These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

180 related articles for article (PubMed ID: 32414183)

  • 41. Data security and patient confidentiality: the manager's role.
    Fisher F; Madge B
    Int J Biomed Comput; 1996 Oct; 43(1-2):115-9. PubMed ID: 8960931
    [TBL] [Abstract][Full Text] [Related]  

  • 42. Security analysis and secure channel-free certificateless searchable public key authenticated encryption for a cloud-based Internet of things.
    Wu B; Wang C; Yao H
    PLoS One; 2020; 15(4):e0230722. PubMed ID: 32271788
    [TBL] [Abstract][Full Text] [Related]  

  • 43. Cyberterrorism as a global threat: a review on repercussions and countermeasures.
    Iftikhar S
    PeerJ Comput Sci; 2024; 10():e1772. PubMed ID: 38259881
    [TBL] [Abstract][Full Text] [Related]  

  • 44. Confidentiality and privacy breaches in a university hospital emergency department.
    Mlinek EJ; Pierce J
    Acad Emerg Med; 1997 Dec; 4(12):1142-6. PubMed ID: 9408430
    [TBL] [Abstract][Full Text] [Related]  

  • 45. Managing Security Risk: Modeling the Root Causes of Data Breaches.
    Dolezel D; McLeod A
    Health Care Manag (Frederick); 2019; 38(4):322-330. PubMed ID: 31663871
    [TBL] [Abstract][Full Text] [Related]  

  • 46. Cybersecurity in healthcare: A systematic review of modern threats and trends.
    Kruse CS; Frederick B; Jacobson T; Monticone DK
    Technol Health Care; 2017; 25(1):1-10. PubMed ID: 27689562
    [TBL] [Abstract][Full Text] [Related]  

  • 47. Outstanding scientist of the year 2006: Rogel Patawaran, BS.
    Rubin RA; Hazirjian CL
    J Long Term Eff Med Implants; 2006; 16(1):1-7. PubMed ID: 16566740
    [TBL] [Abstract][Full Text] [Related]  

  • 48. Improving the redistribution of the security lessons in healthcare: An evaluation of the Generic Security Template.
    He Y; Johnson C
    Int J Med Inform; 2015 Nov; 84(11):941-9. PubMed ID: 26363788
    [TBL] [Abstract][Full Text] [Related]  

  • 49. Freehand technique for C2 pedicle and pars screw placement: is it safe?
    Punyarat P; Buchowski JM; Klawson BT; Peters C; Lertudomphonwanit T; Riew KD
    Spine J; 2018 Jul; 18(7):1197-1203. PubMed ID: 29155344
    [TBL] [Abstract][Full Text] [Related]  

  • 50. Providers face uphill battle on data breaches. Healthcare organizations need a new approach in dealing with this pervasive and costly problem.
    Degaspari J
    Healthc Inform; 2013 Feb; 30(1):52, 54, 56. PubMed ID: 23505950
    [No Abstract]   [Full Text] [Related]  

  • 51. Stimulus-evoked electromyography testing of percutaneous pedicle screws for the detection of pedicle breaches: a clinical study of 409 screws in 93 patients.
    Wang MY; Pineiro G; Mummaneni PV
    J Neurosurg Spine; 2010 Nov; 13(5):600-5. PubMed ID: 21039151
    [TBL] [Abstract][Full Text] [Related]  

  • 52. Going Beyond Compliance: A Strategic Framework for Promoting Information Security in Hospitals.
    Zandona DJ; Thompson JM
    Health Care Manag (Frederick); 2017; 36(4):364-371. PubMed ID: 28953575
    [TBL] [Abstract][Full Text] [Related]  

  • 53. Breach Risk Magnitude: A Quantitative Measure of Database Security.
    Yasnoff WA
    AMIA Annu Symp Proc; 2016; 2016():1258-1263. PubMed ID: 28269923
    [TBL] [Abstract][Full Text] [Related]  

  • 54. Applying CHAID algorithm to investigate critical attributes of secured interoperable health data exchange.
    Bhartiya S; Mehrotra D
    Int J Electron Healthc; 2015; 8(1):25-50. PubMed ID: 26559072
    [TBL] [Abstract][Full Text] [Related]  

  • 55. Privacy and security compliance in the E-healthcare marketplace.
    Lutes M
    Healthc Financ Manage; 2000 Mar; 54(3):48-50. PubMed ID: 10847915
    [TBL] [Abstract][Full Text] [Related]  

  • 56. Smart Home-based IoT for Real-time and Secure Remote Health Monitoring of Triage and Priority System using Body Sensors: Multi-driven Systematic Review.
    Talal M; Zaidan AA; Zaidan BB; Albahri AS; Alamoodi AH; Albahri OS; Alsalem MA; Lim CK; Tan KL; Shir WL; Mohammed KI
    J Med Syst; 2019 Jan; 43(3):42. PubMed ID: 30648217
    [TBL] [Abstract][Full Text] [Related]  

  • 57. Data breaches. Final rule.
    Department of Veterans Affairs
    Fed Regist; 2008 Apr; 73(71):19747-8. PubMed ID: 18464350
    [TBL] [Abstract][Full Text] [Related]  

  • 58. Promotion by the British pharmaceutical industry, 1983-8: a critical analysis of self regulation.
    Herxheimer A; Collier J
    BMJ; 1990 Feb; 300(6720):307-11. PubMed ID: 2106963
    [TBL] [Abstract][Full Text] [Related]  

  • 59. Trust Me, I'm a Doctor: Examining Changes in How Privacy Concerns Affect Patient Withholding Behavior.
    Walker DM; Johnson T; Ford EW; Huerta TR
    J Med Internet Res; 2017 Jan; 19(1):e2. PubMed ID: 28052843
    [TBL] [Abstract][Full Text] [Related]  

  • 60. Verifiable fully outsourced attribute-based signcryption system for IoT eHealth big data in cloud computing.
    Kibiwott KP; Zhao YN; Kogo J; Zhang FL
    Math Biosci Eng; 2019 Apr; 16(5):3561-3594. PubMed ID: 31509915
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 9.