These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

200 related articles for article (PubMed ID: 29461854)

  • 1. Data breach locations, types, and associated characteristics among US hospitals.
    Gabriel MH; Noblin A; Rutherford A; Walden A; Cortelyou-Ward K
    Am J Manag Care; 2018 Feb; 24(2):78-84. PubMed ID: 29461854
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Hospital Productivity After Data Breaches: Difference-in-Differences Analysis.
    Lee J; Choi SJ
    J Med Internet Res; 2021 Jul; 23(7):e26157. PubMed ID: 34255672
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Understanding the relationship between data breaches and hospital advertising expenditures.
    Choi SJ; Johnson ME
    Am J Manag Care; 2019 Jan; 25(1):e14-e20. PubMed ID: 30667613
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Data breach remediation efforts and their implications for hospital quality.
    Choi SJ; Johnson ME; Lehmann CU
    Health Serv Res; 2019 Oct; 54(5):971-980. PubMed ID: 31506956
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Assessing the impact of health information exchange on hospital data breach risk.
    Choi SJ; Chen M; Tan X
    Int J Med Inform; 2023 Sep; 177():105149. PubMed ID: 37453177
    [TBL] [Abstract][Full Text] [Related]  

  • 6. What caused the breach? An examination of use of information technology and health data breaches.
    Wikina SB
    Perspect Health Inf Manag; 2014; 11(Fall):1h. PubMed ID: 25593574
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Cyberthreats: A primer for healthcare professionals.
    Tin D; Hata R; Granholm F; Ciottone RG; Staynings R; Ciottone GR
    Am J Emerg Med; 2023 Jun; 68():179-185. PubMed ID: 37061434
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Managing Security Risk: Modeling the Root Causes of Data Breaches.
    Dolezel D; McLeod A
    Health Care Manag (Frederick); 2019; 38(4):322-330. PubMed ID: 31663871
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Data security and patient confidentiality: the manager's role.
    Fisher F; Madge B
    Int J Biomed Comput; 1996 Oct; 43(1-2):115-9. PubMed ID: 8960931
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Cyber-Analytics: Identifying Discriminants of Data Breaches.
    Dolezel D; McLeod A
    Perspect Health Inf Manag; 2019; 16(Summer):1a. PubMed ID: 31423119
    [TBL] [Abstract][Full Text] [Related]  

  • 11. The Role of HIPAA Omnibus Rules in Reducing the Frequency of Medical Data Breaches: Insights From an Empirical Study.
    Yaraghi N; Gopal RD
    Milbank Q; 2018 Mar; 96(1):144-166. PubMed ID: 29504206
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Trends and characteristics of protected health information breaches in the United States.
    Hossain MM; Hong YA
    AMIA Annu Symp Proc; 2019; 2019():1081-1090. PubMed ID: 32308905
    [TBL] [Abstract][Full Text] [Related]  

  • 13. For-profit versus non-profit cybersecurity posture: breach types and locations in healthcare organisations.
    Ignatovski M
    Health Inf Manag; 2023 Feb; ():18333583231158886. PubMed ID: 36840419
    [TBL] [Abstract][Full Text] [Related]  

  • 14. To report or not to report health care data breaches.
    Walden A; Cortelyou-Ward K; Gabriel MH; Noblin A
    Am J Manag Care; 2020 Dec; 26(12):e395-e402. PubMed ID: 33315333
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Privacy, confidentiality, and security in information systems of state health agencies.
    O'Brien DG; Yasnoff WA
    Am J Prev Med; 1999 May; 16(4):351-8. PubMed ID: 10493295
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Effects of Internal and External Factors on Hospital Data Breaches: Quantitative Study.
    Dolezel D; Beauvais B; Stigler Granados P; Fulton L; Kruse CS
    J Med Internet Res; 2023 Dec; 25():e51471. PubMed ID: 38127426
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Going Beyond Compliance: A Strategic Framework for Promoting Information Security in Hospitals.
    Zandona DJ; Thompson JM
    Health Care Manag (Frederick); 2017; 36(4):364-371. PubMed ID: 28953575
    [TBL] [Abstract][Full Text] [Related]  

  • 18. When it comes to securing patient health information from breaches, your best medicine is a dose of prevention: A cybersecurity risk assessment checklist.
    Blanke SJ; McGrady E
    J Healthc Risk Manag; 2016 Jul; 36(1):14-24. PubMed ID: 27400172
    [TBL] [Abstract][Full Text] [Related]  

  • 19. The health information system security threat lifecycle: an informatics theory.
    Fernando JI; Dawson LL
    Int J Med Inform; 2009 Dec; 78(12):815-26. PubMed ID: 19783203
    [TBL] [Abstract][Full Text] [Related]  

  • 20. The relationship between cybersecurity ratings and the risk of hospital data breaches.
    Choi SJ; Johnson ME
    J Am Med Inform Assoc; 2021 Sep; 28(10):2085-2092. PubMed ID: 34338786
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 10.