These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
144 related articles for article (PubMed ID: 34042653)
1. A Simple Assessment of Information Security Awareness in Hospital Staff Across Five Danish Regions. Schmidt T; Nøhr C; Koppel R Stud Health Technol Inform; 2021 May; 281():635-639. PubMed ID: 34042653 [TBL] [Abstract][Full Text] [Related]
2. The Impact of the Security Competency on "Self-Efficacy in Information Security" for Effective Health Information Security in Iran. Shahri AB; Ismail Z; Mohanna S J Med Syst; 2016 Nov; 40(11):241. PubMed ID: 27681101 [TBL] [Abstract][Full Text] [Related]
3. Network security vulnerabilities and personal privacy issues in Healthcare Information Systems: a case study in a private hospital in Turkey. Namoğlu N; Ulgen Y Stud Health Technol Inform; 2013; 190():126-8. PubMed ID: 23823398 [TBL] [Abstract][Full Text] [Related]
4. Breaking down silos between business continuity and cyber security. Phillips R; Tanner B J Bus Contin Emer Plan; 2019 Jan; 12(3):224-232. PubMed ID: 30857581 [TBL] [Abstract][Full Text] [Related]
5. Assessing staff attitudes towards information security in a European healthcare establishment. Furnell SM; Gaunt PN; Holben RF; Sanders PW; Stockel CT; Warren MJ Med Inform (Lond); 1996; 21(2):105-12. PubMed ID: 8947888 [TBL] [Abstract][Full Text] [Related]
6. Evaluation of the awareness and effectiveness of IT security programs in a large publicly funded health care system. Hepp SL; Tarraf RC; Birney A; Arain MA Health Inf Manag; 2018 Sep; 47(3):116-124. PubMed ID: 28745562 [TBL] [Abstract][Full Text] [Related]
7. Cyber resilience: a review of critical national infrastructure and cyber security protection measures applied in the UK and USA. Harrop W; Matteson A J Bus Contin Emer Plan; 2013-2014 Winter; 7(2):149-62. PubMed ID: 24457326 [TBL] [Abstract][Full Text] [Related]
8. The health information system security threat lifecycle: an informatics theory. Fernando JI; Dawson LL Int J Med Inform; 2009 Dec; 78(12):815-26. PubMed ID: 19783203 [TBL] [Abstract][Full Text] [Related]
9. Securing healthcare information system through fuzzy based decision-making methodology. Alharbi A; Ahmad M; Alosaimi W; Alyami H; Sarkar AK; Agrawal A; Kumar R; Khan RA Health Informatics J; 2022; 28(4):14604582221135420. PubMed ID: 36374584 [TBL] [Abstract][Full Text] [Related]
10. Cyber threats to health information systems: A systematic review. Luna R; Rhine E; Myhra M; Sullivan R; Kruse CS Technol Health Care; 2016; 24(1):1-9. PubMed ID: 26578272 [TBL] [Abstract][Full Text] [Related]
11. Addressing information security training and awareness within the European healthcare community. Furnell S; Sanders P; Warren M Stud Health Technol Inform; 1997; 43 Pt B():707-11. PubMed ID: 10179759 [TBL] [Abstract][Full Text] [Related]
12. Fuzzy assessment of health information system users' security awareness. Aydın ÖM; Chouseinoglou O J Med Syst; 2013 Dec; 37(6):9984. PubMed ID: 24141530 [TBL] [Abstract][Full Text] [Related]
13. Implementing interoperable secure health information systems. Doupi P; Ruotsalainen P; Pohjonen H Stud Health Technol Inform; 2005; 115():187-214. PubMed ID: 16160225 [TBL] [Abstract][Full Text] [Related]
14. Privacy, confidentiality, and security in information systems of state health agencies. O'Brien DG; Yasnoff WA Am J Prev Med; 1999 May; 16(4):351-8. PubMed ID: 10493295 [TBL] [Abstract][Full Text] [Related]
16. Implementing healthcare information security: standards can help. Orel A; Bernik I Stud Health Technol Inform; 2013; 186():195-9. PubMed ID: 23542997 [TBL] [Abstract][Full Text] [Related]
17. Installing an appropriate information security policy. Gaunt N Int J Med Inform; 1998 Mar; 49(1):131-4. PubMed ID: 9723813 [TBL] [Abstract][Full Text] [Related]
18. Healthcare information security. The threats and the safeguards--and how to manage them. Health Devices; 2001; 30(1-2):31-48. PubMed ID: 11258232 [TBL] [Abstract][Full Text] [Related]
19. Improving the redistribution of the security lessons in healthcare: An evaluation of the Generic Security Template. He Y; Johnson C Int J Med Inform; 2015 Nov; 84(11):941-9. PubMed ID: 26363788 [TBL] [Abstract][Full Text] [Related]
20. Healthcare Staffs' Information Security Practices Towards Mitigating Data Breaches: A Literature Survey. Yeng PK; Yang B; Snekkenes EA Stud Health Technol Inform; 2019; 261():239-245. PubMed ID: 31156123 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]