These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

395 related articles for article (PubMed ID: 26578272)

  • 1. Cyber threats to health information systems: A systematic review.
    Luna R; Rhine E; Myhra M; Sullivan R; Kruse CS
    Technol Health Care; 2016; 24(1):1-9. PubMed ID: 26578272
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Cybersecurity in healthcare: A systematic review of modern threats and trends.
    Kruse CS; Frederick B; Jacobson T; Monticone DK
    Technol Health Care; 2017; 25(1):1-10. PubMed ID: 27689562
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.
    Nifakos S; Chandramouli K; Nikolaou CK; Papachristou P; Koch S; Panaousis E; Bonacina S
    Sensors (Basel); 2021 Jul; 21(15):. PubMed ID: 34372354
    [No Abstract]   [Full Text] [Related]  

  • 4. Healthcare cyber-attacks and the COVID-19 pandemic: an urgent threat to global health.
    Muthuppalaniappan M; Stevenson K
    Int J Qual Health Care; 2021 Feb; 33(1):. PubMed ID: 33351134
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Cyberterrorism: is the U.S. healthcare system safe?
    Harries D; Yellowlees PM
    Telemed J E Health; 2013 Jan; 19(1):61-6. PubMed ID: 23113795
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Transforming Healthcare Cybersecurity from Reactive to Proactive: Current Status and Future Recommendations.
    Bhuyan SS; Kabir UY; Escareno JM; Ector K; Palakodeti S; Wyant D; Kumar S; Levy M; Kedia S; Dasgupta D; Dobalian A
    J Med Syst; 2020 Apr; 44(5):98. PubMed ID: 32239357
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Maybe If We Turn It Off and Then Turn It Back On Again? Exploring Health Care Reform as a Means to Curb Cyber Attacks.
    Farringer DR
    J Law Med Ethics; 2019 Dec; 47(4_suppl):91-102. PubMed ID: 31955693
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Healthcare Data Breaches: Implications for Digital Forensic Readiness.
    Chernyshev M; Zeadally S; Baig Z
    J Med Syst; 2018 Nov; 43(1):7. PubMed ID: 30488291
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Warding Off Cyber Threats to Health Care.
    Laws J
    Occup Health Saf; 2016 Dec; 85(12):4. PubMed ID: 30289224
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Cyber Attacks on Healthcare Devices Using Unmanned Aerial Vehicles.
    Sethuraman SC; Vijayakumar V; Walczak S
    J Med Syst; 2019 Dec; 44(1):29. PubMed ID: 31838588
    [TBL] [Abstract][Full Text] [Related]  

  • 11. A Machine Learning Approach for the NLP-Based Analysis of Cyber Threats and Vulnerabilities of the Healthcare Ecosystem.
    Silvestri S; Islam S; Papastergiou S; Tzagkarakis C; Ciampi M
    Sensors (Basel); 2023 Jan; 23(2):. PubMed ID: 36679446
    [TBL] [Abstract][Full Text] [Related]  

  • 12. A Systematic Review for Enabling of Develop a Blockchain Technology in Healthcare Application: Taxonomy, Substantially Analysis, Motivations, Challenges, Recommendations and Future Direction.
    Hussien HM; Yasin SM; Udzir SNI; Zaidan AA; Zaidan BB
    J Med Syst; 2019 Sep; 43(10):320. PubMed ID: 31522262
    [TBL] [Abstract][Full Text] [Related]  

  • 13. The psychological effects of cyber terrorism.
    Gross ML; Canetti D; Vashdi DR
    Bull At Sci; 2016; 72(5):284-291. PubMed ID: 28366962
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Classification of Challenges and Threats in Healthcare Cybersecurity: A Systematic Review.
    Aljuraid R; Justinia T
    Stud Health Technol Inform; 2022 Jun; 295():362-365. PubMed ID: 35773885
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Security Attacks and Solutions in Electronic Health (E-health) Systems.
    Zeadally S; Isaac JT; Baig Z
    J Med Syst; 2016 Dec; 40(12):263. PubMed ID: 27730389
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Cybersecurity Challenges in Healthcare.
    Sendelj R; Ognjanovic I
    Stud Health Technol Inform; 2022 Oct; 300():190-202. PubMed ID: 36300412
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Security Techniques for the Electronic Health Records.
    Kruse CS; Smith B; Vanderlinden H; Nealand A
    J Med Syst; 2017 Aug; 41(8):127. PubMed ID: 28733949
    [TBL] [Abstract][Full Text] [Related]  

  • 18. CYBER-AIDD: A novel approach to implementing improved cyber security resilience for large Australian healthcare providers using a Unified Modelling Language ontology.
    Dart M; Ahmed M
    Digit Health; 2023; 9():20552076231191095. PubMed ID: 37533776
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Human Factors in Electronic Health Records Cybersecurity Breach: An Exploratory Analysis.
    Yeo LH; Banfield J
    Perspect Health Inf Manag; 2022; 19(Spring):1i. PubMed ID: 35692854
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Cyberthreats: A primer for healthcare professionals.
    Tin D; Hata R; Granholm F; Ciottone RG; Staynings R; Ciottone GR
    Am J Emerg Med; 2023 Jun; 68():179-185. PubMed ID: 37061434
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 20.