These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

130 related articles for article (PubMed ID: 31423119)

  • 1. Cyber-Analytics: Identifying Discriminants of Data Breaches.
    Dolezel D; McLeod A
    Perspect Health Inf Manag; 2019; 16(Summer):1a. PubMed ID: 31423119
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Data breach locations, types, and associated characteristics among US hospitals.
    Gabriel MH; Noblin A; Rutherford A; Walden A; Cortelyou-Ward K
    Am J Manag Care; 2018 Feb; 24(2):78-84. PubMed ID: 29461854
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Description of Data Breaches Notifications in France and Lessons Learned for the Healthcare Stakeholders.
    Simon M; Looten V
    Stud Health Technol Inform; 2020 Nov; 275():192-196. PubMed ID: 33227767
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Cyberthreats: A primer for healthcare professionals.
    Tin D; Hata R; Granholm F; Ciottone RG; Staynings R; Ciottone GR
    Am J Emerg Med; 2023 Jun; 68():179-185. PubMed ID: 37061434
    [TBL] [Abstract][Full Text] [Related]  

  • 5. What caused the breach? An examination of use of information technology and health data breaches.
    Wikina SB
    Perspect Health Inf Manag; 2014; 11(Fall):1h. PubMed ID: 25593574
    [TBL] [Abstract][Full Text] [Related]  

  • 6. For-profit versus non-profit cybersecurity posture: breach types and locations in healthcare organisations.
    Ignatovski M
    Health Inf Manag; 2023 Feb; ():18333583231158886. PubMed ID: 36840419
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Assessing the impact of health information exchange on hospital data breach risk.
    Choi SJ; Chen M; Tan X
    Int J Med Inform; 2023 Sep; 177():105149. PubMed ID: 37453177
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Privacy Leaks Protection in Music Streaming Services Using an Intelligent Permissions Management System.
    Wang Q
    Comput Intell Neurosci; 2022; 2022():5027256. PubMed ID: 35720882
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Cyber crimes.
    Nuzback K
    Tex Med; 2014 Jul; 110(7):27-33. PubMed ID: 25023560
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Hospital Productivity After Data Breaches: Difference-in-Differences Analysis.
    Lee J; Choi SJ
    J Med Internet Res; 2021 Jul; 23(7):e26157. PubMed ID: 34255672
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Managing Security Risk: Modeling the Root Causes of Data Breaches.
    Dolezel D; McLeod A
    Health Care Manag (Frederick); 2019; 38(4):322-330. PubMed ID: 31663871
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Trends and characteristics of protected health information breaches in the United States.
    Hossain MM; Hong YA
    AMIA Annu Symp Proc; 2019; 2019():1081-1090. PubMed ID: 32308905
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Understanding the relationship between data breaches and hospital advertising expenditures.
    Choi SJ; Johnson ME
    Am J Manag Care; 2019 Jan; 25(1):e14-e20. PubMed ID: 30667613
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Healthcare Data Breaches: Insights and Implications.
    Seh AH; Zarour M; Alenezi M; Sarkar AK; Agrawal A; Kumar R; Khan RA
    Healthcare (Basel); 2020 May; 8(2):. PubMed ID: 32414183
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Healthcare Data Breaches: Implications for Digital Forensic Readiness.
    Chernyshev M; Zeadally S; Baig Z
    J Med Syst; 2018 Nov; 43(1):7. PubMed ID: 30488291
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Effects of Internal and External Factors on Hospital Data Breaches: Quantitative Study.
    Dolezel D; Beauvais B; Stigler Granados P; Fulton L; Kruse CS
    J Med Internet Res; 2023 Dec; 25():e51471. PubMed ID: 38127426
    [TBL] [Abstract][Full Text] [Related]  

  • 17. The Role of HIPAA Omnibus Rules in Reducing the Frequency of Medical Data Breaches: Insights From an Empirical Study.
    Yaraghi N; Gopal RD
    Milbank Q; 2018 Mar; 96(1):144-166. PubMed ID: 29504206
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Transforming Healthcare Cybersecurity from Reactive to Proactive: Current Status and Future Recommendations.
    Bhuyan SS; Kabir UY; Escareno JM; Ector K; Palakodeti S; Wyant D; Kumar S; Levy M; Kedia S; Dasgupta D; Dobalian A
    J Med Syst; 2020 Apr; 44(5):98. PubMed ID: 32239357
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Data breach remediation efforts and their implications for hospital quality.
    Choi SJ; Johnson ME; Lehmann CU
    Health Serv Res; 2019 Oct; 54(5):971-980. PubMed ID: 31506956
    [TBL] [Abstract][Full Text] [Related]  

  • 20. When it comes to securing patient health information from breaches, your best medicine is a dose of prevention: A cybersecurity risk assessment checklist.
    Blanke SJ; McGrady E
    J Healthc Risk Manag; 2016 Jul; 36(1):14-24. PubMed ID: 27400172
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.