These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
4. Vulnerability to Cyberattacks and Sociotechnical Solutions for Health Care Systems: Systematic Review. Ewoh P; Vartiainen T J Med Internet Res; 2024 May; 26():e46904. PubMed ID: 38820579 [TBL] [Abstract][Full Text] [Related]
5. [Cybersecurity in the health care sector]. Coucke PA Rev Med Liege; 2020 Feb; 75(2):125-129. PubMed ID: 32030939 [TBL] [Abstract][Full Text] [Related]
6. Connected Medical Technology and Cybersecurity Informed Consent: A New Paradigm. Tully J; Coravos A; Doerr M; Dameff C J Med Internet Res; 2020 Mar; 22(3):e17612. PubMed ID: 32224492 [TBL] [Abstract][Full Text] [Related]
7. Cybersecurity in Hospitals: A Systematic, Organizational Perspective. Jalali MS; Kaiser JP J Med Internet Res; 2018 May; 20(5):e10059. PubMed ID: 29807882 [TBL] [Abstract][Full Text] [Related]
8. Cybersecurity in healthcare: A narrative review of trends, threats and ways forward. Coventry L; Branley D Maturitas; 2018 Jul; 113():48-52. PubMed ID: 29903648 [TBL] [Abstract][Full Text] [Related]
9. Cyberattacks on Devices Threaten Data and Patients: Cybersecurity Risks Come with the Territory. Three Experts Explain What You Need to Know. Mertz L IEEE Pulse; 2018; 9(3):25-28. PubMed ID: 29757749 [TBL] [Abstract][Full Text] [Related]
10. Cybersecurity and the Medical Device Product Development Lifecycle. Jones RW; Katzis K Stud Health Technol Inform; 2017; 238():76-79. PubMed ID: 28679891 [TBL] [Abstract][Full Text] [Related]
12. When it comes to securing patient health information from breaches, your best medicine is a dose of prevention: A cybersecurity risk assessment checklist. Blanke SJ; McGrady E J Healthc Risk Manag; 2016 Jul; 36(1):14-24. PubMed ID: 27400172 [TBL] [Abstract][Full Text] [Related]
13. Protecting Patient Data Is the New Scope of Practice: A Recommended Cybersecurity Curricula for Healthcare Students to Prepare for this Challenge. Swede MJ; Scovetta V; Eugene-Colin M J Allied Health; 2019; 48(2):148-155. PubMed ID: 31167018 [TBL] [Abstract][Full Text] [Related]
14. Think Like a Hacker. Khera M J Diabetes Sci Technol; 2017 Mar; 11(2):207-212. PubMed ID: 27920270 [TBL] [Abstract][Full Text] [Related]
15. Trends and best practices in health care cybersecurity insurance policy. Kabir UY; Ezekekwu E; Bhuyan SS; Mahmood A; Dobalian A J Healthc Risk Manag; 2020 Oct; 40(2):10-14. PubMed ID: 32441812 [TBL] [Abstract][Full Text] [Related]
16. Design and Pilot Study of a High-Fidelity Medical Simulation of a Hospital-Wide Cybersecurity Attack. Marsh-Armstrong B; Pacheco F; Dameff C; Tully J Res Sq; 2024 Apr; ():. PubMed ID: 38645079 [TBL] [Abstract][Full Text] [Related]
17. Security and privacy issues in implantable medical devices: A comprehensive survey. Camara C; Peris-Lopez P; Tapiador JE J Biomed Inform; 2015 Jun; 55():272-89. PubMed ID: 25917056 [TBL] [Abstract][Full Text] [Related]
18. Now Is the Time for a Cybersecurity Standard for Connected Diabetes Devices. Klonoff DC; Kleidermacher DN J Diabetes Sci Technol; 2016 May; 10(3):623-6. PubMed ID: 27460624 [No Abstract] [Full Text] [Related]
19. Stronger rules needed for medical device cybersecurity. Owens B Lancet; 2016 Apr; 387(10026):1364. PubMed ID: 27115805 [No Abstract] [Full Text] [Related]
20. Cybersecurity in Medical Imaging. Ferrara A Radiol Technol; 2019 Jul; 90(6):563-575. PubMed ID: 31270257 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]