These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

144 related articles for article (PubMed ID: 31663871)

  • 1. Managing Security Risk: Modeling the Root Causes of Data Breaches.
    Dolezel D; McLeod A
    Health Care Manag (Frederick); 2019; 38(4):322-330. PubMed ID: 31663871
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Data breach locations, types, and associated characteristics among US hospitals.
    Gabriel MH; Noblin A; Rutherford A; Walden A; Cortelyou-Ward K
    Am J Manag Care; 2018 Feb; 24(2):78-84. PubMed ID: 29461854
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Going Beyond Compliance: A Strategic Framework for Promoting Information Security in Hospitals.
    Zandona DJ; Thompson JM
    Health Care Manag (Frederick); 2017; 36(4):364-371. PubMed ID: 28953575
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Data breach remediation efforts and their implications for hospital quality.
    Choi SJ; Johnson ME; Lehmann CU
    Health Serv Res; 2019 Oct; 54(5):971-980. PubMed ID: 31506956
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Healthcare Data Breaches: Implications for Digital Forensic Readiness.
    Chernyshev M; Zeadally S; Baig Z
    J Med Syst; 2018 Nov; 43(1):7. PubMed ID: 30488291
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Hospital Productivity After Data Breaches: Difference-in-Differences Analysis.
    Lee J; Choi SJ
    J Med Internet Res; 2021 Jul; 23(7):e26157. PubMed ID: 34255672
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Data security and patient confidentiality: the manager's role.
    Fisher F; Madge B
    Int J Biomed Comput; 1996 Oct; 43(1-2):115-9. PubMed ID: 8960931
    [TBL] [Abstract][Full Text] [Related]  

  • 8. When it comes to securing patient health information from breaches, your best medicine is a dose of prevention: A cybersecurity risk assessment checklist.
    Blanke SJ; McGrady E
    J Healthc Risk Manag; 2016 Jul; 36(1):14-24. PubMed ID: 27400172
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Cyber-Analytics: Identifying Discriminants of Data Breaches.
    Dolezel D; McLeod A
    Perspect Health Inf Manag; 2019; 16(Summer):1a. PubMed ID: 31423119
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Recognizing and reducing risks: HIPAA privacy and security enforcement.
    Wachler AB; Fehn AK
    Mich Health Hosp; 2003; 39(6):32-3. PubMed ID: 14628331
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Effects of Internal and External Factors on Hospital Data Breaches: Quantitative Study.
    Dolezel D; Beauvais B; Stigler Granados P; Fulton L; Kruse CS
    J Med Internet Res; 2023 Dec; 25():e51471. PubMed ID: 38127426
    [TBL] [Abstract][Full Text] [Related]  

  • 12. HIPAA--a real world perspective.
    Nulan C
    Radiol Manage; 2001; 23(2):29-37; quiz 38-40. PubMed ID: 11302064
    [TBL] [Abstract][Full Text] [Related]  

  • 13. The health information system security threat lifecycle: an informatics theory.
    Fernando JI; Dawson LL
    Int J Med Inform; 2009 Dec; 78(12):815-26. PubMed ID: 19783203
    [TBL] [Abstract][Full Text] [Related]  

  • 14. High stakes. HITECH's privacy provisions will make costly security breaches even more painful to bear.
    Gamble KH
    Healthc Inform; 2009 Jul; 26(7):42-4. PubMed ID: 19645183
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Privacy, confidentiality, and security in information systems of state health agencies.
    O'Brien DG; Yasnoff WA
    Am J Prev Med; 1999 May; 16(4):351-8. PubMed ID: 10493295
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Banking on privacy. Hospitals must protect patient information--and their own liability--as banks balk at HIPAA.
    Haugh R
    Hosp Health Netw; 2004 Feb; 78(2):50-4, 56, 2. PubMed ID: 14999878
    [TBL] [Abstract][Full Text] [Related]  

  • 17. The Role of HIPAA Omnibus Rules in Reducing the Frequency of Medical Data Breaches: Insights From an Empirical Study.
    Yaraghi N; Gopal RD
    Milbank Q; 2018 Mar; 96(1):144-166. PubMed ID: 29504206
    [TBL] [Abstract][Full Text] [Related]  

  • 18. HIPPA compliance for vendors and suppliers.
    White JM
    J Healthc Prot Manage; 2014; 30(1):91-7. PubMed ID: 24707761
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Business Model for the Security of a Large-Scale PACS, Compliance with ISO/27002:2013 Standard.
    Gutiérrez-Martínez J; Núñez-Gaona MA; Aguirre-Meneses H
    J Digit Imaging; 2015 Aug; 28(4):481-91. PubMed ID: 25634674
    [TBL] [Abstract][Full Text] [Related]  

  • 20. HIPAA BREACH. Secure data & prevent fines--here's how.
    Terry K
    Med Econ; 2015 Jul; 92(14):26-8, 30-2. PubMed ID: 26540747
    [No Abstract]   [Full Text] [Related]  

    [Next]    [New Search]
    of 8.