BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

184 related articles for article (PubMed ID: 31984315)

  • 1. Health IT, hacking, and cybersecurity: national trends in data breaches of protected health information.
    Ronquillo JG; Erik Winterholler J; Cwikla K; Szymanski R; Levy C
    JAMIA Open; 2018 Jul; 1(1):15-19. PubMed ID: 31984315
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Maybe If We Turn It Off and Then Turn It Back On Again? Exploring Health Care Reform as a Means to Curb Cyber Attacks.
    Farringer DR
    J Law Med Ethics; 2019 Dec; 47(4_suppl):91-102. PubMed ID: 31955693
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Assessing the impact of health information exchange on hospital data breach risk.
    Choi SJ; Chen M; Tan X
    Int J Med Inform; 2023 Sep; 177():105149. PubMed ID: 37453177
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Economic Impact of a Hospital Cyberattack in a National Health System: Descriptive Case Study.
    Portela D; Nogueira-Leite D; Almeida R; Cruz-Correia R
    JMIR Form Res; 2023 Jun; 7():e41738. PubMed ID: 37389934
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Cyberthreats: A primer for healthcare professionals.
    Tin D; Hata R; Granholm F; Ciottone RG; Staynings R; Ciottone GR
    Am J Emerg Med; 2023 Jun; 68():179-185. PubMed ID: 37061434
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Trends and characteristics of protected health information breaches in the United States.
    Hossain MM; Hong YA
    AMIA Annu Symp Proc; 2019; 2019():1081-1090. PubMed ID: 32308905
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Cybersecurity in healthcare: A narrative review of trends, threats and ways forward.
    Coventry L; Branley D
    Maturitas; 2018 Jul; 113():48-52. PubMed ID: 29903648
    [TBL] [Abstract][Full Text] [Related]  

  • 8. What caused the breach? An examination of use of information technology and health data breaches.
    Wikina SB
    Perspect Health Inf Manag; 2014; 11(Fall):1h. PubMed ID: 25593574
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Human Factors in Electronic Health Records Cybersecurity Breach: An Exploratory Analysis.
    Yeo LH; Banfield J
    Perspect Health Inf Manag; 2022; 19(Spring):1i. PubMed ID: 35692854
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Artificial Intelligence-Based Ethical Hacking for Health Information Systems: Simulation Study.
    He Y; Zamani E; Yevseyeva I; Luo C
    J Med Internet Res; 2023 Apr; 25():e41748. PubMed ID: 37097723
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Mitigating the consequences of electronic health record data breaches for patients and healthcare workers.
    Looi JCL; Allison S; Bastiampillai T; Maguire PA; Kisely S; Looi RCH
    Aust Health Rev; 2024 Feb; 48(1):4-7. PubMed ID: 38109886
    [TBL] [Abstract][Full Text] [Related]  

  • 12. For-profit versus non-profit cybersecurity posture: breach types and locations in healthcare organisations.
    Ignatovski M
    Health Inf Manag; 2023 Feb; ():18333583231158886. PubMed ID: 36840419
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Vulnerability to Cyberattacks and Sociotechnical Solutions for Health Care Systems: Systematic Review.
    Ewoh P; Vartiainen T
    J Med Internet Res; 2024 May; 26():e46904. PubMed ID: 38820579
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Sustainable Digital Health Demands Cybersecurity Transformation.
    DeFord D
    Front Health Serv Manage; 2022 Apr; 38(3):31-38. PubMed ID: 35191859
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Cybersecurity for Cardiac Implantable Electronic Devices: What Should You Know?
    Baranchuk A; Refaat MM; Patton KK; Chung MK; Krishnan K; Kutyifa V; Upadhyay G; Fisher JD; Lakkireddy DR;
    J Am Coll Cardiol; 2018 Mar; 71(11):1284-1288. PubMed ID: 29475627
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Transforming Healthcare Cybersecurity from Reactive to Proactive: Current Status and Future Recommendations.
    Bhuyan SS; Kabir UY; Escareno JM; Ector K; Palakodeti S; Wyant D; Kumar S; Levy M; Kedia S; Dasgupta D; Dobalian A
    J Med Syst; 2020 Apr; 44(5):98. PubMed ID: 32239357
    [TBL] [Abstract][Full Text] [Related]  

  • 17. The relationship between cybersecurity ratings and the risk of hospital data breaches.
    Choi SJ; Johnson ME
    J Am Med Inform Assoc; 2021 Sep; 28(10):2085-2092. PubMed ID: 34338786
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Taking Risks With Cybersecurity: Using Knowledge and Personal Characteristics to Predict Self-Reported Cybersecurity Behaviors.
    Kennison SM; Chan-Tin E
    Front Psychol; 2020; 11():546546. PubMed ID: 33250806
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Healthcare Data Breaches: Implications for Digital Forensic Readiness.
    Chernyshev M; Zeadally S; Baig Z
    J Med Syst; 2018 Nov; 43(1):7. PubMed ID: 30488291
    [TBL] [Abstract][Full Text] [Related]  

  • 20. When it comes to securing patient health information from breaches, your best medicine is a dose of prevention: A cybersecurity risk assessment checklist.
    Blanke SJ; McGrady E
    J Healthc Risk Manag; 2016 Jul; 36(1):14-24. PubMed ID: 27400172
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 10.