These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

178 related articles for article (PubMed ID: 32414183)

  • 21. Confidentiality breaches in clinical practice: what happens in hospitals?
    Beltran-Aroca CM; Girela-Lopez E; Collazo-Chao E; Montero-Pérez-Barquero M; Muñoz-Villanueva MC
    BMC Med Ethics; 2016 Sep; 17(1):52. PubMed ID: 27590300
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Mobile Device Security: Perspectives of Future Healthcare Workers.
    Hewitt B; Dolezel D; McLeod A
    Perspect Health Inf Manag; 2017; 14(Winter):1c. PubMed ID: 28566992
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Understanding the relationship between data breaches and hospital advertising expenditures.
    Choi SJ; Johnson ME
    Am J Manag Care; 2019 Jan; 25(1):e14-e20. PubMed ID: 30667613
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Methods of responding to healthcare security incidents.
    Furnell S; Gritzalis D; Katsikas S; Mavroudakis K; Sanders P; Warren M
    Stud Health Technol Inform; 1998; 52 Pt 2():1138-42. PubMed ID: 10384637
    [TBL] [Abstract][Full Text] [Related]  

  • 25. The cost of IT security.
    McMillan M
    Healthc Financ Manage; 2015 Apr; 69(4):44-7. PubMed ID: 26665523
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Ransomware in Hospitals: What Providers Will Inevitably Face When Attacked.
    Kelpsas B; Nelson A
    J Med Pract Manage; 2016 Sep; 32(1):67-70. PubMed ID: 30452851
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Effects of Internal and External Factors on Hospital Data Breaches: Quantitative Study.
    Dolezel D; Beauvais B; Stigler Granados P; Fulton L; Kruse CS
    J Med Internet Res; 2023 Dec; 25():e51471. PubMed ID: 38127426
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Factors Influencing the Adoption of Advanced Cryptographic Techniques for Data Protection of Patient Medical Records.
    Lewis N; Connelly Y; Henkin G; Leibovich M; Akavia A
    Healthc Inform Res; 2022 Apr; 28(2):132-142. PubMed ID: 35576981
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Cheating in OSCEs: The Impact of Simulated Security Breaches on OSCE Performance.
    Gotzmann A; De Champlain A; Homayra F; Fotheringham A; de Vries I; Forgie M; Pugh D
    Teach Learn Med; 2017; 29(1):52-58. PubMed ID: 27603790
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Health IT, hacking, and cybersecurity: national trends in data breaches of protected health information.
    Ronquillo JG; Erik Winterholler J; Cwikla K; Szymanski R; Levy C
    JAMIA Open; 2018 Jul; 1(1):15-19. PubMed ID: 31984315
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Privacy please: Power distance and people's responses to data breaches across countries.
    Madan S; Savani K; Katsikeas CS
    J Int Bus Stud; 2023; 54(4):731-754. PubMed ID: 35607320
    [TBL] [Abstract][Full Text] [Related]  

  • 32. A dataset for accounting, finance and economics research on US data breaches.
    Rosati P; Lynn T
    Data Brief; 2021 Apr; 35():106924. PubMed ID: 33748365
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Technical difficulties. Recent health IT security breaches are unlikely to improve the public's perception about the safety of personal data.
    Becker C
    Mod Healthc; 2006 Feb; 36(8):6-7, 16, 1. PubMed ID: 16515213
    [TBL] [Abstract][Full Text] [Related]  

  • 34. Effective audit trails--a taxonomy for determination of information requirements.
    Asaro PV; Herting RL; Roth AC; Barnes MR
    Proc AMIA Symp; 1999; ():663-5. PubMed ID: 10566442
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Cyber threats to health information systems: A systematic review.
    Luna R; Rhine E; Myhra M; Sullivan R; Kruse CS
    Technol Health Care; 2016; 24(1):1-9. PubMed ID: 26578272
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Internet of Things (IoT) Based Design of a Secure and Lightweight Body Area Network (BAN) Healthcare System.
    Deng YY; Chen CL; Tsaur WJ; Tang YW; Chen JH
    Sensors (Basel); 2017 Dec; 17(12):. PubMed ID: 29244776
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Breaches of health information: are electronic records different from paper records?
    Sade RM
    J Clin Ethics; 2010; 21(1):39-41. PubMed ID: 20465074
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Intelligent Security and Privacy of Electronic Health Records Using Biometric Images.
    Alghazo JM
    Curr Med Imaging Rev; 2019; 15(4):386-394. PubMed ID: 31989908
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Cybersecurity in healthcare: A narrative review of trends, threats and ways forward.
    Coventry L; Branley D
    Maturitas; 2018 Jul; 113():48-52. PubMed ID: 29903648
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Data security and patient confidentiality: the manager's role.
    Fisher F; Madge B
    Int J Biomed Comput; 1996 Oct; 43(1-2):115-9. PubMed ID: 8960931
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 9.