BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

126 related articles for article (PubMed ID: 28297719)

  • 1. Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods.
    Alsaleh M; Alomar N; Alarifi A
    PLoS One; 2017; 12(3):e0173284. PubMed ID: 28297719
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Who Is Smart with Their Smartphones? Determinants of Smartphone Security Behavior.
    Knapova L; Kruzikova A; Dedkova L; Smahel D
    Cyberpsychol Behav Soc Netw; 2021 Sep; 24(9):584-592. PubMed ID: 34152852
    [TBL] [Abstract][Full Text] [Related]  

  • 3. The current state and future of mobile security in the light of the recent mobile security threat reports.
    Cinar AC; Kara TB
    Multimed Tools Appl; 2023; 82(13):20269-20281. PubMed ID: 36743997
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Predicting personality from patterns of behavior collected with smartphones.
    Stachl C; Au Q; Schoedel R; Gosling SD; Harari GM; Buschek D; Völkel ST; Schuwerk T; Oldemeier M; Ullmann T; Hussmann H; Bischl B; Bühner M
    Proc Natl Acad Sci U S A; 2020 Jul; 117(30):17680-17687. PubMed ID: 32665436
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Data modeling positive security behavior implementation among smart device users in Indonesia: A partial least squares structural equation modeling approach (PLS-SEM).
    Kautsarina ; Hidayanto AN; Anggorojati B; Abidin Z; Phusavat K
    Data Brief; 2020 Jun; 30():105588. PubMed ID: 32382604
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Risk Awareness, Self-Efficacy, and Social Support Predict Secure Smartphone Usage.
    Zhou G; Gou M; Gan Y; Schwarzer R
    Front Psychol; 2020; 11():1066. PubMed ID: 32595556
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Barriers to and Facilitators of the Use of Mobile Health Apps From a Security Perspective: Mixed-Methods Study.
    Zhou L; Bao J; Watzlaf V; Parmanto B
    JMIR Mhealth Uhealth; 2019 Apr; 7(4):e11223. PubMed ID: 30990458
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Smartphone technology for communications between clinicians - A scoping review.
    John B; McCreary C; Roberts A
    J Dent; 2022 Jul; 122():104112. PubMed ID: 35413411
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Sensor-Based mHealth Authentication for Real-Time Remote Healthcare Monitoring System: A Multilayer Systematic Review.
    Shuwandy ML; Zaidan BB; Zaidan AA; Albahri AS
    J Med Syst; 2019 Jan; 43(2):33. PubMed ID: 30612191
    [TBL] [Abstract][Full Text] [Related]  

  • 10.
    Hughes Driscoll CA; Jahrsdoerfer M; Easter L; El-Metwally D
    Biomed Instrum Technol; 2020 Jan./Feb.; 54(1):22-27. PubMed ID: 31961735
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Cache-Based Privacy Preserving Solution for Location and Content Protection in Location-Based Services.
    Cui Y; Gao F; Li W; Shi Y; Zhang H; Wen Q; Panaousis E
    Sensors (Basel); 2020 Aug; 20(16):. PubMed ID: 32824808
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Users' Responsiveness to Persuasive Techniques in Recommender Systems.
    Alslaity A; Tran T
    Front Artif Intell; 2021; 4():679459. PubMed ID: 34308340
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Security and Privacy Analysis of Smartphone-Based Driver Monitoring Systems from the Developer's Point of View.
    Levshun D; Chechulin A; Kotenko I
    Sensors (Basel); 2022 Jul; 22(13):. PubMed ID: 35808558
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Do Smartphone Power Users Protect Mobile Privacy Better than Nonpower Users? Exploring Power Usage as a Factor in Mobile Privacy Protection and Disclosure.
    Kang H; Shin W
    Cyberpsychol Behav Soc Netw; 2016 Mar; 19(3):179-85. PubMed ID: 26783875
    [TBL] [Abstract][Full Text] [Related]  

  • 15. The Role of Data Type and Recipient in Individuals' Perspectives on Sharing Passively Collected Smartphone Data for Mental Health: Cross-Sectional Questionnaire Study.
    Nicholas J; Shilton K; Schueller SM; Gray EL; Kwasny MJ; Mohr DC
    JMIR Mhealth Uhealth; 2019 Apr; 7(4):e12578. PubMed ID: 30950799
    [TBL] [Abstract][Full Text] [Related]  

  • 16. ISBP: Understanding the Security Rule of Users' Information-Sharing Behaviors in Partnership.
    Wu H; Wang X
    PLoS One; 2016; 11(3):e0151002. PubMed ID: 26950064
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Exposure to urban and rural contexts shapes smartphone usage behavior.
    Sapienza A; Lítlá M; Lehmann S; Alessandretti L
    PNAS Nexus; 2023 Nov; 2(11):pgad357. PubMed ID: 38034094
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Risk analysis of information security in a mobile instant messaging and presence system for healthcare.
    Bønes E; Hasvold P; Henriksen E; Strandenaes T
    Int J Med Inform; 2007 Sep; 76(9):677-87. PubMed ID: 16931132
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Social Q&A communities: A multi-factor study of the influence of users' knowledge sharing behaviors.
    Wen Y; Yuan X; Li W
    Front Psychol; 2022; 13():967991. PubMed ID: 36248510
    [TBL] [Abstract][Full Text] [Related]  

  • 20. A rhythm-based authentication scheme for smart media devices.
    Lee JD; Jeong YS; Park JH
    ScientificWorldJournal; 2014; 2014():781014. PubMed ID: 25110743
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.