137 related articles for article (PubMed ID: 26587017)
1. Explore Awareness of Information Security: Insights from Cognitive Neuromechanism.
Han D; Dai Y; Han T; Dai X
Comput Intell Neurosci; 2015; 2015():762403. PubMed ID: 26587017
[TBL] [Abstract][Full Text] [Related]
2. Design and implementation of website information disclosure assessment system.
Cho YC; Pan JY
PLoS One; 2015; 10(3):e0117180. PubMed ID: 25768434
[TBL] [Abstract][Full Text] [Related]
3. Do privacy and security regulations need a status update? Perspectives from an intergenerational survey.
Pereira S; Robinson JO; Peoples HA; Gutierrez AM; Majumder MA; McGuire AL; Rothstein MA
PLoS One; 2017; 12(9):e0184525. PubMed ID: 28926626
[TBL] [Abstract][Full Text] [Related]
4. Security policies and trust in ubiquitous computing.
Joshi A; Finin T; Kagal L; Parker J; Patwardhan A
Philos Trans A Math Phys Eng Sci; 2008 Oct; 366(1881):3769-80. PubMed ID: 18672450
[TBL] [Abstract][Full Text] [Related]
5. Internet Financial Data Security and Economic Risk Prevention for Android Application Privacy Leakage Detection.
Wang Y; Wang L
Comput Intell Neurosci; 2022; 2022():6782281. PubMed ID: 35371235
[TBL] [Abstract][Full Text] [Related]
6. Collusion-aware privacy-preserving range query in tiered wireless sensor networks.
Zhang X; Dong L; Peng H; Chen H; Zhao S; Li C
Sensors (Basel); 2014 Dec; 14(12):23905-32. PubMed ID: 25615731
[TBL] [Abstract][Full Text] [Related]
7. Young adult females' views regarding online privacy protection at two time points.
Moreno MA; Kelleher E; Ameenuddin N; Rastogi S
J Adolesc Health; 2014 Sep; 55(3):347-51. PubMed ID: 24813765
[TBL] [Abstract][Full Text] [Related]
8. Security and privacy issues of personal health.
Blobel B; Pharow P
Stud Health Technol Inform; 2007; 127():288-97. PubMed ID: 17901620
[TBL] [Abstract][Full Text] [Related]
9. The Role of Human Factors/Ergonomics in the Science of Security: Decision Making and Action Selection in Cyberspace.
Proctor RW; Chen J
Hum Factors; 2015 Aug; 57(5):721-7. PubMed ID: 25994927
[TBL] [Abstract][Full Text] [Related]
10. End-to-end security for personal telehealth.
Koster P; Asim M; Petkovic M
Stud Health Technol Inform; 2011; 169():621-5. PubMed ID: 21893823
[TBL] [Abstract][Full Text] [Related]
11. Physician, Protect Thyself: Why Psychiatrists Should Be Aware of Their Internet Presence and How to Protect Themselves.
MacIntyre MR; Appel JM
J Nerv Ment Dis; 2021 Apr; 209(4):270-274. PubMed ID: 33764955
[TBL] [Abstract][Full Text] [Related]
12. Privacy and medical information on the Internet.
Nelson SB
Respir Care; 2006 Feb; 51(2):183-7. PubMed ID: 16441962
[TBL] [Abstract][Full Text] [Related]
13. Privacy and security in Pennsylvania: ensuring privacy and security of health information exchange in Pennsylvania.
Marshall GF; Gillespie W; Fox SJ
J Healthc Inf Manag; 2009; 23(2):38-44. PubMed ID: 19382739
[TBL] [Abstract][Full Text] [Related]
14. Data science ethics in government.
Drew C
Philos Trans A Math Phys Eng Sci; 2016 Dec; 374(2083):. PubMed ID: 28336798
[TBL] [Abstract][Full Text] [Related]
15. Future of security and privacy in medical information.
Wiederhold G
Stud Health Technol Inform; 2002; 80():213-29. PubMed ID: 12026131
[TBL] [Abstract][Full Text] [Related]
16. Constructing RBAC based security model in u-healthcare service platform.
Shin MS; Jeon HS; Ju YW; Lee BJ; Jeong SP
ScientificWorldJournal; 2015; 2015():937914. PubMed ID: 25695104
[TBL] [Abstract][Full Text] [Related]
17. Hierarchical Identifier: Application to User Privacy Eavesdropping on Mobile Payment App.
Wang Y; Zheng N; Xu M; Qiao T; Zhang Q; Yan F; Xu J
Sensors (Basel); 2019 Jul; 19(14):. PubMed ID: 31373286
[TBL] [Abstract][Full Text] [Related]
18. For telehealth to succeed, privacy and security risks must be identified and addressed.
Hall JL; McGraw D
Health Aff (Millwood); 2014 Feb; 33(2):216-21. PubMed ID: 24493763
[TBL] [Abstract][Full Text] [Related]
19. Exploring the Far Side of Mobile Health: Information Security and Privacy of Mobile Health Apps on iOS and Android.
Dehling T; Gao F; Schneider S; Sunyaev A
JMIR Mhealth Uhealth; 2015 Jan; 3(1):e8. PubMed ID: 25599627
[TBL] [Abstract][Full Text] [Related]
20. Security measures required for HIPAA privacy.
Amatayakul M
J Healthc Inf Manag; 2000; 14(4):5-12. PubMed ID: 11190262
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]