BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

137 related articles for article (PubMed ID: 26587017)

  • 1. Explore Awareness of Information Security: Insights from Cognitive Neuromechanism.
    Han D; Dai Y; Han T; Dai X
    Comput Intell Neurosci; 2015; 2015():762403. PubMed ID: 26587017
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Design and implementation of website information disclosure assessment system.
    Cho YC; Pan JY
    PLoS One; 2015; 10(3):e0117180. PubMed ID: 25768434
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Do privacy and security regulations need a status update? Perspectives from an intergenerational survey.
    Pereira S; Robinson JO; Peoples HA; Gutierrez AM; Majumder MA; McGuire AL; Rothstein MA
    PLoS One; 2017; 12(9):e0184525. PubMed ID: 28926626
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Security policies and trust in ubiquitous computing.
    Joshi A; Finin T; Kagal L; Parker J; Patwardhan A
    Philos Trans A Math Phys Eng Sci; 2008 Oct; 366(1881):3769-80. PubMed ID: 18672450
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Internet Financial Data Security and Economic Risk Prevention for Android Application Privacy Leakage Detection.
    Wang Y; Wang L
    Comput Intell Neurosci; 2022; 2022():6782281. PubMed ID: 35371235
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Collusion-aware privacy-preserving range query in tiered wireless sensor networks.
    Zhang X; Dong L; Peng H; Chen H; Zhao S; Li C
    Sensors (Basel); 2014 Dec; 14(12):23905-32. PubMed ID: 25615731
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Young adult females' views regarding online privacy protection at two time points.
    Moreno MA; Kelleher E; Ameenuddin N; Rastogi S
    J Adolesc Health; 2014 Sep; 55(3):347-51. PubMed ID: 24813765
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Security and privacy issues of personal health.
    Blobel B; Pharow P
    Stud Health Technol Inform; 2007; 127():288-97. PubMed ID: 17901620
    [TBL] [Abstract][Full Text] [Related]  

  • 9. The Role of Human Factors/Ergonomics in the Science of Security: Decision Making and Action Selection in Cyberspace.
    Proctor RW; Chen J
    Hum Factors; 2015 Aug; 57(5):721-7. PubMed ID: 25994927
    [TBL] [Abstract][Full Text] [Related]  

  • 10. End-to-end security for personal telehealth.
    Koster P; Asim M; Petkovic M
    Stud Health Technol Inform; 2011; 169():621-5. PubMed ID: 21893823
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Physician, Protect Thyself: Why Psychiatrists Should Be Aware of Their Internet Presence and How to Protect Themselves.
    MacIntyre MR; Appel JM
    J Nerv Ment Dis; 2021 Apr; 209(4):270-274. PubMed ID: 33764955
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Privacy and medical information on the Internet.
    Nelson SB
    Respir Care; 2006 Feb; 51(2):183-7. PubMed ID: 16441962
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Privacy and security in Pennsylvania: ensuring privacy and security of health information exchange in Pennsylvania.
    Marshall GF; Gillespie W; Fox SJ
    J Healthc Inf Manag; 2009; 23(2):38-44. PubMed ID: 19382739
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Data science ethics in government.
    Drew C
    Philos Trans A Math Phys Eng Sci; 2016 Dec; 374(2083):. PubMed ID: 28336798
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Future of security and privacy in medical information.
    Wiederhold G
    Stud Health Technol Inform; 2002; 80():213-29. PubMed ID: 12026131
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Constructing RBAC based security model in u-healthcare service platform.
    Shin MS; Jeon HS; Ju YW; Lee BJ; Jeong SP
    ScientificWorldJournal; 2015; 2015():937914. PubMed ID: 25695104
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Hierarchical Identifier: Application to User Privacy Eavesdropping on Mobile Payment App.
    Wang Y; Zheng N; Xu M; Qiao T; Zhang Q; Yan F; Xu J
    Sensors (Basel); 2019 Jul; 19(14):. PubMed ID: 31373286
    [TBL] [Abstract][Full Text] [Related]  

  • 18. For telehealth to succeed, privacy and security risks must be identified and addressed.
    Hall JL; McGraw D
    Health Aff (Millwood); 2014 Feb; 33(2):216-21. PubMed ID: 24493763
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Exploring the Far Side of Mobile Health: Information Security and Privacy of Mobile Health Apps on iOS and Android.
    Dehling T; Gao F; Schneider S; Sunyaev A
    JMIR Mhealth Uhealth; 2015 Jan; 3(1):e8. PubMed ID: 25599627
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Security measures required for HIPAA privacy.
    Amatayakul M
    J Healthc Inf Manag; 2000; 14(4):5-12. PubMed ID: 11190262
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.