These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

134 related articles for article (PubMed ID: 31506957)

  • 1. Cybersecurity implications for hospital quality.
    Dameff C; Pfeffer MA; Longhurst CA
    Health Serv Res; 2019 Oct; 54(5):969-970. PubMed ID: 31506957
    [No Abstract]   [Full Text] [Related]  

  • 2. Data breach remediation efforts and their implications for hospital quality.
    Choi SJ; Johnson ME; Lehmann CU
    Health Serv Res; 2019 Oct; 54(5):971-980. PubMed ID: 31506956
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Cybersecurity in the clinic.
    Chapman C
    Lancet Psychiatry; 2020 Jan; 7(1):23-24. PubMed ID: 32353340
    [No Abstract]   [Full Text] [Related]  

  • 4. Transforming Healthcare Cybersecurity from Reactive to Proactive: Current Status and Future Recommendations.
    Bhuyan SS; Kabir UY; Escareno JM; Ector K; Palakodeti S; Wyant D; Kumar S; Levy M; Kedia S; Dasgupta D; Dobalian A
    J Med Syst; 2020 Apr; 44(5):98. PubMed ID: 32239357
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Commentary: Collaborating to Achieve a Mutual Cybersecurity Advantage.
    Hagestad B; Straumann A
    Biomed Instrum Technol; 2017; 51(1):34-39. PubMed ID: 28103101
    [No Abstract]   [Full Text] [Related]  

  • 6. The future of biomedical software: how higher standards for privacy, security, and quality will change the industry.
    Vogel DA; Lichorwic D
    Biomed Instrum Technol; 2004; 38(6):462-5. PubMed ID: 15635996
    [No Abstract]   [Full Text] [Related]  

  • 7. Standard guide for implementing HL7 communication security.
    Blobel B; Spiegel V; Pharow P; Engel K; Krohn R
    Stud Health Technol Inform; 2002; 69():183-219; discussion 229-37. PubMed ID: 15458167
    [No Abstract]   [Full Text] [Related]  

  • 8. Sanction guidelines for privacy and security violations.
    Davis NA; Dinh AK; McElroy K; Olson BS; Poulson MJ; Schmidt M
    J AHIMA; 2011 Oct; 82(10):66-71. PubMed ID: 22029219
    [No Abstract]   [Full Text] [Related]  

  • 9. Evaluation of Causes of Protected Health Information Breaches.
    Jiang JX; Bai G
    JAMA Intern Med; 2019 Feb; 179(2):265-267. PubMed ID: 30453327
    [TBL] [Abstract][Full Text] [Related]  

  • 10. The challenges of cybersecurity in health care: the UK National Health Service as a case study.
    Ghafur S; Grass E; Jennings NR; Darzi A
    Lancet Digit Health; 2019 May; 1(1):e10-e12. PubMed ID: 33323235
    [No Abstract]   [Full Text] [Related]  

  • 11. Draft standard for high level security policies for Healthcare establishments.
    Kokolakis S; Gritzalis D; Katsikas S
    Stud Health Technol Inform; 2002; 69():23-47; discussion 229-37. PubMed ID: 15458162
    [No Abstract]   [Full Text] [Related]  

  • 12. [Information and communication technologies: a charter to protect individual liberties].
    Lanzalavi A
    Rev Infirm; 2007 Sep; (133):28-9. PubMed ID: 17941524
    [No Abstract]   [Full Text] [Related]  

  • 13. Redefining confidentiality in an on-line world.
    Tabone S
    Tex Nurs; 2000 Mar; 74(3):4-5. PubMed ID: 11949055
    [No Abstract]   [Full Text] [Related]  

  • 14. Combining FDA Labeling and LLDP for Securing Networked Medical Devices.
    Sayle R
    Biomed Instrum Technol; 2016 Sep; 50(s6):48-51. PubMed ID: 27854497
    [No Abstract]   [Full Text] [Related]  

  • 15. The Effectiveness of Health Care Information Technologies: Evaluation of Trust, Security Beliefs, and Privacy as Determinants of Health Care Outcomes.
    Kisekka V; Giboney JS
    J Med Internet Res; 2018 Apr; 20(4):e107. PubMed ID: 29643052
    [TBL] [Abstract][Full Text] [Related]  

  • 16. The need for cybersecurity self-evaluation in healthcare.
    Burke W; Stranieri A; Oseni T; Gondal I
    BMC Med Inform Decis Mak; 2024 May; 24(1):133. PubMed ID: 38783250
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Cybersecurity for the travelling scientist.
    Owens B
    Nature; 2017 Aug; 548(7665):123-124. PubMed ID: 28770861
    [No Abstract]   [Full Text] [Related]  

  • 18. Overview on security standards for Healthcare information systems.
    Kokolakis S; Gritzalis D; Katsikas S; Ottes F
    Stud Health Technol Inform; 2002; 69():13-21; discussion 229-37. PubMed ID: 15458161
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Protecting Patient Data Is the New Scope of Practice: A Recommended Cybersecurity Curricula for Healthcare Students to Prepare for this Challenge.
    Swede MJ; Scovetta V; Eugene-Colin M
    J Allied Health; 2019; 48(2):148-155. PubMed ID: 31167018
    [TBL] [Abstract][Full Text] [Related]  

  • 20. The 10 security domains (updated).
    J AHIMA; 2010 Feb; 81(2):57-61. PubMed ID: 20218201
    [No Abstract]   [Full Text] [Related]  

    [Next]    [New Search]
    of 7.