These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
42. Staying Ahead of 'Enormous and Evolving' Cyberthreats Requires End-to-End Collaboration. McNeil MC Biomed Instrum Technol; 2018 Nov./Dec.; 52(6):462-463. PubMed ID: 30479140 [No Abstract] [Full Text] [Related]
43. Necessary security mechanisms in a PACS DICOM access system with web technology. Vázquez-Naya J; Loureiro J; Calle J; Vidal J; Sierra A J Digit Imaging; 2002; 15 Suppl 1():107-11. PubMed ID: 12105707 [TBL] [Abstract][Full Text] [Related]
44. Security threat assessment of an Internet security system using attack tree and vague sets. Chang KH ScientificWorldJournal; 2014; 2014():506714. PubMed ID: 25405226 [TBL] [Abstract][Full Text] [Related]
45. The use of conferencing technologies to support drug policy group knowledge exchange processes: an action case approach. Househ MS; Kushniruk A; Maclure M; Carleton B; Cloutier-Fisher D Int J Med Inform; 2011 Apr; 80(4):251-61. PubMed ID: 21167772 [TBL] [Abstract][Full Text] [Related]
46. The Raffles Dialogue on Human Wellbeing and Security - Authors' reply. Pang T; Lancet Glob Health; 2016 Feb; 4(2):e93. PubMed ID: 26823225 [No Abstract] [Full Text] [Related]
47. The future of medical computing. Middleton B Stud Health Technol Inform; 2002; 80():85-98. PubMed ID: 12026140 [TBL] [Abstract][Full Text] [Related]
48. Computer viruses, worms and Internet security. Easson W Vet Rec; 2000 Aug; 147(9):252. PubMed ID: 11014496 [No Abstract] [Full Text] [Related]
49. The wireless challenge: understanding the wireless spectrum in a healthcare facility. Swim R Biomed Instrum Technol; 2013; 47(3):212-4. PubMed ID: 23692104 [No Abstract] [Full Text] [Related]
50. Contact centers, pervasive computing and telemedicine: a quality health care triangle. Maglaveras N Stud Health Technol Inform; 2004; 108():149-54. PubMed ID: 15718641 [TBL] [Abstract][Full Text] [Related]
51. Physician office readiness for managing Internet security threats. Keshavjee K; Pairaudeau N; Bhanji A AMIA Annu Symp Proc; 2006; 2006():981. PubMed ID: 17238600 [TBL] [Abstract][Full Text] [Related]
52. What is the biggest healthcare technology challenge you see on the horizon for 2015? Mobley K; Lynch P; Gomez-Morales D; Scales WG Biomed Instrum Technol; 2015; 49(1):10. PubMed ID: 25621640 [No Abstract] [Full Text] [Related]
53. Cyberinfo: privacy and personal health data in cyberspace. Day J J Contemp Dent Pract; 2000 Nov; 1(4):87-96. PubMed ID: 12167953 [TBL] [Abstract][Full Text] [Related]
54. Using virtual assistant technology to improve outcomes, adherence. Morrow T Manag Care; 2012 Feb; 21(2):61-2. PubMed ID: 22393606 [No Abstract] [Full Text] [Related]