BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

229 related articles for article (PubMed ID: 30488291)

  • 1. Healthcare Data Breaches: Implications for Digital Forensic Readiness.
    Chernyshev M; Zeadally S; Baig Z
    J Med Syst; 2018 Nov; 43(1):7. PubMed ID: 30488291
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Security Attacks and Solutions in Electronic Health (E-health) Systems.
    Zeadally S; Isaac JT; Baig Z
    J Med Syst; 2016 Dec; 40(12):263. PubMed ID: 27730389
    [TBL] [Abstract][Full Text] [Related]  

  • 3. What caused the breach? An examination of use of information technology and health data breaches.
    Wikina SB
    Perspect Health Inf Manag; 2014; 11(Fall):1h. PubMed ID: 25593574
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Cyberthreats: A primer for healthcare professionals.
    Tin D; Hata R; Granholm F; Ciottone RG; Staynings R; Ciottone GR
    Am J Emerg Med; 2023 Jun; 68():179-185. PubMed ID: 37061434
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Cyber threats to health information systems: A systematic review.
    Luna R; Rhine E; Myhra M; Sullivan R; Kruse CS
    Technol Health Care; 2016; 24(1):1-9. PubMed ID: 26578272
    [TBL] [Abstract][Full Text] [Related]  

  • 6. e-Consent design and implementation issues for health information managers.
    Grain H
    Health Inf Manag; 2004; 33(3):84-8. PubMed ID: 18490785
    [TBL] [Abstract][Full Text] [Related]  

  • 7. How can hospitals better protect the privacy of electronic medical records? Perspectives from staff members of health information management departments.
    Sher ML; Talley PC; Cheng TJ; Kuo KM
    Health Inf Manag; 2017 May; 46(2):87-95. PubMed ID: 27702792
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Transforming Healthcare Cybersecurity from Reactive to Proactive: Current Status and Future Recommendations.
    Bhuyan SS; Kabir UY; Escareno JM; Ector K; Palakodeti S; Wyant D; Kumar S; Levy M; Kedia S; Dasgupta D; Dobalian A
    J Med Syst; 2020 Apr; 44(5):98. PubMed ID: 32239357
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Trends and characteristics of protected health information breaches in the United States.
    Hossain MM; Hong YA
    AMIA Annu Symp Proc; 2019; 2019():1081-1090. PubMed ID: 32308905
    [TBL] [Abstract][Full Text] [Related]  

  • 10. When finding nothing may be evidence of something: Anti-forensics and digital tool marks.
    Horsman G; Errickson D
    Sci Justice; 2019 Sep; 59(5):565-572. PubMed ID: 31472802
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Managing Security Risk: Modeling the Root Causes of Data Breaches.
    Dolezel D; McLeod A
    Health Care Manag (Frederick); 2019; 38(4):322-330. PubMed ID: 31663871
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Data breach locations, types, and associated characteristics among US hospitals.
    Gabriel MH; Noblin A; Rutherford A; Walden A; Cortelyou-Ward K
    Am J Manag Care; 2018 Feb; 24(2):78-84. PubMed ID: 29461854
    [TBL] [Abstract][Full Text] [Related]  

  • 13. ONC issues guides for SAFER EHRs.
    Sittig DF; Ash JS; Singh H
    J AHIMA; 2014 Apr; 85(4):50-2. PubMed ID: 24834557
    [No Abstract]   [Full Text] [Related]  

  • 14. Evaluation of Causes of Protected Health Information Breaches.
    Jiang JX; Bai G
    JAMA Intern Med; 2019 Feb; 179(2):265-267. PubMed ID: 30453327
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Does the PCEHR mean a new paradigm for information security? Implications for health information management.
    Williams PA
    Health Inf Manag; 2013; 42(2):31-6. PubMed ID: 23695935
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Digital forensics: an analytical crime scene procedure model (ACSPM).
    Bulbul HI; Yavuzcan HG; Ozel M
    Forensic Sci Int; 2013 Dec; 233(1-3):244-56. PubMed ID: 24314526
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Human Factors in Electronic Health Records Cybersecurity Breach: An Exploratory Analysis.
    Yeo LH; Banfield J
    Perspect Health Inf Manag; 2022; 19(Spring):1i. PubMed ID: 35692854
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Advanced framework for digital forensic technologies and procedures.
    TrĨek D; Abie H; Skomedal A; Starc I
    J Forensic Sci; 2010 Nov; 55(6):1471-80. PubMed ID: 20735706
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Managing information and knowledge within maternity services: Privacy and consent issues.
    Baskaran V; Davis K; Bali RK; Naguib RN; Wickramasinghe N
    Inform Health Soc Care; 2013 Sep; 38(3):196-210. PubMed ID: 23323681
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Information governance initiatives essential for strategic alliances.
    Patten M; Proffitt K; Lucci S
    J AHIMA; 2014 Apr; 85(4):48-9. PubMed ID: 24834556
    [No Abstract]   [Full Text] [Related]  

    [Next]    [New Search]
    of 12.