184 related articles for article (PubMed ID: 31984315)
1. Health IT, hacking, and cybersecurity: national trends in data breaches of protected health information.
Ronquillo JG; Erik Winterholler J; Cwikla K; Szymanski R; Levy C
JAMIA Open; 2018 Jul; 1(1):15-19. PubMed ID: 31984315
[TBL] [Abstract][Full Text] [Related]
2. Maybe If We Turn It Off and Then Turn It Back On Again? Exploring Health Care Reform as a Means to Curb Cyber Attacks.
Farringer DR
J Law Med Ethics; 2019 Dec; 47(4_suppl):91-102. PubMed ID: 31955693
[TBL] [Abstract][Full Text] [Related]
3. Assessing the impact of health information exchange on hospital data breach risk.
Choi SJ; Chen M; Tan X
Int J Med Inform; 2023 Sep; 177():105149. PubMed ID: 37453177
[TBL] [Abstract][Full Text] [Related]
4. Economic Impact of a Hospital Cyberattack in a National Health System: Descriptive Case Study.
Portela D; Nogueira-Leite D; Almeida R; Cruz-Correia R
JMIR Form Res; 2023 Jun; 7():e41738. PubMed ID: 37389934
[TBL] [Abstract][Full Text] [Related]
5. Cyberthreats: A primer for healthcare professionals.
Tin D; Hata R; Granholm F; Ciottone RG; Staynings R; Ciottone GR
Am J Emerg Med; 2023 Jun; 68():179-185. PubMed ID: 37061434
[TBL] [Abstract][Full Text] [Related]
6. Trends and characteristics of protected health information breaches in the United States.
Hossain MM; Hong YA
AMIA Annu Symp Proc; 2019; 2019():1081-1090. PubMed ID: 32308905
[TBL] [Abstract][Full Text] [Related]
7. Cybersecurity in healthcare: A narrative review of trends, threats and ways forward.
Coventry L; Branley D
Maturitas; 2018 Jul; 113():48-52. PubMed ID: 29903648
[TBL] [Abstract][Full Text] [Related]
8. What caused the breach? An examination of use of information technology and health data breaches.
Wikina SB
Perspect Health Inf Manag; 2014; 11(Fall):1h. PubMed ID: 25593574
[TBL] [Abstract][Full Text] [Related]
9. Human Factors in Electronic Health Records Cybersecurity Breach: An Exploratory Analysis.
Yeo LH; Banfield J
Perspect Health Inf Manag; 2022; 19(Spring):1i. PubMed ID: 35692854
[TBL] [Abstract][Full Text] [Related]
10. Artificial Intelligence-Based Ethical Hacking for Health Information Systems: Simulation Study.
He Y; Zamani E; Yevseyeva I; Luo C
J Med Internet Res; 2023 Apr; 25():e41748. PubMed ID: 37097723
[TBL] [Abstract][Full Text] [Related]
11. Mitigating the consequences of electronic health record data breaches for patients and healthcare workers.
Looi JCL; Allison S; Bastiampillai T; Maguire PA; Kisely S; Looi RCH
Aust Health Rev; 2024 Feb; 48(1):4-7. PubMed ID: 38109886
[TBL] [Abstract][Full Text] [Related]
12. For-profit versus non-profit cybersecurity posture: breach types and locations in healthcare organisations.
Ignatovski M
Health Inf Manag; 2023 Feb; ():18333583231158886. PubMed ID: 36840419
[TBL] [Abstract][Full Text] [Related]
13. Vulnerability to Cyberattacks and Sociotechnical Solutions for Health Care Systems: Systematic Review.
Ewoh P; Vartiainen T
J Med Internet Res; 2024 May; 26():e46904. PubMed ID: 38820579
[TBL] [Abstract][Full Text] [Related]
14. Sustainable Digital Health Demands Cybersecurity Transformation.
DeFord D
Front Health Serv Manage; 2022 Apr; 38(3):31-38. PubMed ID: 35191859
[TBL] [Abstract][Full Text] [Related]
15. Cybersecurity for Cardiac Implantable Electronic Devices: What Should You Know?
Baranchuk A; Refaat MM; Patton KK; Chung MK; Krishnan K; Kutyifa V; Upadhyay G; Fisher JD; Lakkireddy DR;
J Am Coll Cardiol; 2018 Mar; 71(11):1284-1288. PubMed ID: 29475627
[TBL] [Abstract][Full Text] [Related]
16. Transforming Healthcare Cybersecurity from Reactive to Proactive: Current Status and Future Recommendations.
Bhuyan SS; Kabir UY; Escareno JM; Ector K; Palakodeti S; Wyant D; Kumar S; Levy M; Kedia S; Dasgupta D; Dobalian A
J Med Syst; 2020 Apr; 44(5):98. PubMed ID: 32239357
[TBL] [Abstract][Full Text] [Related]
17. The relationship between cybersecurity ratings and the risk of hospital data breaches.
Choi SJ; Johnson ME
J Am Med Inform Assoc; 2021 Sep; 28(10):2085-2092. PubMed ID: 34338786
[TBL] [Abstract][Full Text] [Related]
18. Taking Risks With Cybersecurity: Using Knowledge and Personal Characteristics to Predict Self-Reported Cybersecurity Behaviors.
Kennison SM; Chan-Tin E
Front Psychol; 2020; 11():546546. PubMed ID: 33250806
[TBL] [Abstract][Full Text] [Related]
19. Healthcare Data Breaches: Implications for Digital Forensic Readiness.
Chernyshev M; Zeadally S; Baig Z
J Med Syst; 2018 Nov; 43(1):7. PubMed ID: 30488291
[TBL] [Abstract][Full Text] [Related]
20. When it comes to securing patient health information from breaches, your best medicine is a dose of prevention: A cybersecurity risk assessment checklist.
Blanke SJ; McGrady E
J Healthc Risk Manag; 2016 Jul; 36(1):14-24. PubMed ID: 27400172
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]