PubMed ID: 25004617
    [No Abstract]   [Full Text] [Related]  

  • 32. Legal issues in the information age--part 2.
    Fiesta J
    Nurs Manage; 1996 Sep; 27(9):12-3. PubMed ID: 8850943
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Corporate cloak and dagger. Tabloid tale of high-tech espionage fuels legal duel of doc-placement firms.
    Romano M
    Mod Healthc; 2001 Jul; 31(28):14-5. PubMed ID: 11471426
    [No Abstract]   [Full Text] [Related]  

  • 34. Electronic medical record and social media malpractice risks.
    Troxel DB
    Mich Med; 2012; 111(2):8, 10. PubMed ID: 22594155
    [No Abstract]   [Full Text] [Related]  

  • 35. Overview: computerized medical records create new legal and business confidentiality problems.
    Field RI
    Healthspan; 1994 Sep; 11(8):3-7. PubMed ID: 10137867
    [No Abstract]   [Full Text] [Related]  

  • 36. Breaking down silos between business continuity and cyber security.
    Phillips R; Tanner B
    J Bus Contin Emer Plan; 2019 Jan; 12(3):224-232. PubMed ID: 30857581
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Network liability: a new frontier for healthcare risk management.
    Switzer DP
    J Healthc Risk Manag; 2001; 21(2):3-13. PubMed ID: 11411063
    [No Abstract]   [Full Text] [Related]  

  • 38. Keys to securing data as a practitioner.
    Rey J; Douglass K
    J Med Pract Manage; 2012; 27(4):203-5. PubMed ID: 22413592
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Getting ready for identity theft rules: creating a prevention program for your medical practice.
    Cascardo D
    J Med Pract Manage; 2009; 25(2):131-3. PubMed ID: 19911551
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Legal requirements for computer security: electronic medical records and data interchange.
    Waller AA; Darrah JM
    Behav Healthc Tomorrow; 1996 Feb; 5(1):45-7. PubMed ID: 10158449
    [No Abstract]   [Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 9.