These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

113 related articles for article (PubMed ID: 31156123)

  • 1. Healthcare Staffs' Information Security Practices Towards Mitigating Data Breaches: A Literature Survey.
    Yeng PK; Yang B; Snekkenes EA
    Stud Health Technol Inform; 2019; 261():239-245. PubMed ID: 31156123
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Mapping the Psychosocialcultural Aspects of Healthcare Professionals' Information Security Practices: Systematic Mapping Study.
    Yeng PK; Szekeres A; Yang B; Snekkenes EA
    JMIR Hum Factors; 2021 Jun; 8(2):e17604. PubMed ID: 34106077
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Indirect effect of management support on users' compliance behaviour towards information security policies.
    Humaidi N; Balakrishnan V
    Health Inf Manag; 2018 Jan; 47(1):17-27. PubMed ID: 28537207
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Nursing staffs' emotional well-being and caring behaviours.
    Chana N; Kennedy P; Chessell ZJ
    J Clin Nurs; 2015 Oct; 24(19-20):2835-48. PubMed ID: 26178012
    [TBL] [Abstract][Full Text] [Related]  

  • 5. BYOD usage and security behaviour of hospital clinical staff: An Australian survey.
    Wani TA; Mendoza A; Gray K; Smolenaers F
    Int J Med Inform; 2022 Sep; 165():104839. PubMed ID: 35930927
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Data breach locations, types, and associated characteristics among US hospitals.
    Gabriel MH; Noblin A; Rutherford A; Walden A; Cortelyou-Ward K
    Am J Manag Care; 2018 Feb; 24(2):78-84. PubMed ID: 29461854
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Assessing Internal Consistency of HAIS-Q: A Survey Conducted in Greek Hospitals.
    Magdalinou A; Kalokairinou A; Malamateniou F; Mantas J
    Stud Health Technol Inform; 2022 Jun; 295():24-27. PubMed ID: 35773796
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Improving the redistribution of the security lessons in healthcare: An evaluation of the Generic Security Template.
    He Y; Johnson C
    Int J Med Inform; 2015 Nov; 84(11):941-9. PubMed ID: 26363788
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Assessing the Legal Aspects of Information Security Requirements for Health Care in 3 Countries: Scoping Review and Framework Development.
    Yeng PK; Fauzi MA; Sun L; Yang B
    JMIR Hum Factors; 2022 May; 9(2):e30050. PubMed ID: 35612891
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Security breaches: tips for assessing and limiting your risks.
    Coons LR
    J Med Pract Manage; 2011; 26(6):385-8. PubMed ID: 21815558
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Methods of responding to healthcare security incidents.
    Furnell S; Gritzalis D; Katsikas S; Mavroudakis K; Sanders P; Warren M
    Stud Health Technol Inform; 1998; 52 Pt 2():1138-42. PubMed ID: 10384637
    [TBL] [Abstract][Full Text] [Related]  

  • 12. When it comes to securing patient health information from breaches, your best medicine is a dose of prevention: A cybersecurity risk assessment checklist.
    Blanke SJ; McGrady E
    J Healthc Risk Manag; 2016 Jul; 36(1):14-24. PubMed ID: 27400172
    [TBL] [Abstract][Full Text] [Related]  

  • 13. An information security management strategy for healthcare institutions.
    Grøtan TO; Iversen KR
    Medinfo; 1995; 8 Pt 1():652-6. PubMed ID: 8591291
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Analysis of health professional security behaviors in a real clinical setting: an empirical study.
    Fernández-Alemán JL; Sánchez-Henarejos A; Toval A; Sánchez-García AB; Hernández-Hernández I; Fernandez-Luque L
    Int J Med Inform; 2015 Jun; 84(6):454-67. PubMed ID: 25678101
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Paramedical staffs knowledge and attitudes towards antimicrobial resistance in Dire Dawa, Ethiopia: a cross sectional study.
    Tafa B; Endale A; Bekele D
    Ann Clin Microbiol Antimicrob; 2017 Sep; 16(1):64. PubMed ID: 28927408
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Improving computer security by health smart card.
    Nisand G; Allaert FA; Brézillon R; Isphording W; Roeslin N
    Stud Health Technol Inform; 2003; 95():176-81. PubMed ID: 14663983
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A Simple Assessment of Information Security Awareness in Hospital Staff Across Five Danish Regions.
    Schmidt T; Nøhr C; Koppel R
    Stud Health Technol Inform; 2021 May; 281():635-639. PubMed ID: 34042653
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Help in setting access controls. Using the HL7 RBAC Healthcare Permission Catalog to reduce data breaches.
    Amatayakul M
    J AHIMA; 2008; 79(11):56-7, 61. PubMed ID: 19115735
    [No Abstract]   [Full Text] [Related]  

  • 19. Securing healthcare information system through fuzzy based decision-making methodology.
    Alharbi A; Ahmad M; Alosaimi W; Alyami H; Sarkar AK; Agrawal A; Kumar R; Khan RA
    Health Informatics J; 2022; 28(4):14604582221135420. PubMed ID: 36374584
    [TBL] [Abstract][Full Text] [Related]  

  • 20. How can hospitals better protect the privacy of electronic medical records? Perspectives from staff members of health information management departments.
    Sher ML; Talley PC; Cheng TJ; Kuo KM
    Health Inf Manag; 2017 May; 46(2):87-95. PubMed ID: 27702792
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.