These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

229 related articles for article (PubMed ID: 30488291)

  • 21. Healthcare Data Breaches: Insights and Implications.
    Seh AH; Zarour M; Alenezi M; Sarkar AK; Agrawal A; Kumar R; Khan RA
    Healthcare (Basel); 2020 May; 8(2):. PubMed ID: 32414183
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Cybersecurity in healthcare: A systematic review of modern threats and trends.
    Kruse CS; Frederick B; Jacobson T; Monticone DK
    Technol Health Care; 2017; 25(1):1-10. PubMed ID: 27689562
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Maybe If We Turn It Off and Then Turn It Back On Again? Exploring Health Care Reform as a Means to Curb Cyber Attacks.
    Farringer DR
    J Law Med Ethics; 2019 Dec; 47(4_suppl):91-102. PubMed ID: 31955693
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Evaluating the Information Governance Principles for Healthcare: Integrity and Protection.
    Datskovsky G; Hedges R; Empel S; Washington L
    J AHIMA; 2015 Apr; 86(4):48-9. PubMed ID: 26930791
    [No Abstract]   [Full Text] [Related]  

  • 25. Forensic investigation of incidents involving chemical threat agent: Presentation of the operating procedure developed in Belgium for a field-exercise.
    Kummer N; Augustyns B; Van Rompaey D; De Meulenaere K
    Forensic Sci Int; 2019 Jun; 299():180-186. PubMed ID: 31039546
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Cybersecurity and Technical Patient Privacy Protection.
    Nachbar JM; Kinney BM; Sacks JM; Gurtner GC; TerKonda SP; Reddy SK; Jeffers LL
    Plast Reconstr Surg; 2024 Jul; 154(1):250-257. PubMed ID: 37220229
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Mobile Device Security: Perspectives of Future Healthcare Workers.
    Hewitt B; Dolezel D; McLeod A
    Perspect Health Inf Manag; 2017; 14(Winter):1c. PubMed ID: 28566992
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Post-implementation: making the EHR system work for you.
    Marbury D; Ritchie A
    Med Econ; 2014 Mar; 91(5):34-6, 38-9. PubMed ID: 25137907
    [No Abstract]   [Full Text] [Related]  

  • 29. A Novel Forensic Readiness Framework Applicable to the Drone Forensics Field.
    Alotaibi FM; Al-Dhaqm A; Al-Otaibi YD
    Comput Intell Neurosci; 2022; 2022():8002963. PubMed ID: 35265114
    [TBL] [Abstract][Full Text] [Related]  

  • 30. A review of quality procedures in the UK forensic sciences: What can the field of digital forensics learn?
    Page H; Horsman G; Sarna A; Foster J
    Sci Justice; 2019 Jan; 59(1):83-92. PubMed ID: 30654972
    [TBL] [Abstract][Full Text] [Related]  

  • 31. When it comes to securing patient health information from breaches, your best medicine is a dose of prevention: A cybersecurity risk assessment checklist.
    Blanke SJ; McGrady E
    J Healthc Risk Manag; 2016 Jul; 36(1):14-24. PubMed ID: 27400172
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Cyber crimes.
    Nuzback K
    Tex Med; 2014 Jul; 110(7):27-33. PubMed ID: 25023560
    [TBL] [Abstract][Full Text] [Related]  

  • 33. HIPAA BREACH. Secure data & prevent fines--here's how.
    Terry K
    Med Econ; 2015 Jul; 92(14):26-8, 30-2. PubMed ID: 26540747
    [No Abstract]   [Full Text] [Related]  

  • 34. Physical security, HIPPA, and the HHS wall of shame.
    Sage A
    J Healthc Prot Manage; 2014; 30(1):85-90. PubMed ID: 24707760
    [TBL] [Abstract][Full Text] [Related]  

  • 35. A Review of Two-Factor Authentication: Suggested Security Effort Moves to Mandatory.
    Pomputius AF
    Med Ref Serv Q; 2018; 37(4):397-402. PubMed ID: 30722767
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Mitigating the consequences of electronic health record data breaches for patients and healthcare workers.
    Looi JCL; Allison S; Bastiampillai T; Maguire PA; Kisely S; Looi RCH
    Aust Health Rev; 2024 Feb; 48(1):4-7. PubMed ID: 38109886
    [TBL] [Abstract][Full Text] [Related]  

  • 37. The health information system security threat lifecycle: an informatics theory.
    Fernando JI; Dawson LL
    Int J Med Inform; 2009 Dec; 78(12):815-26. PubMed ID: 19783203
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Ransomware in Hospitals: What Providers Will Inevitably Face When Attacked.
    Kelpsas B; Nelson A
    J Med Pract Manage; 2016 Sep; 32(1):67-70. PubMed ID: 30452851
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Security of electronic medical information and patient privacy: what you need to know.
    Andriole KP
    J Am Coll Radiol; 2014 Dec; 11(12 Pt B):1212-6. PubMed ID: 25467897
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Cyber-Analytics: Identifying Discriminants of Data Breaches.
    Dolezel D; McLeod A
    Perspect Health Inf Manag; 2019; 16(Summer):1a. PubMed ID: 31423119
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 12.