These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

465 related articles for article (PubMed ID: 27689562)

  • 1. Cybersecurity in healthcare: A systematic review of modern threats and trends.
    Kruse CS; Frederick B; Jacobson T; Monticone DK
    Technol Health Care; 2017; 25(1):1-10. PubMed ID: 27689562
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Cyber threats to health information systems: A systematic review.
    Luna R; Rhine E; Myhra M; Sullivan R; Kruse CS
    Technol Health Care; 2016; 24(1):1-9. PubMed ID: 26578272
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.
    Nifakos S; Chandramouli K; Nikolaou CK; Papachristou P; Koch S; Panaousis E; Bonacina S
    Sensors (Basel); 2021 Jul; 21(15):. PubMed ID: 34372354
    [No Abstract]   [Full Text] [Related]  

  • 4. Classification of Challenges and Threats in Healthcare Cybersecurity: A Systematic Review.
    Aljuraid R; Justinia T
    Stud Health Technol Inform; 2022 Jun; 295():362-365. PubMed ID: 35773885
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Transforming Healthcare Cybersecurity from Reactive to Proactive: Current Status and Future Recommendations.
    Bhuyan SS; Kabir UY; Escareno JM; Ector K; Palakodeti S; Wyant D; Kumar S; Levy M; Kedia S; Dasgupta D; Dobalian A
    J Med Syst; 2020 Apr; 44(5):98. PubMed ID: 32239357
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Cybersecurity in healthcare: A narrative review of trends, threats and ways forward.
    Coventry L; Branley D
    Maturitas; 2018 Jul; 113():48-52. PubMed ID: 29903648
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Cybersecurity Challenges in Healthcare.
    Sendelj R; Ognjanovic I
    Stud Health Technol Inform; 2022 Oct; 300():190-202. PubMed ID: 36300412
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Human Factors in Electronic Health Records Cybersecurity Breach: An Exploratory Analysis.
    Yeo LH; Banfield J
    Perspect Health Inf Manag; 2022; 19(Spring):1i. PubMed ID: 35692854
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Vulnerability to Cyberattacks and Sociotechnical Solutions for Health Care Systems: Systematic Review.
    Ewoh P; Vartiainen T
    J Med Internet Res; 2024 May; 26():e46904. PubMed ID: 38820579
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Maybe If We Turn It Off and Then Turn It Back On Again? Exploring Health Care Reform as a Means to Curb Cyber Attacks.
    Farringer DR
    J Law Med Ethics; 2019 Dec; 47(4_suppl):91-102. PubMed ID: 31955693
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Cyber Attacks on Healthcare Devices Using Unmanned Aerial Vehicles.
    Sethuraman SC; Vijayakumar V; Walczak S
    J Med Syst; 2019 Dec; 44(1):29. PubMed ID: 31838588
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Cyber-attacks and threats for healthcare - a multi-layer thread analysis.
    Spanakis EG; Bonomi S; Sfakianakis S; Santucci G; Lenti S; Sorella M; Tanasache FD; Palleschi A; Ciccotelli C; Sakkalis V; Magalini S
    Annu Int Conf IEEE Eng Med Biol Soc; 2020 Jul; 2020():5705-5708. PubMed ID: 33019270
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Cyber-Security Issues in Healthcare Information Technology.
    Langer SG
    J Digit Imaging; 2017 Feb; 30(1):117-125. PubMed ID: 27730416
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Healthcare Challenges in the Era of Cybersecurity.
    Tully J; Selzer J; Phillips JP; O'Connor P; Dameff C
    Health Secur; 2020; 18(3):228-231. PubMed ID: 32559153
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Perspectives on Cybersecurity and Plastic Surgery: A Survey of Plastic Surgeons and Scoping Review of the Literature.
    Hines E; Trivedi S; Hoang-Tran C; Mocharnuk J; Pfaff MJ
    Aesthet Surg J; 2023 Oct; 43(11):1376-1383. PubMed ID: 37186025
    [TBL] [Abstract][Full Text] [Related]  

  • 16. The need for cybersecurity self-evaluation in healthcare.
    Burke W; Stranieri A; Oseni T; Gondal I
    BMC Med Inform Decis Mak; 2024 May; 24(1):133. PubMed ID: 38783250
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Privacy and security compliance in the E-healthcare marketplace.
    Lutes M
    Healthc Financ Manage; 2000 Mar; 54(3):48-50. PubMed ID: 10847915
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Cybersecurity and Technical Patient Privacy Protection.
    Nachbar JM; Kinney BM; Sacks JM; Gurtner GC; TerKonda SP; Reddy SK; Jeffers LL
    Plast Reconstr Surg; 2024 Jul; 154(1):250-257. PubMed ID: 37220229
    [TBL] [Abstract][Full Text] [Related]  

  • 19. When it comes to securing patient health information from breaches, your best medicine is a dose of prevention: A cybersecurity risk assessment checklist.
    Blanke SJ; McGrady E
    J Healthc Risk Manag; 2016 Jul; 36(1):14-24. PubMed ID: 27400172
    [TBL] [Abstract][Full Text] [Related]  

  • 20. EARS to cyber incidents in health care.
    Jalali MS; Russell B; Razak S; Gordon WJ
    J Am Med Inform Assoc; 2019 Jan; 26(1):81-90. PubMed ID: 30517701
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 24.