These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

129 related articles for article (PubMed ID: 25517697)

  • 1. Individual differences in cyber security behaviors: an examination of who is sharing passwords.
    Whitty M; Doodson J; Creese S; Hodges D
    Cyberpsychol Behav Soc Netw; 2015 Jan; 18(1):3-7. PubMed ID: 25517697
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Correction.
    Cyberpsychol Behav Soc Netw; 2015 Mar; 18(3):195. PubMed ID: 25751054
    [TBL] [Abstract][Full Text] [Related]  

  • 3. "Passwords protect my stuff"-a study of children's password practices.
    Choong YY; Theofanos MF; Renaud K; Prior S
    J Cybersecur; 2019; 5(1):. PubMed ID: 33042580
    [TBL] [Abstract][Full Text] [Related]  

  • 4. When Sharing Is a Bad Idea: The Effects of Online Social Network Engagement and Sharing Passwords with Friends on Cyberbullying Involvement.
    Meter DJ; Bauman S
    Cyberpsychol Behav Soc Netw; 2015 Aug; 18(8):437-42. PubMed ID: 26252928
    [TBL] [Abstract][Full Text] [Related]  

  • 5. How strong are passwords used to protect personal health information in clinical trials?
    El Emam K; Moreau K; Jonker E
    J Med Internet Res; 2011 Feb; 13(1):e18. PubMed ID: 21317106
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Patient and public views about the security and privacy of Electronic Health Records (EHRs) in the UK: results from a mixed methods study.
    Papoutsi C; Reed JE; Marston C; Lewis R; Majeed A; Bell D
    BMC Med Inform Decis Mak; 2015 Oct; 15():86. PubMed ID: 26466787
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Do privacy and security regulations need a status update? Perspectives from an intergenerational survey.
    Pereira S; Robinson JO; Peoples HA; Gutierrez AM; Majumder MA; McGuire AL; Rothstein MA
    PLoS One; 2017; 12(9):e0184525. PubMed ID: 28926626
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Susceptibility and resilience to cyber threat: Findings from a scenario decision program to measure secure and insecure computing behavior.
    Weems CF; Ahmed I; Richard GG; Russell JD; Neill EL
    PLoS One; 2018; 13(12):e0207408. PubMed ID: 30540758
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Consumer Attitudes and Perceptions on mHealth Privacy and Security: Findings From a Mixed-Methods Study.
    Atienza AA; Zarcadoolas C; Vaughon W; Hughes P; Patel V; Chou WY; Pritts J
    J Health Commun; 2015; 20(6):673-9. PubMed ID: 25868685
    [TBL] [Abstract][Full Text] [Related]  

  • 10. ISBP: Understanding the Security Rule of Users' Information-Sharing Behaviors in Partnership.
    Wu H; Wang X
    PLoS One; 2016; 11(3):e0151002. PubMed ID: 26950064
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Exposure to Sexual Stimuli Induces Greater Discounting Leading to Increased Involvement in Cyber Delinquency Among Men.
    Cheng W; Chiou WB
    Cyberpsychol Behav Soc Netw; 2018 Feb; 21(2):99-104. PubMed ID: 28621556
    [TBL] [Abstract][Full Text] [Related]  

  • 12. LPG-PCFG: An Improved Probabilistic Context- Free Grammar to Hit Low-Probability Passwords.
    Guo X; Tan K; Liu Y; Jin M; Lu H
    Sensors (Basel); 2022 Jun; 22(12):. PubMed ID: 35746386
    [TBL] [Abstract][Full Text] [Related]  

  • 13. The Effects of Social Anxiety and Online Privacy Concern on Individual Differences in Internet-Based Interaction Anxiety and Communication Preferences.
    Shaughnessy K; Rocheleau JN; Kamalou S; Moscovitch DA
    Cyberpsychol Behav Soc Netw; 2017 Apr; 20(4):212-217. PubMed ID: 28394207
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Cyber threats to health information systems: A systematic review.
    Luna R; Rhine E; Myhra M; Sullivan R; Kruse CS
    Technol Health Care; 2016; 24(1):1-9. PubMed ID: 26578272
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Analysis of health professional security behaviors in a real clinical setting: an empirical study.
    Fernández-Alemán JL; Sánchez-Henarejos A; Toval A; Sánchez-García AB; Hernández-Hernández I; Fernandez-Luque L
    Int J Med Inform; 2015 Jun; 84(6):454-67. PubMed ID: 25678101
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Cyber security: a critical examination of information sharing versus data sensitivity issues for organisations at risk of cyber attack.
    Mallinder J; Drabwell P
    J Bus Contin Emer Plan; 2013-2014 Winter; 7(2):103-11. PubMed ID: 24457322
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Perspectives of Australian adults about protecting the privacy of their health information in statistical databases.
    King T; Brankovic L; Gillard P
    Int J Med Inform; 2012 Apr; 81(4):279-89. PubMed ID: 22306206
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Improving computer security for authentication of users: influence of proactive password restrictions.
    Proctor RW; Lien MC; Vu KP; Schultz EE; Salvendy G
    Behav Res Methods Instrum Comput; 2002 May; 34(2):163-9. PubMed ID: 12109007
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Passwords usage and human memory limitations: a survey across age and educational background.
    Pilar DR; Jaeger A; Gomes CF; Stein LM
    PLoS One; 2012; 7(12):e51067. PubMed ID: 23227232
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Securing the data economy: translating privacy and enacting security in the development of DataSHIELD.
    Murtagh MJ; Demir I; Jenkings KN; Wallace SE; Murtagh B; Boniol M; Bota M; Laflamme P; Boffetta P; Ferretti V; Burton PR
    Public Health Genomics; 2012; 15(5):243-53. PubMed ID: 22722688
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.