These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

124 related articles for article (PubMed ID: 31423119)

  • 21. The relationship between cybersecurity ratings and the risk of hospital data breaches.
    Choi SJ; Johnson ME
    J Am Med Inform Assoc; 2021 Sep; 28(10):2085-2092. PubMed ID: 34338786
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Human Factors in Electronic Health Records Cybersecurity Breach: An Exploratory Analysis.
    Yeo LH; Banfield J
    Perspect Health Inf Manag; 2022; 19(Spring):1i. PubMed ID: 35692854
    [TBL] [Abstract][Full Text] [Related]  

  • 23. A dataset for accounting, finance and economics research on US data breaches.
    Rosati P; Lynn T
    Data Brief; 2021 Apr; 35():106924. PubMed ID: 33748365
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Confidentiality breaches in clinical practice: what happens in hospitals?
    Beltran-Aroca CM; Girela-Lopez E; Collazo-Chao E; Montero-Pérez-Barquero M; Muñoz-Villanueva MC
    BMC Med Ethics; 2016 Sep; 17(1):52. PubMed ID: 27590300
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Breaking down silos between business continuity and cyber security.
    Phillips R; Tanner B
    J Bus Contin Emer Plan; 2019 Jan; 12(3):224-232. PubMed ID: 30857581
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Artificial Intelligence-Based Ethical Hacking for Health Information Systems: Simulation Study.
    He Y; Zamani E; Yevseyeva I; Luo C
    J Med Internet Res; 2023 Apr; 25():e41748. PubMed ID: 37097723
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Preventing a data breach from becoming a disaster.
    Goldberg E
    J Bus Contin Emer Plan; 2013; 6(4):295-303. PubMed ID: 23835422
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Concern about security and privacy, and perceived control over collection and use of health information are related to withholding of health information from healthcare providers.
    Agaku IT; Adisa AO; Ayo-Yusuf OA; Connolly GN
    J Am Med Inform Assoc; 2014; 21(2):374-8. PubMed ID: 23975624
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Data security crisis in universities: identification of key factors affecting data breach incidents.
    Li J; Xiao W; Zhang C
    Humanit Soc Sci Commun; 2023; 10(1):270. PubMed ID: 37273415
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Two charged in breach of AIDS database in Florida.
    AIDS Policy Law; 1997 Mar; 12(4):7. PubMed ID: 11364139
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Effective audit trails--a taxonomy for determination of information requirements.
    Asaro PV; Herting RL; Roth AC; Barnes MR
    Proc AMIA Symp; 1999; ():663-5. PubMed ID: 10566442
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Emotional Reactions to Cybersecurity Breach Situations: Scenario-Based Survey Study.
    Budimir S; Fontaine JRJ; Huijts NMA; Haans A; Loukas G; Roesch EB
    J Med Internet Res; 2021 May; 23(5):e24879. PubMed ID: 33978591
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Human factor, a critical weak point in the information security of an organization's Internet of things.
    Hughes-Lartey K; Li M; Botchey FE; Qin Z
    Heliyon; 2021 Mar; 7(3):e06522. PubMed ID: 33768182
    [TBL] [Abstract][Full Text] [Related]  

  • 34. Massive Health Record Breaches Evidenced by the Office for Civil Rights Data.
    Koczkodaj WW; Masiak J; Mazurek M; Strzałka D; Zabrodskii PF
    Iran J Public Health; 2019 Feb; 48(2):278-288. PubMed ID: 31205882
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Factors Associated with Information Breach in Healthcare Facilities: A Systematic Literature Review.
    Khanijahani A; Iezadi S; Agoglia S; Barber S; Cox C; Olivo N
    J Med Syst; 2022 Nov; 46(12):90. PubMed ID: 36322261
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Security practices and regulatory compliance in the healthcare industry.
    Kwon J; Johnson ME
    J Am Med Inform Assoc; 2013 Jan; 20(1):44-51. PubMed ID: 22955497
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Security breach.
    AIDS Policy Law; 1996 Nov; 11(20):12. PubMed ID: 11364080
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Cyber threats to health information systems: A systematic review.
    Luna R; Rhine E; Myhra M; Sullivan R; Kruse CS
    Technol Health Care; 2016; 24(1):1-9. PubMed ID: 26578272
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Data security and patient confidentiality: the manager's role.
    Fisher F; Madge B
    Int J Biomed Comput; 1996 Oct; 43(1-2):115-9. PubMed ID: 8960931
    [TBL] [Abstract][Full Text] [Related]  

  • 40.
    ; ; . PubMed ID:
    [No Abstract]   [Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 7.