These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

186 related articles for article (PubMed ID: 28397172)

  • 1. Academic Information Security Researchers: Hackers or Specialists?
    Dadkhah M; Lagzian M; Borchardt G
    Sci Eng Ethics; 2018 Apr; 24(2):785-790. PubMed ID: 28397172
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Fraud in Academic Publishing: Researchers Under Cyber-Attacks.
    Dadkhah M; Borchardt G; Maliszewski T
    Am J Med; 2017 Jan; 130(1):27-30. PubMed ID: 27637600
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Current and potential cyber attacks on medical journals; guidelines for improving security.
    Dadkhah M; Seno SAH; Borchardt G
    Eur J Intern Med; 2017 Mar; 38():25-29. PubMed ID: 27919525
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Detecting Hijacked Journals by Using Classification Algorithms.
    Andoohgin Shahri M; Jazi MD; Borchardt G; Dadkhah M
    Sci Eng Ethics; 2018 Apr; 24(2):655-668. PubMed ID: 28397175
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Identity Theft in the Academic World Leads to Junk Science.
    Dadkhah M; Lagzian M; Borchardt G
    Sci Eng Ethics; 2018 Feb; 24(1):287-290. PubMed ID: 28074375
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Informing, simulating experience, or both: A field experiment on phishing risks.
    Baillon A; de Bruin J; Emirmahmutoglu A; van de Veer E; van Dijk B
    PLoS One; 2019; 14(12):e0224216. PubMed ID: 31851688
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Cyber threats to health information systems: A systematic review.
    Luna R; Rhine E; Myhra M; Sullivan R; Kruse CS
    Technol Health Care; 2016; 24(1):1-9. PubMed ID: 26578272
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Hijacked scientific journals: a warning to researchers.
    Martins TG; Costa AL; Moncada FJ; Martins RV
    Einstein (Sao Paulo); 2016; 14(1):113. PubMed ID: 27074242
    [No Abstract]   [Full Text] [Related]  

  • 9. Hijacked journals, hijacked web-sites, journal phishing, misleading metrics, and predatory publishing: actual and potential threats to academic integrity and publishing ethics.
    Dadkhah M; Maliszewski T; Teixeira da Silva JA
    Forensic Sci Med Pathol; 2016 Sep; 12(3):353-62. PubMed ID: 27342770
    [No Abstract]   [Full Text] [Related]  

  • 10. Security measures for protecting confdential information on the Internet and Intranets.
    Rapalus P
    Employ Relat Today; 1997; 24(3):49-58. PubMed ID: 10174367
    [No Abstract]   [Full Text] [Related]  

  • 11. Identity theft and fraud--the impact on HIM operations.
    Davis N; Lemery C; Roberts K
    J AHIMA; 2005 Apr; 76(4):64A-64D. PubMed ID: 15871474
    [No Abstract]   [Full Text] [Related]  

  • 12. Predatory publishing and cybercrime targeting academics.
    Umlauf MG; Mochizuki Y
    Int J Nurs Pract; 2018 Apr; 24 Suppl 1():e12656. PubMed ID: 29667312
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Protecting organizations from electronic-transaction fraud.
    Sagner JS
    Healthc Financ Manage; 1995 Feb; 49(2):80. PubMed ID: 10146183
    [No Abstract]   [Full Text] [Related]  

  • 14. Measuring the level of cyber-security awareness for cybercrime in Saudi Arabia.
    Alzubaidi A
    Heliyon; 2021 Jan; 7(1):e06016. PubMed ID: 33537477
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Detecting phishing websites using machine learning technique.
    Dutta AK
    PLoS One; 2021; 16(10):e0258361. PubMed ID: 34634081
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Medical identity theft and telemedicine security.
    Terry M
    Telemed J E Health; 2009 Dec; 15(10):928-32. PubMed ID: 19908998
    [No Abstract]   [Full Text] [Related]  

  • 17. Cyber resilience: a review of critical national infrastructure and cyber security protection measures applied in the UK and USA.
    Harrop W; Matteson A
    J Bus Contin Emer Plan; 2013-2014 Winter; 7(2):149-62. PubMed ID: 24457326
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Using agility to combat cyber attacks.
    Anderson K
    J Bus Contin Emer Plan; 2017 Jun; 10(4):298-307. PubMed ID: 28610642
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Effectiveness of and user preferences for security awareness training methodologies.
    Tschakert KF; Ngamsuriyaroj S
    Heliyon; 2019 Jun; 5(6):e02010. PubMed ID: 31338464
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Cyber Attacks and Terrorism: A Twenty-First Century Conundrum.
    Albahar M
    Sci Eng Ethics; 2019 Aug; 25(4):993-1006. PubMed ID: 28058619
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 10.