These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

210 related articles for article (PubMed ID: 25994927)

  • 1. The Role of Human Factors/Ergonomics in the Science of Security: Decision Making and Action Selection in Cyberspace.
    Proctor RW; Chen J
    Hum Factors; 2015 Aug; 57(5):721-7. PubMed ID: 25994927
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Risk management frameworks for human health and environmental risks.
    Jardine C; Hrudey S; Shortreed J; Craig L; Krewski D; Furgal C; McColl S
    J Toxicol Environ Health B Crit Rev; 2003; 6(6):569-720. PubMed ID: 14698953
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Quantifying Phishing Susceptibility for Detection and Behavior Decisions.
    Canfield CI; Fischhoff B; Davis A
    Hum Factors; 2016 Dec; 58(8):1158-1172. PubMed ID: 27562565
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Is Domain Highlighting Actually Helpful in Identifying Phishing Web Pages?
    Xiong A; Proctor RW; Yang W; Li N
    Hum Factors; 2017 Jun; 59(4):640-660. PubMed ID: 28060529
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Why Employees (Still) Click on Phishing Links: Investigation in Hospitals.
    Jalali MS; Bruckes M; Westmattelmann D; Schewe G
    J Med Internet Res; 2020 Jan; 22(1):e16775. PubMed ID: 32012071
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Signal Detection Theory (SDT) Is Effective for Modeling User Behavior Toward Phishing and Spear-Phishing Attacks.
    Martin J; Dubé C; Coovert MD
    Hum Factors; 2018 Dec; 60(8):1179-1191. PubMed ID: 30063406
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Impacts of psychological science on national security agencies post-9/11.
    Brandon SE
    Am Psychol; 2011 Sep; 66(6):495-506. PubMed ID: 21823770
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Integrating Human Factors Engineering and Information Processing Approaches to Facilitate Evaluations in Criminal Justice Technology Research.
    Salvemini AV; Piza EL; Carter JG; Grommon EL; Merritt N
    Eval Rev; 2015 Jun; 39(3):308-38. PubMed ID: 25948636
    [TBL] [Abstract][Full Text] [Related]  

  • 9. False alarms and incorrect rejections in an information security center: correlation with the frequency of incidents.
    Bruno T; Abrahão J
    Work; 2012; 41 Suppl 1():2902-7. PubMed ID: 22317160
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Assessment of Employee Susceptibility to Phishing Attacks at US Health Care Institutions.
    Gordon WJ; Wright A; Aiyagari R; Corbo L; Glynn RJ; Kadakia J; Kufahl J; Mazzone C; Noga J; Parkulo M; Sanford B; Scheib P; Landman AB
    JAMA Netw Open; 2019 Mar; 2(3):e190393. PubMed ID: 30848810
    [TBL] [Abstract][Full Text] [Related]  

  • 11. A transmission security framework for email-based telemedicine.
    Caffery LJ; Smith AC
    Stud Health Technol Inform; 2010; 161():35-48. PubMed ID: 21191156
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Hacking the health system: using public key infrastructure to protect health information on the Internet.
    Pluscauskas M; Stephens A
    Healthc Inf Manage; 1997; 11(3):27-37. PubMed ID: 10175691
    [No Abstract]   [Full Text] [Related]  

  • 13. Security of medical data transfer and storage in Internet. Cryptography, antiviral security and electronic signature problems, which must be solved in nearest future in practical context.
    Kasztelowicz P; Czubenko M; Zieba I
    Pol J Pathol; 2003; 54(3):209-14. PubMed ID: 14703290
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Risk communication in cyberspace: a brief review of the information-processing and mental models approaches.
    Chen J
    Curr Opin Psychol; 2020 Dec; 36():135-140. PubMed ID: 32679482
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Cybersecurity Awareness Based on Software and E-mail Security with Statistical Analysis.
    Alqahtani MA
    Comput Intell Neurosci; 2022; 2022():6775980. PubMed ID: 35341185
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Display of major risk categories for android apps.
    Chen J; Ge H; Moore S; Yang W; Li N; Proctor RW
    J Exp Psychol Appl; 2018 Sep; 24(3):306-330. PubMed ID: 29927274
    [TBL] [Abstract][Full Text] [Related]  

  • 17. The roles of phishing knowledge, cue utilization, and decision styles in phishing email detection.
    Sturman D; Bell EA; Auton JC; Breakey GR; Wiggins MW
    Appl Ergon; 2024 Sep; 119():104309. PubMed ID: 38729025
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Explore Awareness of Information Security: Insights from Cognitive Neuromechanism.
    Han D; Dai Y; Han T; Dai X
    Comput Intell Neurosci; 2015; 2015():762403. PubMed ID: 26587017
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A computer science approach to managing security in health care.
    Asirelli P; Braccini G; Caramella D; Coco A; Fabbrini F
    Radiol Med; 2002 Sep; 104(3):203-12. PubMed ID: 12471368
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Do your e-mails comply with new security regs?
    Healthcare Benchmarks Qual Improv; 2005 May; 12(5):54-6. PubMed ID: 15918244
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 11.